From e4a11295abc4bfd72990ebf7d7b25b6ecfe17cca Mon Sep 17 00:00:00 2001
From: Nicholas Orlowsky
Date: Thu, 30 Mar 2023 11:48:58 -0500
Subject: [PATCH 001/283] file parsing for Cgroup2
---
pkg/util/runtime/cpu_linux.go | 52 +++++++++++++++++++++++++++++++++--
1 file changed, 50 insertions(+), 2 deletions(-)
diff --git a/pkg/util/runtime/cpu_linux.go b/pkg/util/runtime/cpu_linux.go
index cfc49d924..a69a4432c 100644
--- a/pkg/util/runtime/cpu_linux.go
+++ b/pkg/util/runtime/cpu_linux.go
@@ -43,8 +43,16 @@ func NumCPU() int {
return cpus
}
- cpuQuota := readCgroupFileToInt64(cgroupPath, "cpu.cfs_quota_us")
- cpuPeriod := readCgroupFileToInt64(cgroupPath, "cpu.cfs_period_us")
+ cgroupVersion := getCgroupVersion();
+ cpuQuota := -1;
+ cpuPeriod := -1;
+
+ if cgroupVersion == 1 {
+ cpuQuota := readCgroupFileToInt64(cgroupPath, "cpu.cfs_quota_us")
+ cpuPeriod := readCgroupFileToInt64(cgroupPath, "cpu.cfs_period_us")
+ } else if cgroupVersion == 2 {
+ cpuQuota, cpuPeriod := readCgroup2FileToInt64Tuple(cgroupPath, "cpu.max")
+ }
if cpuQuota == -1 || cpuPeriod == -1 {
return cpus
@@ -53,6 +61,46 @@ func NumCPU() int {
return int(math.Ceil(float64(cpuQuota) / float64(cpuPeriod)))
}
+func getCgroupVersion() int64 {
+ // TODO: detect version
+ return 2;
+}
+
+func readCgroup2FileToInt64Tuple(cgroupPath, cgroupFile string) (int64, int64) {
+ contents, err := os.ReadFile(filepath.Join(cgroupPath, cgroupFile))
+
+ if err != nil {
+ return -1, -1;
+ }
+
+ // file contents looks like: $MAX $PERIOD
+ // $MAX can have value "max" indicating no limit
+
+ values := strings.Fields(string(contents));
+
+ if values[0] == "max" {
+ return -1, -1;
+ }
+
+ cpuQuota, err := strconv.ParseInt(values[0], 10, 64);
+
+ if err != nil {
+ return -1, -1;
+ }
+
+ if len(values) == 1 {
+ return cpuQuota, 1;
+ }
+
+ cpuPeriod, err := strconv.ParseInt(values[1], 10, 64);
+
+ if err != nil {
+ return -1, -1;
+ }
+
+ return cpuQuota, cpuPeriod;
+}
+
func readCgroupFileToInt64(cgroupPath, cgroupFile string) int64 {
contents, err := os.ReadFile(filepath.Join(cgroupPath, cgroupFile))
if err != nil {
From 221e85f6f2e11455cdeeb5b2d4cfd93b51b575c1 Mon Sep 17 00:00:00 2001
From: Nicholas Orlowsky
Date: Fri, 31 Mar 2023 00:36:12 -0500
Subject: [PATCH 002/283] added version detecting
---
pkg/util/runtime/cpu_linux.go | 9 +++++++--
1 file changed, 7 insertions(+), 2 deletions(-)
diff --git a/pkg/util/runtime/cpu_linux.go b/pkg/util/runtime/cpu_linux.go
index a69a4432c..431691a7e 100644
--- a/pkg/util/runtime/cpu_linux.go
+++ b/pkg/util/runtime/cpu_linux.go
@@ -62,8 +62,12 @@ func NumCPU() int {
}
func getCgroupVersion() int64 {
- // TODO: detect version
- return 2;
+ // /sys/fs/cgroup/cgroup.controllers will not exist with cgroupsv1
+ if _, err := os.Stat("/sys/fs/cgroup/cgroup.controllers"); err == nil {
+ return 2;
+ } else {
+ return 1;
+ }
}
func readCgroup2FileToInt64Tuple(cgroupPath, cgroupFile string) (int64, int64) {
@@ -75,6 +79,7 @@ func readCgroup2FileToInt64Tuple(cgroupPath, cgroupFile string) (int64, int64) {
// file contents looks like: $MAX $PERIOD
// $MAX can have value "max" indicating no limit
+ // it is possible for $PERIOD to be unset
values := strings.Fields(string(contents));
From 3ae35a045dc0d103c6d6511ffa516ebddb11ac14 Mon Sep 17 00:00:00 2001
From: Nicholas Orlowsky
Date: Fri, 31 Mar 2023 00:52:14 -0500
Subject: [PATCH 003/283] ran gofmt
---
pkg/util/runtime/cpu_linux.go | 34 +++++++++++++++++-----------------
1 file changed, 17 insertions(+), 17 deletions(-)
diff --git a/pkg/util/runtime/cpu_linux.go b/pkg/util/runtime/cpu_linux.go
index 431691a7e..7f46a6dd1 100644
--- a/pkg/util/runtime/cpu_linux.go
+++ b/pkg/util/runtime/cpu_linux.go
@@ -43,16 +43,16 @@ func NumCPU() int {
return cpus
}
- cgroupVersion := getCgroupVersion();
- cpuQuota := -1;
- cpuPeriod := -1;
+ cgroupVersion := getCgroupVersion()
+ cpuQuota := -1
+ cpuPeriod := -1
- if cgroupVersion == 1 {
+ if cgroupVersion == 1 {
cpuQuota := readCgroupFileToInt64(cgroupPath, "cpu.cfs_quota_us")
cpuPeriod := readCgroupFileToInt64(cgroupPath, "cpu.cfs_period_us")
} else if cgroupVersion == 2 {
cpuQuota, cpuPeriod := readCgroup2FileToInt64Tuple(cgroupPath, "cpu.max")
- }
+ }
if cpuQuota == -1 || cpuPeriod == -1 {
return cpus
@@ -64,9 +64,9 @@ func NumCPU() int {
func getCgroupVersion() int64 {
// /sys/fs/cgroup/cgroup.controllers will not exist with cgroupsv1
if _, err := os.Stat("/sys/fs/cgroup/cgroup.controllers"); err == nil {
- return 2;
+ return 2
} else {
- return 1;
+ return 1
}
}
@@ -74,36 +74,36 @@ func readCgroup2FileToInt64Tuple(cgroupPath, cgroupFile string) (int64, int64) {
contents, err := os.ReadFile(filepath.Join(cgroupPath, cgroupFile))
if err != nil {
- return -1, -1;
+ return -1, -1
}
// file contents looks like: $MAX $PERIOD
// $MAX can have value "max" indicating no limit
// it is possible for $PERIOD to be unset
- values := strings.Fields(string(contents));
+ values := strings.Fields(string(contents))
if values[0] == "max" {
- return -1, -1;
+ return -1, -1
}
- cpuQuota, err := strconv.ParseInt(values[0], 10, 64);
+ cpuQuota, err := strconv.ParseInt(values[0], 10, 64)
- if err != nil {
- return -1, -1;
+ if err != nil {
+ return -1, -1
}
if len(values) == 1 {
- return cpuQuota, 1;
+ return cpuQuota, 1
}
- cpuPeriod, err := strconv.ParseInt(values[1], 10, 64);
+ cpuPeriod, err := strconv.ParseInt(values[1], 10, 64)
if err != nil {
- return -1, -1;
+ return -1, -1
}
- return cpuQuota, cpuPeriod;
+ return cpuQuota, cpuPeriod
}
func readCgroupFileToInt64(cgroupPath, cgroupFile string) int64 {
From 7f6472617bf086712d995418e2e4df98e2ee4682 Mon Sep 17 00:00:00 2001
From: Nicholas Orlowsky
Date: Fri, 31 Mar 2023 00:53:34 -0500
Subject: [PATCH 004/283] declarations to assignments
---
pkg/util/runtime/cpu_linux.go | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/pkg/util/runtime/cpu_linux.go b/pkg/util/runtime/cpu_linux.go
index 7f46a6dd1..d6ea87ad6 100644
--- a/pkg/util/runtime/cpu_linux.go
+++ b/pkg/util/runtime/cpu_linux.go
@@ -48,10 +48,10 @@ func NumCPU() int {
cpuPeriod := -1
if cgroupVersion == 1 {
- cpuQuota := readCgroupFileToInt64(cgroupPath, "cpu.cfs_quota_us")
- cpuPeriod := readCgroupFileToInt64(cgroupPath, "cpu.cfs_period_us")
+ cpuQuota = readCgroupFileToInt64(cgroupPath, "cpu.cfs_quota_us")
+ cpuPeriod = readCgroupFileToInt64(cgroupPath, "cpu.cfs_period_us")
} else if cgroupVersion == 2 {
- cpuQuota, cpuPeriod := readCgroup2FileToInt64Tuple(cgroupPath, "cpu.max")
+ cpuQuota, cpuPeriod = readCgroup2FileToInt64Tuple(cgroupPath, "cpu.max")
}
if cpuQuota == -1 || cpuPeriod == -1 {
From a080ea1f29bf1b48b5cfe8cdda2f0278c185f487 Mon Sep 17 00:00:00 2001
From: Nicholas Orlowsky
Date: Fri, 31 Mar 2023 00:58:43 -0500
Subject: [PATCH 005/283] correct types
---
pkg/util/runtime/cpu_linux.go | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/pkg/util/runtime/cpu_linux.go b/pkg/util/runtime/cpu_linux.go
index d6ea87ad6..5228c93a2 100644
--- a/pkg/util/runtime/cpu_linux.go
+++ b/pkg/util/runtime/cpu_linux.go
@@ -44,8 +44,8 @@ func NumCPU() int {
}
cgroupVersion := getCgroupVersion()
- cpuQuota := -1
- cpuPeriod := -1
+ cpuQuota := int64(-1)
+ cpuPeriod := int64(-1)
if cgroupVersion == 1 {
cpuQuota = readCgroupFileToInt64(cgroupPath, "cpu.cfs_quota_us")
From f35dae9b1117a6e0da532702bb4978ea8547175f Mon Sep 17 00:00:00 2001
From: Nicholas Orlowsky
Date: Sun, 16 Apr 2023 16:09:39 -0500
Subject: [PATCH 006/283] added test boilerplate
---
test/e2e/e2e.go | 41 +++++++++++++++++++++--------------------
1 file changed, 21 insertions(+), 20 deletions(-)
diff --git a/test/e2e/e2e.go b/test/e2e/e2e.go
index 57b047230..a671e8793 100644
--- a/test/e2e/e2e.go
+++ b/test/e2e/e2e.go
@@ -29,26 +29,27 @@ import (
"k8s.io/ingress-nginx/test/e2e/framework"
// tests to run
- _ "k8s.io/ingress-nginx/test/e2e/admission"
- _ "k8s.io/ingress-nginx/test/e2e/annotations"
- _ "k8s.io/ingress-nginx/test/e2e/annotations/modsecurity"
- _ "k8s.io/ingress-nginx/test/e2e/dbg"
- _ "k8s.io/ingress-nginx/test/e2e/defaultbackend"
- _ "k8s.io/ingress-nginx/test/e2e/endpointslices"
- _ "k8s.io/ingress-nginx/test/e2e/gracefulshutdown"
- _ "k8s.io/ingress-nginx/test/e2e/ingress"
- _ "k8s.io/ingress-nginx/test/e2e/leaks"
- _ "k8s.io/ingress-nginx/test/e2e/loadbalance"
- _ "k8s.io/ingress-nginx/test/e2e/lua"
- _ "k8s.io/ingress-nginx/test/e2e/nginx"
- _ "k8s.io/ingress-nginx/test/e2e/security"
- _ "k8s.io/ingress-nginx/test/e2e/servicebackend"
- _ "k8s.io/ingress-nginx/test/e2e/settings"
- _ "k8s.io/ingress-nginx/test/e2e/settings/modsecurity"
- _ "k8s.io/ingress-nginx/test/e2e/settings/ocsp"
- _ "k8s.io/ingress-nginx/test/e2e/ssl"
- _ "k8s.io/ingress-nginx/test/e2e/status"
- _ "k8s.io/ingress-nginx/test/e2e/tcpudp"
+ // _ "k8s.io/ingress-nginx/test/e2e/admission"
+ // _ "k8s.io/ingress-nginx/test/e2e/annotations"
+ // _ "k8s.io/ingress-nginx/test/e2e/annotations/modsecurity"
+ _ "k8s.io/ingress-nginx/test/e2e/cgroups"
+ // _ "k8s.io/ingress-nginx/test/e2e/dbg"
+ // _ "k8s.io/ingress-nginx/test/e2e/defaultbackend"
+ // _ "k8s.io/ingress-nginx/test/e2e/endpointslices"
+ // _ "k8s.io/ingress-nginx/test/e2e/gracefulshutdown"
+ // _ "k8s.io/ingress-nginx/test/e2e/ingress"
+ // _ "k8s.io/ingress-nginx/test/e2e/leaks"
+ // _ "k8s.io/ingress-nginx/test/e2e/loadbalance"
+ // _ "k8s.io/ingress-nginx/test/e2e/lua"
+ // _ "k8s.io/ingress-nginx/test/e2e/nginx"
+ // _ "k8s.io/ingress-nginx/test/e2e/security"
+ // _ "k8s.io/ingress-nginx/test/e2e/servicebackend"
+ // _ "k8s.io/ingress-nginx/test/e2e/settings"
+ // _ "k8s.io/ingress-nginx/test/e2e/settings/modsecurity"
+ // _ "k8s.io/ingress-nginx/test/e2e/settings/ocsp"
+ // _ "k8s.io/ingress-nginx/test/e2e/ssl"
+ // _ "k8s.io/ingress-nginx/test/e2e/status"
+ // _ "k8s.io/ingress-nginx/test/e2e/tcpudp"
)
// RunE2ETests checks configuration parameters (specified through flags) and then runs
From dad8086cb2b992c37736e2645aaabd0a36129735 Mon Sep 17 00:00:00 2001
From: Nicholas Orlowsky
Date: Sun, 16 Apr 2023 16:09:58 -0500
Subject: [PATCH 007/283] added test boilerplate
---
test/e2e/cgroups/cgroups.go | 36 ++++++++++++++++++++++++++++++++++++
1 file changed, 36 insertions(+)
create mode 100644 test/e2e/cgroups/cgroups.go
diff --git a/test/e2e/cgroups/cgroups.go b/test/e2e/cgroups/cgroups.go
new file mode 100644
index 000000000..ec9628bd5
--- /dev/null
+++ b/test/e2e/cgroups/cgroups.go
@@ -0,0 +1,36 @@
+/*
+Copyright 2020 The Kubernetes Authors.
+
+Licensed under the Apache License, Version 2.0 (the "License");
+you may not use this file except in compliance with the License.
+You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law or agreed to in writing, software
+distributed under the License is distributed on an "AS IS" BASIS,
+WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+See the License for the specific language governing permissions and
+limitations under the License.
+*/
+
+package cgroups
+
+import (
+ "github.com/onsi/ginkgo/v2"
+
+ "k8s.io/ingress-nginx/test/e2e/framework"
+)
+
+var _ = framework.IngressNginxDescribeSerial("[CGroups] cgroups", func() {
+ f := framework.NewDefaultFramework("cgroups")
+
+ ginkgo.BeforeEach(func() {
+ f.NewEchoDeployment()
+ f.NewSlowEchoDeployment()
+ })
+
+ ginkgo.It("run this test properly", func() {
+
+ })
+})
From 7c4ac85a48c8d55417f33648dab87641a7105b7e Mon Sep 17 00:00:00 2001
From: Nicholas Orlowsky
Date: Sun, 16 Apr 2023 16:11:05 -0500
Subject: [PATCH 008/283] more boilerplate
---
test/e2e/cgroups/cgroups.go | 10 +++++++++-
1 file changed, 9 insertions(+), 1 deletion(-)
diff --git a/test/e2e/cgroups/cgroups.go b/test/e2e/cgroups/cgroups.go
index ec9628bd5..98148db8d 100644
--- a/test/e2e/cgroups/cgroups.go
+++ b/test/e2e/cgroups/cgroups.go
@@ -30,7 +30,15 @@ var _ = framework.IngressNginxDescribeSerial("[CGroups] cgroups", func() {
f.NewSlowEchoDeployment()
})
- ginkgo.It("run this test properly", func() {
+ ginkgo.It("detects number of CPUs properly in cgroups v1", func() {
+
+ })
+
+ ginkgo.It("detects number of CPUs properly in cgroups v2", func() {
+
+ })
+
+ ginkgo.It("detects cgroups version", func() {
})
})
From 165d0573618c5bcd42962de100b75666c6fe15b3 Mon Sep 17 00:00:00 2001
From: Sridhar Nandigam
Date: Sun, 16 Apr 2023 16:39:51 -0500
Subject: [PATCH 009/283] added a thing
---
test/e2e/cgroups/cgroups.go | 7 +-
test/junitreports/report-e2e-test-suite.xml | 1311 +++++++++++++++++++
2 files changed, 1316 insertions(+), 2 deletions(-)
create mode 100644 test/junitreports/report-e2e-test-suite.xml
diff --git a/test/e2e/cgroups/cgroups.go b/test/e2e/cgroups/cgroups.go
index 98148db8d..34d6c037a 100644
--- a/test/e2e/cgroups/cgroups.go
+++ b/test/e2e/cgroups/cgroups.go
@@ -18,8 +18,11 @@ package cgroups
import (
"github.com/onsi/ginkgo/v2"
+ "github.com/stretchr/testify/assert"
"k8s.io/ingress-nginx/test/e2e/framework"
+
+ "k8s.io/ingress-nginx/pkg/util/runtime"
)
var _ = framework.IngressNginxDescribeSerial("[CGroups] cgroups", func() {
@@ -31,11 +34,11 @@ var _ = framework.IngressNginxDescribeSerial("[CGroups] cgroups", func() {
})
ginkgo.It("detects number of CPUs properly in cgroups v1", func() {
-
+ assert.Equal(ginkgo.GinkgoT(), runtime.NumCPU(), -1)
})
ginkgo.It("detects number of CPUs properly in cgroups v2", func() {
-
+ assert.Equal(ginkgo.GinkgoT(), runtime.NumCPU(), -1)
})
ginkgo.It("detects cgroups version", func() {
diff --git a/test/junitreports/report-e2e-test-suite.xml b/test/junitreports/report-e2e-test-suite.xml
new file mode 100644
index 000000000..fc919bad2
--- /dev/null
+++ b/test/junitreports/report-e2e-test-suite.xml
@@ -0,0 +1,1311 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:19.256
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:40.576 (2m21.32s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:06:40.576
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:06:44.629 (4.053s)
> Enter [It] should set cors methods to only allow POST, GET - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:62 @ 04/04/23 18:06:44.629
< Exit [It] should set cors methods to only allow POST, GET - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:62 @ 04/04/23 18:06:54.768 (10.139s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:54.768
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:54.976 (208ms)
+
+
+ > Enter [BeforeEach] [Setting] [Load Balancer] round-robin - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:54.976
< Exit [BeforeEach] [Setting] [Load Balancer] round-robin - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:01.906 (6.93s)
> Enter [BeforeEach] [Setting] [Load Balancer] round-robin - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/round_robin.go:34 @ 04/04/23 18:07:01.906
< Exit [BeforeEach] [Setting] [Load Balancer] round-robin - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/round_robin.go:34 @ 04/04/23 18:07:12.967 (11.06s)
> Enter [It] should evenly distribute requests with round-robin (default algorithm) - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/round_robin.go:39 @ 04/04/23 18:07:12.967
< Exit [It] should evenly distribute requests with round-robin (default algorithm) - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/round_robin.go:39 @ 04/04/23 18:09:21.17 (2m8.203s)
> Enter [AfterEach] [Setting] [Load Balancer] round-robin - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:21.17
< Exit [AfterEach] [Setting] [Load Balancer] round-robin - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:21.399 (229ms)
+
+
+ > Enter [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:21.4
< Exit [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:28.324 (6.924s)
> Enter [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:35 @ 04/04/23 18:09:28.324
< Exit [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:35 @ 04/04/23 18:09:39.376 (11.052s)
> Enter [It] should trust X-Forwarded headers when setting is true - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:40 @ 04/04/23 18:09:39.376
STEP: ensuring single values are parsed correctly - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:54 @ 04/04/23 18:09:56.563
STEP: ensuring that first entry in X-Forwarded-Host is used as the best host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:75 @ 04/04/23 18:09:56.572
< Exit [It] should trust X-Forwarded headers when setting is true - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:40 @ 04/04/23 18:09:56.578 (17.202s)
> Enter [AfterEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:56.578
< Exit [AfterEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:56.789 (211ms)
+
+
+ > Enter [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:56.79
< Exit [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:03.662 (6.873s)
> Enter [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:34 @ 04/04/23 18:10:03.662
< Exit [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:34 @ 04/04/23 18:10:07.688 (4.026s)
> Enter [It] should redirect from www HTTPS to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:64 @ 04/04/23 18:10:07.688
STEP: setting up server for redirect from www - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:65 @ 04/04/23 18:10:07.688
STEP: sending request to www should redirect to domain - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:91 @ 04/04/23 18:10:22.913
STEP: sending request to domain should not redirect to www - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:103 @ 04/04/23 18:10:22.941
< Exit [It] should redirect from www HTTPS to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:64 @ 04/04/23 18:10:22.969 (15.281s)
> Enter [AfterEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:22.969
< Exit [AfterEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:23.209 (240ms)
+
+
+ > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:23.21
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:31.083 (7.874s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:10:31.083
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:10:35.101 (4.018s)
> Enter [It] should set secure in cookie with provided true annotation on http - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:412 @ 04/04/23 18:10:35.101
< Exit [It] should set secure in cookie with provided true annotation on http - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:412 @ 04/04/23 18:10:45.308 (10.206s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:45.308
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:45.524 (217ms)
+
+
+ > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:45.525
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:52.399 (6.874s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:10:52.399
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:10:56.446 (4.048s)
> Enter [It] should not set cookie without domain annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:248 @ 04/04/23 18:10:56.446
< Exit [It] should not set cookie without domain annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:248 @ 04/04/23 18:11:06.571 (10.124s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:06.571
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:06.765 (195ms)
+
+
+ > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:06.765
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:13.684 (6.918s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:11:13.684
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:11:17.714 (4.03s)
> Enter [It] should set sticky cookie without host - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:352 @ 04/04/23 18:11:17.714
< Exit [It] should set sticky cookie without host - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:352 @ 04/04/23 18:11:27.946 (10.232s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:27.946
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:28.167 (220ms)
+
+
+ > Enter [BeforeEach] [Security] request smuggling - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:28.167
< Exit [BeforeEach] [Security] request smuggling - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:36.071 (7.904s)
> Enter [BeforeEach] [Security] request smuggling - /go/src/k8s.io/ingress-nginx/test/e2e/security/request_smuggling.go:35 @ 04/04/23 18:11:36.071
< Exit [BeforeEach] [Security] request smuggling - /go/src/k8s.io/ingress-nginx/test/e2e/security/request_smuggling.go:35 @ 04/04/23 18:11:38.106 (2.035s)
> Enter [It] should not return body content from error_page - /go/src/k8s.io/ingress-nginx/test/e2e/security/request_smuggling.go:39 @ 04/04/23 18:11:38.106
< Exit [It] should not return body content from error_page - /go/src/k8s.io/ingress-nginx/test/e2e/security/request_smuggling.go:39 @ 04/04/23 18:12:00.307 (22.201s)
> Enter [AfterEach] [Security] request smuggling - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:00.307
< Exit [AfterEach] [Security] request smuggling - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:00.53 (223ms)
+
+
+ > Enter [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:00.531
< Exit [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:07.492 (6.961s)
> Enter [It] should use grpc_pass in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:43 @ 04/04/23 18:12:07.492
< Exit [It] should use grpc_pass in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:43 @ 04/04/23 18:12:24.818 (17.326s)
> Enter [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:24.818
< Exit [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:25.032 (214ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:25.033
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:32.425 (7.392s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:12:32.425
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:12:36.448 (4.023s)
> Enter [It] should return status code 401 when authentication is configured with invalid content and Authorization header is sent - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:227 @ 04/04/23 18:12:36.448
< Exit [It] should return status code 401 when authentication is configured with invalid content and Authorization header is sent - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:227 @ 04/04/23 18:12:46.572 (10.124s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:46.572
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:46.787 (215ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:46.788
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:54.215 (7.427s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:12:54.215
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:13:02.279 (8.064s)
> Enter [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:490 @ 04/04/23 18:13:02.279
STEP: routing requests to the canary upstream when header pattern is matched - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:514 @ 04/04/23 18:13:19.503
STEP: routing requests to the mainline upstream when header failed to match header value - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:523 @ 04/04/23 18:13:19.508
< Exit [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:490 @ 04/04/23 18:13:19.51 (17.231s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:19.51
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:19.813 (303ms)
+
+
+ > Enter [BeforeEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:19.813
< Exit [BeforeEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:26.704 (6.89s)
> Enter [It] should be enabled by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/multi_accept.go:31 @ 04/04/23 18:13:26.704
< Exit [It] should be enabled by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/multi_accept.go:31 @ 04/04/23 18:13:29.872 (3.169s)
> Enter [AfterEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:29.872
< Exit [AfterEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:30.073 (201ms)
+
+
+ > Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:30.073
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:37.948 (7.874s)
> Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 04/04/23 18:13:37.948
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 04/04/23 18:13:41.967 (4.019s)
> Enter [It] [BAD_ANNOTATIONS] should drop an ingress if there is a custom blocklist config in place and allow others to pass - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:133 @ 04/04/23 18:13:41.967
< Exit [It] [BAD_ANNOTATIONS] should drop an ingress if there is a custom blocklist config in place and allow others to pass - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:133 @ 04/04/23 18:14:07.32 (25.353s)
> Enter [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:07.32
< Exit [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:07.487 (167ms)
+
+
+
+ > Enter [BeforeEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:07.487
< Exit [BeforeEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:14.369 (6.882s)
> Enter [It] disables access logging for default backend - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:105 @ 04/04/23 18:14:14.369
[SKIPPED] enable-access-log-for-default-backend
In [It] at: /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:107 @ 04/04/23 18:14:14.37
< Exit [It] disables access logging for default backend - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:105 @ 04/04/23 18:14:14.37 (1ms)
> Enter [AfterEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:14.37
< Exit [AfterEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:14.561 (191ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:14.561
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:21.468 (6.907s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:14:21.468
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:14:29.526 (8.058s)
> Enter [It] respects always and never values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:643 @ 04/04/23 18:14:29.526
STEP: routing requests to the canary upstream when cookie is set to 'always' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:667 @ 04/04/23 18:14:46.664
STEP: routing requests to the mainline upstream when cookie is set to 'never' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:678 @ 04/04/23 18:14:54.864
STEP: routing requests to the mainline upstream when cookie is set to anything else - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:689 @ 04/04/23 18:15:04.858
< Exit [It] respects always and never values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:643 @ 04/04/23 18:15:14.862 (45.336s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:14.862
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:15.079 (218ms)
+
+
+ > Enter [BeforeEach] [Annotations] default-backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:15.08
< Exit [BeforeEach] [Annotations] default-backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:22.972 (7.892s)
> Enter [BeforeEach] [Annotations] default-backend - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/default_backend.go:32 @ 04/04/23 18:15:22.972
< Exit [BeforeEach] [Annotations] default-backend - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/default_backend.go:32 @ 04/04/23 18:15:26.998 (4.026s)
> Enter [It] should use a custom default backend as upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/default_backend.go:37 @ 04/04/23 18:15:26.998
< Exit [It] should use a custom default backend as upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/default_backend.go:37 @ 04/04/23 18:15:37.18 (10.182s)
> Enter [AfterEach] [Annotations] default-backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:37.18
< Exit [AfterEach] [Annotations] default-backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:37.392 (212ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:37.392
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:44.321 (6.929s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:15:44.321
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:15:50.372 (6.051s)
> Enter [It] always routes traffic to canary if first request was affinitized to canary (explicit sticky behavior) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:1000 @ 04/04/23 18:15:50.372
< Exit [It] always routes traffic to canary if first request was affinitized to canary (explicit sticky behavior) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:1000 @ 04/04/23 18:16:15.956 (25.584s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:15.956
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:16.151 (195ms)
+
+
+ > Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:16.152
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:25.575 (9.424s)
> Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 04/04/23 18:16:25.576
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 04/04/23 18:16:29.621 (4.045s)
> Enter [It] should write rewrite logs - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:37 @ 04/04/23 18:16:29.621
STEP: setting enable-rewrite-log annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:38 @ 04/04/23 18:16:29.621
< Exit [It] should write rewrite logs - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:37 @ 04/04/23 18:16:42.864 (13.243s)
> Enter [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:42.864
< Exit [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:43.089 (224ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:43.089
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:50.483 (7.394s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:16:50.483
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:16:54.502 (4.019s)
> Enter [It] should set sslClientCertificate, sslVerifyClient and sslVerifyDepth with auth-tls-secret - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:36 @ 04/04/23 18:16:54.502
< Exit [It] should set sslClientCertificate, sslVerifyClient and sslVerifyDepth with auth-tls-secret - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:36 @ 04/04/23 18:17:09.564 (15.063s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:09.564
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:09.781 (217ms)
+
+
+ > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:09.782
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:16.68 (6.899s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:17:16.68
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:17:20.71 (4.03s)
> Enter [It] should propagate the w3c header when configured with jaeger - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:197 @ 04/04/23 18:17:20.71
< Exit [It] should propagate the w3c header when configured with jaeger - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:197 @ 04/04/23 18:17:50.976 (30.266s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:50.976
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:51.176 (200ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:17:51.176
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:17:51.176 (0s)
+
+
+ > Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:51.177
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:59.072 (7.895s)
> Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 04/04/23 18:17:59.072
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 04/04/23 18:18:13.271 (14.199s)
> Enter [It] handles endpoints only changes - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:62 @ 04/04/23 18:18:13.271
< Exit [It] handles endpoints only changes - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:62 @ 04/04/23 18:18:23.585 (10.314s)
> Enter [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:23.585
< Exit [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:23.805 (219ms)
+
+
+ > Enter [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:23.805
< Exit [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:30.696 (6.891s)
> Enter [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:36 @ 04/04/23 18:18:30.696
< Exit [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:36 @ 04/04/23 18:18:34.717 (4.021s)
> Enter [It] should not appear references to secret updates not used in ingress rules - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:40 @ 04/04/23 18:18:34.717
< Exit [It] should not appear references to secret updates not used in ingress rules - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:40 @ 04/04/23 18:18:57.987 (23.27s)
> Enter [AfterEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:57.987
< Exit [AfterEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:58.194 (208ms)
+
+
+ > Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:58.195
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:08.072 (9.877s)
> Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 04/04/23 18:19:08.072
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 04/04/23 18:19:12.096 (4.024s)
> Enter [It] should include opentelemetry_trust_incoming_spans on directive when enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:74 @ 04/04/23 18:19:12.096
< Exit [It] should include opentelemetry_trust_incoming_spans on directive when enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:74 @ 04/04/23 18:19:29.486 (17.39s)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:29.486
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:30 (514ms)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 04/04/23 18:19:30
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 04/04/23 18:19:30 (0s)
+
+
+ > Enter [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:30.007
< Exit [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:37.929 (7.922s)
> Enter [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:34 @ 04/04/23 18:19:37.929
< Exit [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:34 @ 04/04/23 18:19:41.957 (4.027s)
> Enter [It] should redirect from www HTTP to HTTP - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:38 @ 04/04/23 18:19:41.957
STEP: setting up server for redirect from www - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:39 @ 04/04/23 18:19:41.957
STEP: sending request to www.fromtowwwredirect.bar.com - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:55 @ 04/04/23 18:19:52.111
< Exit [It] should redirect from www HTTP to HTTP - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:38 @ 04/04/23 18:19:52.114 (10.157s)
> Enter [AfterEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:52.114
< Exit [AfterEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:52.309 (195ms)
+
+
+ > Enter [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:52.309
< Exit [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:59.222 (6.912s)
> Enter [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:33 @ 04/04/23 18:19:59.222
< Exit [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:33 @ 04/04/23 18:20:03.271 (4.049s)
> Enter [It] should produce valid JSON for /dbg general - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:85 @ 04/04/23 18:20:03.271
< Exit [It] should produce valid JSON for /dbg general - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:85 @ 04/04/23 18:20:10.739 (7.468s)
> Enter [AfterEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:10.739
< Exit [AfterEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:11.546 (807ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:11.548
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:20.355 (8.808s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:20:20.355
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:20:28.54 (8.185s)
> Enter [It] should route requests split between mainline and canary if canary weight is 50 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:808 @ 04/04/23 18:20:28.54
< Exit [It] should route requests split between mainline and canary if canary weight is 50 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:808 @ 04/04/23 18:21:23.965 (55.425s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:23.965
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:24.188 (223ms)
+
+
+ > Enter [BeforeEach] [Annotations] custom-http-errors - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:24.188
< Exit [BeforeEach] [Annotations] custom-http-errors - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:32.093 (7.904s)
> Enter [BeforeEach] [Annotations] custom-http-errors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:37 @ 04/04/23 18:21:32.093
< Exit [BeforeEach] [Annotations] custom-http-errors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:37 @ 04/04/23 18:21:36.116 (4.023s)
> Enter [It] configures Nginx correctly - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:41 @ 04/04/23 18:21:36.116
STEP: turning on proxy_intercept_errors directive - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:59 @ 04/04/23 18:21:46.348
STEP: configuring error_page directive - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:62 @ 04/04/23 18:21:46.348
STEP: creating error locations - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:67 @ 04/04/23 18:21:46.348
STEP: updating configuration when only custom-http-error value changes - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:72 @ 04/04/23 18:21:46.349
STEP: ignoring duplicate values (503 in this case) per server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:90 @ 04/04/23 18:21:50.55
STEP: using the custom default-backend from annotation for upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:102 @ 04/04/23 18:22:00.715
< Exit [It] configures Nginx correctly - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:41 @ 04/04/23 18:22:08.9 (32.784s)
> Enter [AfterEach] [Annotations] custom-http-errors - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:08.9
< Exit [AfterEach] [Annotations] custom-http-errors - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:09.112 (212ms)
+
+
+ > Enter [BeforeEach] [Annotations] connection-proxy-header - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:09.112
< Exit [BeforeEach] [Annotations] connection-proxy-header - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:17.003 (7.891s)
> Enter [BeforeEach] [Annotations] connection-proxy-header - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/connection.go:32 @ 04/04/23 18:22:17.003
< Exit [BeforeEach] [Annotations] connection-proxy-header - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/connection.go:32 @ 04/04/23 18:22:21.032 (4.029s)
> Enter [It] set connection header to keep-alive - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/connection.go:36 @ 04/04/23 18:22:21.032
< Exit [It] set connection header to keep-alive - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/connection.go:36 @ 04/04/23 18:22:31.159 (10.126s)
> Enter [AfterEach] [Annotations] connection-proxy-header - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:31.159
< Exit [AfterEach] [Annotations] connection-proxy-header - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:31.365 (206ms)
+
+
+ > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:31.366
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:38.253 (6.887s)
> Enter [It] should return 200 for service type=ExternalName using FQDN with trailing dot - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:217 @ 04/04/23 18:22:38.253
< Exit [It] should return 200 for service type=ExternalName using FQDN with trailing dot - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:217 @ 04/04/23 18:22:48.533 (10.28s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:48.533
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:48.75 (218ms)
+
+
+ > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:48.751
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:55.631 (6.88s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:22:55.631
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:22:59.653 (4.022s)
> Enter [BeforeEach] should configure TLS protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:47 @ 04/04/23 18:22:59.653
< Exit [BeforeEach] should configure TLS protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:47 @ 04/04/23 18:23:08.743 (9.09s)
> Enter [It] setting cipher suite - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:65 @ 04/04/23 18:23:08.743
< Exit [It] setting cipher suite - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:65 @ 04/04/23 18:23:18.9 (10.157s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:18.9
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:19.087 (187ms)
+
+
+ > Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:19.087
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:27.019 (7.931s)
> Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:23:27.019
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:23:31.042 (4.023s)
> Enter [It] should not set client_body_buffer_size to invalid 1b - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:145 @ 04/04/23 18:23:31.042
< Exit [It] should not set client_body_buffer_size to invalid 1b - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:145 @ 04/04/23 18:23:41.252 (10.21s)
> Enter [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:41.252
< Exit [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:41.433 (181ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:41.433
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:48.317 (6.884s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:23:48.317
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:23:52.34 (4.023s)
> Enter [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:383 @ 04/04/23 18:23:52.34
< Exit [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:383 @ 04/04/23 18:24:11.665 (19.325s)
> Enter [It] user with annotated ingress retains cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:433 @ 04/04/23 18:24:11.665
< Exit [It] user with annotated ingress retains cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:433 @ 04/04/23 18:24:16.916 (5.251s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:16.916
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:17.295 (379ms)
+
+
+ > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:17.296
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:24.725 (7.429s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:24:24.725
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:24:28.761 (4.036s)
> Enter [It] should accept both Ingresses with default IngressClassName and IngressClass annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:132 @ 04/04/23 18:24:28.761
< Exit [It] should accept both Ingresses with default IngressClassName and IngressClass annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:132 @ 04/04/23 18:24:45.952 (17.19s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:45.952
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:46.145 (194ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:46.146
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:54.048 (7.903s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:24:54.048
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:24:58.076 (4.028s)
> Enter [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 04/04/23 18:24:58.076
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 04/04/23 18:25:03.11
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 04/04/23 18:25:13.321
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 04/04/23 18:25:23.483
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 04/04/23 18:25:33.694
< Exit [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 04/04/23 18:25:48.897 (50.821s)
> Enter [It] should redirect to signin url when not signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:849 @ 04/04/23 18:25:48.897
< Exit [It] should redirect to signin url when not signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:849 @ 04/04/23 18:25:48.908 (11ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:48.908
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:49.135 (227ms)
+
+
+ > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:49.135
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:56.988 (7.853s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:25:56.988
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:26:08.04 (11.052s)
> Enter [It] should enable the log-format-escape-none - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:63 @ 04/04/23 18:26:08.04
< Exit [It] should enable the log-format-escape-none - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:63 @ 04/04/23 18:26:18.223 (10.184s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:18.223
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:18.414 (191ms)
+
+
+ > Enter [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:18.415
< Exit [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:25.316 (6.901s)
> Enter [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:31 @ 04/04/23 18:26:25.316
< Exit [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:31 @ 04/04/23 18:26:29.352 (4.036s)
> Enter [It] disable-access-log set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:35 @ 04/04/23 18:26:29.352
< Exit [It] disable-access-log set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:35 @ 04/04/23 18:26:46.584 (17.231s)
> Enter [AfterEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:46.584
< Exit [AfterEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:46.805 (221ms)
+
+
+ > Enter [BeforeEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:46.805
< Exit [BeforeEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:53.714 (6.909s)
> Enter [It] should return 503 when backend service does not exist - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_backend.go:36 @ 04/04/23 18:26:53.714
< Exit [It] should return 503 when backend service does not exist - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_backend.go:36 @ 04/04/23 18:27:03.859 (10.145s)
> Enter [AfterEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:03.859
< Exit [AfterEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:04.058 (199ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:04.058
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:22.496 (2m18.438s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:29:22.496
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:29:26.527 (4.032s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:29:26.527
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:29:40.697 (14.169s)
> Enter [It] should not create additional upstream block when host part of auth-url contains a variable - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:570 @ 04/04/23 18:29:40.697
< Exit [It] should not create additional upstream block when host part of auth-url contains a variable - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:570 @ 04/04/23 18:30:03.916 (23.219s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:03.916
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:04.131 (215ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:04.131
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:12.003 (7.871s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:30:12.003
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:30:16.028 (4.025s)
> Enter [It] should return 403 using auth-tls-match-cn with no matching CN from client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:266 @ 04/04/23 18:30:16.028
< Exit [It] should return 403 using auth-tls-match-cn with no matching CN from client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:266 @ 04/04/23 18:30:26.487 (10.459s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:26.487
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:26.704 (217ms)
+
+
+ > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:26.704
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:33.592 (6.888s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:30:33.592
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:30:44.636 (11.044s)
> Enter [It] should set variables-hash-max-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:88 @ 04/04/23 18:30:44.636
< Exit [It] should set variables-hash-max-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:88 @ 04/04/23 18:30:54.792 (10.156s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:54.792
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:54.971 (179ms)
+
+
+ > Enter [BeforeEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:98 @ 04/04/23 18:30:54.971
< Exit [BeforeEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:98 @ 04/04/23 18:30:56.98 (2.008s)
> Enter [It] fails when using alias directive - /go/src/k8s.io/ingress-nginx/test/e2e/nginx/nginx.go:115 @ 04/04/23 18:30:56.98
< Exit [It] fails when using alias directive - /go/src/k8s.io/ingress-nginx/test/e2e/nginx/nginx.go:115 @ 04/04/23 18:31:57.006 (1m0.027s)
> Enter [AfterEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:99 @ 04/04/23 18:31:57.006
< Exit [AfterEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:99 @ 04/04/23 18:31:57.009 (3ms)
+
+
+ > Enter [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:57.009
< Exit [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:03.889 (6.88s)
> Enter [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:37 @ 04/04/23 18:32:03.889
< Exit [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:37 @ 04/04/23 18:32:07.917 (4.028s)
> Enter [It] should add value of stream-snippet to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:41 @ 04/04/23 18:32:07.917
< Exit [It] should add value of stream-snippet to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:41 @ 04/04/23 18:32:23.139 (15.222s)
> Enter [AfterEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:23.139
< Exit [AfterEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:23.334 (195ms)
+
+
+ > Enter [BeforeEach] [Annotations] force-ssl-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:23.334
< Exit [BeforeEach] [Annotations] force-ssl-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:30.222 (6.888s)
> Enter [BeforeEach] [Annotations] force-ssl-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/forcesslredirect.go:30 @ 04/04/23 18:32:30.222
< Exit [BeforeEach] [Annotations] force-ssl-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/forcesslredirect.go:30 @ 04/04/23 18:32:34.249 (4.027s)
> Enter [It] should redirect to https - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/forcesslredirect.go:34 @ 04/04/23 18:32:34.249
< Exit [It] should redirect to https - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/forcesslredirect.go:34 @ 04/04/23 18:32:41.274 (7.025s)
> Enter [AfterEach] [Annotations] force-ssl-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:41.274
< Exit [AfterEach] [Annotations] force-ssl-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:41.496 (222ms)
+
+
+ > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:41.497
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:48.376 (6.879s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:32:48.376
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:32:52.403 (4.027s)
> Enter [BeforeEach] With specific ingress-class flags - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:392 @ 04/04/23 18:32:52.403
< Exit [BeforeEach] With specific ingress-class flags - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:392 @ 04/04/23 18:33:00.451 (8.048s)
> Enter [It] should ignore Ingress with no class and accept the correctly configured Ingresses - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:413 @ 04/04/23 18:33:00.451
< Exit [It] should ignore Ingress with no class and accept the correctly configured Ingresses - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:413 @ 04/04/23 18:33:24.697 (24.246s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:24.697
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:24.873 (176ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:24.873
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:32.238 (7.364s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:33:32.238
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:33:42.291 (10.053s)
> Enter [It] should route requests only to canary if canary weight is 100 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:743 @ 04/04/23 18:33:42.291
< Exit [It] should route requests only to canary if canary weight is 100 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:743 @ 04/04/23 18:33:59.526 (17.235s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:59.526
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:59.709 (183ms)
+
+
+ > Enter [BeforeEach] plugins - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:59.71
< Exit [BeforeEach] plugins - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:06.602 (6.893s)
> Enter [BeforeEach] plugins - /go/src/k8s.io/ingress-nginx/test/e2e/settings/plugins.go:31 @ 04/04/23 18:34:06.602
< Exit [BeforeEach] plugins - /go/src/k8s.io/ingress-nginx/test/e2e/settings/plugins.go:31 @ 04/04/23 18:34:10.627 (4.025s)
> Enter [It] should exist a x-hello-world header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/plugins.go:35 @ 04/04/23 18:34:10.627
< Exit [It] should exist a x-hello-world header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/plugins.go:35 @ 04/04/23 18:34:27.807 (17.179s)
> Enter [AfterEach] plugins - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:27.807
< Exit [AfterEach] plugins - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:28.007 (200ms)
+
+
+ > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:28.007
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:35.896 (7.889s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:34:35.896
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:34:39.916 (4.02s)
> Enter [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 04/04/23 18:34:39.916
STEP: configuring certificate_by_lua and skipping Nginx configuration of the new certificate - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:128 @ 04/04/23 18:34:57.039
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:136 @ 04/04/23 18:35:05.187
< Exit [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 04/04/23 18:35:05.197 (25.281s)
> Enter [It] falls back to using default certificate when secret gets deleted without reloading - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:185 @ 04/04/23 18:35:05.197
STEP: serving the default certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:204 @ 04/04/23 18:35:10.227
STEP: skipping Nginx reload - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:214 @ 04/04/23 18:35:10.293
< Exit [It] falls back to using default certificate when secret gets deleted without reloading - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:185 @ 04/04/23 18:35:10.293 (5.095s)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:10.293
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:10.501 (209ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:10.502
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:17.387 (6.885s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:35:17.387
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:35:21.413 (4.026s)
> Enter [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:383 @ 04/04/23 18:35:21.413
< Exit [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:383 @ 04/04/23 18:35:42.607 (21.195s)
> Enter [It] user retains cookie by default - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:411 @ 04/04/23 18:35:42.607
< Exit [It] user retains cookie by default - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:411 @ 04/04/23 18:35:42.616 (9ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:42.616
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:42.832 (216ms)
+
+
+ > Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:42.832
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:49.737 (6.905s)
> Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 04/04/23 18:35:49.737
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 04/04/23 18:35:54.76 (5.023s)
> Enter [It] should use fastcgi_pass in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:37 @ 04/04/23 18:35:54.76
< Exit [It] should use fastcgi_pass in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:37 @ 04/04/23 18:36:04.978 (10.218s)
> Enter [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:04.978
< Exit [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:05.161 (183ms)
+
+
+ > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:05.162
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:13.068 (7.906s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:36:13.068
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:36:17.096 (4.027s)
> Enter [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 04/04/23 18:36:17.096
STEP: configuring certificate_by_lua and skipping Nginx configuration of the new certificate - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:128 @ 04/04/23 18:36:34.288
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:136 @ 04/04/23 18:36:42.473
< Exit [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 04/04/23 18:36:42.5 (25.405s)
> Enter [It] picks up the updated certificate without reloading - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:149 @ 04/04/23 18:36:42.5
STEP: configuring certificate_by_lua and skipping Nginx configuration of the new certificate - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:163 @ 04/04/23 18:36:47.607
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:169 @ 04/04/23 18:36:50.731
STEP: skipping Nginx reload - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:180 @ 04/04/23 18:36:53.763
< Exit [It] picks up the updated certificate without reloading - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:149 @ 04/04/23 18:36:53.763 (11.263s)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:53.763
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:53.98 (217ms)
+
+
+ > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:53.981
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:00.852 (6.872s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:37:00.852
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:37:13.899 (13.046s)
> Enter [It] log-format default escape - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:105 @ 04/04/23 18:37:13.899
< Exit [It] log-format default escape - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:105 @ 04/04/23 18:37:27.067 (13.169s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:27.067
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:27.254 (186ms)
+
+
+ > Enter [BeforeEach] brotli - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:27.254
< Exit [BeforeEach] brotli - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:35.134 (7.88s)
> Enter [BeforeEach] brotli - /go/src/k8s.io/ingress-nginx/test/e2e/settings/brotli.go:35 @ 04/04/23 18:37:35.134
< Exit [BeforeEach] brotli - /go/src/k8s.io/ingress-nginx/test/e2e/settings/brotli.go:35 @ 04/04/23 18:37:39.153 (4.019s)
> Enter [It] should only compress responses that meet the `brotli-min-length` condition - /go/src/k8s.io/ingress-nginx/test/e2e/settings/brotli.go:39 @ 04/04/23 18:37:39.153
< Exit [It] should only compress responses that meet the `brotli-min-length` condition - /go/src/k8s.io/ingress-nginx/test/e2e/settings/brotli.go:39 @ 04/04/23 18:38:10.344 (31.191s)
> Enter [AfterEach] brotli - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:10.344
< Exit [AfterEach] brotli - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:10.535 (191ms)
+
+
+ > Enter [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:10.535
< Exit [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:17.414 (6.879s)
> Enter [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:31 @ 04/04/23 18:38:17.414
< Exit [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:31 @ 04/04/23 18:38:21.437 (4.023s)
> Enter [It] disable-http-access-log set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:53 @ 04/04/23 18:38:21.437
< Exit [It] disable-http-access-log set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:53 @ 04/04/23 18:38:38.614 (17.177s)
> Enter [AfterEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:38.614
< Exit [AfterEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:38.835 (221ms)
+
+
+ > Enter [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:38.836
< Exit [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:45.698 (6.862s)
> Enter [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:30 @ 04/04/23 18:38:45.698
< Exit [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:30 @ 04/04/23 18:38:49.734 (4.036s)
> Enter [It] set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:34 @ 04/04/23 18:38:49.734
< Exit [It] set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:34 @ 04/04/23 18:38:59.959 (10.225s)
> Enter [AfterEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:59.959
< Exit [AfterEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:00.179 (220ms)
+
+
+
+ > Enter [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:00.179
< Exit [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:08.619 (8.44s)
> Enter [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:42 @ 04/04/23 18:39:08.619
< Exit [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:42 @ 04/04/23 18:39:12.644 (4.025s)
> Enter [It] should only allow requests from specific countries - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:70 @ 04/04/23 18:39:12.644
[SKIPPED] GeoIP test are temporarily disabled
In [It] at: /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:71 @ 04/04/23 18:39:12.645
< Exit [It] should only allow requests from specific countries - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:70 @ 04/04/23 18:39:12.645 (1ms)
> Enter [AfterEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:12.645
< Exit [AfterEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:12.862 (217ms)
+
+
+ > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:12.863
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:19.76 (6.897s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:39:19.76
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:39:23.829 (4.069s)
> Enter [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 04/04/23 18:39:23.829
< Exit [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 04/04/23 18:39:33.03 (9.2s)
> Enter [It] setting includeSubDomains parameter - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:127 @ 04/04/23 18:39:33.03
< Exit [It] setting includeSubDomains parameter - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:127 @ 04/04/23 18:39:43.259 (10.229s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:43.259
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:43.444 (186ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:43.445
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:50.328 (6.883s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:39:50.328
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:39:58.361 (8.034s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:39:58.361
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 04/04/23 18:39:58.361
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 04/04/23 18:40:08.534
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 04/04/23 18:40:18.725
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:40:28.928 (30.567s)
> Enter [It] should add auth headers when global-auth-response-headers is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:223 @ 04/04/23 18:40:28.928
STEP: Adding a global-auth-response-headers to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:228 @ 04/04/23 18:40:28.928
< Exit [It] should add auth headers when global-auth-response-headers is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:223 @ 04/04/23 18:40:39.119 (10.19s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:39.119
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:39.335 (216ms)
+
+
+ > Enter [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:39.335
< Exit [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:46.231 (6.896s)
> Enter [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:32 @ 04/04/23 18:40:46.231
< Exit [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:32 @ 04/04/23 18:40:48.266 (2.035s)
> Enter [It] should not set invalid proxy read timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:52 @ 04/04/23 18:40:48.266
< Exit [It] should not set invalid proxy read timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:52 @ 04/04/23 18:41:05.463 (17.198s)
> Enter [AfterEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:41:05.463
< Exit [AfterEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:41:05.678 (215ms)
+
+
+ > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:41:24.95
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:41:57.132 (32.182s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 18:41:57.132
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 18:42:05.196 (8.064s)
> Enter [It] should not return an error if the Ingress V1 definition is valid with IngressClass annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:180 @ 04/04/23 18:42:05.196
< Exit [It] should not return an error if the Ingress V1 definition is valid with IngressClass annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:180 @ 04/04/23 18:42:08.558 (3.362s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:42:08.558
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:42:08.881 (323ms)
+
+
+ > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:42:08.881
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:42:27.269 (18.388s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 18:42:27.269
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 18:42:35.33 (8.061s)
> Enter [It] should return an error if the Ingress V1 definition contains invalid annotations - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:196 @ 04/04/23 18:42:35.33
< Exit [It] should return an error if the Ingress V1 definition contains invalid annotations - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:196 @ 04/04/23 18:42:35.482 (152ms)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:42:35.482
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:42:35.681 (199ms)
+
+
+ > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:42:35.681
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:42:54.33 (18.649s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 18:42:54.33
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 21:18:55.121 (10.056s)
> Enter [It] should not allow overlaps of host and paths without canary annotations - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:70 @ 04/04/23 21:18:55.121
< Exit [It] should not allow overlaps of host and paths without canary annotations - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:70 @ 04/04/23 21:18:58.366 (3.245s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 21:18:58.367
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 21:18:58.612 (246ms)
+
+
+ > Enter [BeforeEach] [TopologyHints] topology aware routing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 21:18:58.613
< Exit [BeforeEach] [TopologyHints] topology aware routing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 21:19:05.487 (6.875s)
> Enter [BeforeEach] [TopologyHints] topology aware routing - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/topology.go:39 @ 04/04/23 21:19:05.487
< Exit [BeforeEach] [TopologyHints] topology aware routing - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/topology.go:39 @ 04/04/23 21:19:09.523 (4.036s)
> Enter [It] should return 200 when service has topology hints - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/topology.go:43 @ 04/04/23 21:19:09.523
STEP: checking if the service is reached - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/topology.go:53 @ 04/04/23 21:19:19.701
< Exit [It] should return 200 when service has topology hints - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/topology.go:43 @ 04/04/23 21:19:19.839 (10.316s)
> Enter [AfterEach] [TopologyHints] topology aware routing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 21:19:19.839
< Exit [AfterEach] [TopologyHints] topology aware routing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 21:19:20.061 (222ms)
+
+
+ > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 21:19:20.061
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:17:57.17 (30.737s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:17:57.17
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:18:05.234 (8.065s)
> Enter [It] should block ingress with invalid path - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:108 @ 04/04/23 22:18:05.234
< Exit [It] should block ingress with invalid path - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:108 @ 04/04/23 22:18:08.53 (3.296s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:18:08.53
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:18:08.765 (235ms)
+
+
+ > Enter [BeforeEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:18:08.766
< Exit [BeforeEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:18:22.642 (13.877s)
> Enter [BeforeEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/settings/namespace_selector.go:51 @ 04/04/23 22:18:22.642
< Exit [BeforeEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/settings/namespace_selector.go:51 @ 04/04/23 22:18:48.76 (26.118s)
> Enter [It] should ingore Ingress of namespace without label foo=bar and accept those of namespace with label foo=bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/namespace_selector.go:63 @ 04/04/23 22:18:48.76
< Exit [It] should ingore Ingress of namespace without label foo=bar and accept those of namespace with label foo=bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/namespace_selector.go:63 @ 04/04/23 22:18:55.044 (6.284s)
> Enter [AfterEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:18:55.044
< Exit [AfterEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:18:55.29 (246ms)
> Enter [AfterEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/settings/namespace_selector.go:56 @ 04/04/23 22:18:55.29
< Exit [AfterEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/settings/namespace_selector.go:56 @ 04/04/23 22:18:55.293 (3ms)
+
+
+ > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:18:55.294
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:19:12.977 (17.683s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:19:12.977
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:19:21.048 (8.072s)
> Enter [It] should not return an error for an invalid Ingress when it has unknown class - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:207 @ 04/04/23 22:19:21.048
< Exit [It] should not return an error for an invalid Ingress when it has unknown class - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:207 @ 04/04/23 22:19:21.18 (132ms)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:19:21.18
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:19:21.377 (197ms)
+
+
+ > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:19:21.377
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:19:52.511 (31.134s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:19:52.511
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:20:00.575 (8.064s)
> Enter [It] reject ingress with global-rate-limit annotations when memcached is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:43 @ 04/04/23 22:20:00.575
STEP: rejects ingress when memcached is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:52 @ 04/04/23 22:20:00.575
STEP: accepts ingress when memcached is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:57 @ 04/04/23 22:20:00.587
< Exit [It] reject ingress with global-rate-limit annotations when memcached is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:43 @ 04/04/23 22:20:10.885 (10.31s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:20:10.885
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:20:11.143 (257ms)
+
+
+ > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:20:11.143
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:20:29.584 (18.441s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:20:29.584
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:20:37.66 (8.076s)
> Enter [It] should return an error if there is an invalid value in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:136 @ 04/04/23 22:20:37.66
< Exit [It] should return an error if there is an invalid value in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:136 @ 04/04/23 22:20:44.7 (7.04s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:20:44.7
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:20:44.899 (199ms)
+
+
+ > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:20:44.899
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:21:03.976 (19.078s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:21:03.976
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:21:12.046 (8.07s)
> Enter [It] should return an error if there is a forbidden value in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:150 @ 04/04/23 22:21:12.046
< Exit [It] should return an error if there is a forbidden value in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:150 @ 04/04/23 22:21:19.079 (7.033s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:21:19.079
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:21:19.337 (258ms)
+
+
+ > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:21:19.337
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:21:37.731 (18.394s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:21:37.731
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:21:45.791 (8.06s)
> Enter [It] should return an error if there is an error validating the ingress definition - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:125 @ 04/04/23 22:21:45.791
< Exit [It] should return an error if there is an error validating the ingress definition - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:125 @ 04/04/23 22:21:45.852 (61ms)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:21:45.852
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:21:46.057 (205ms)
+
+
+ > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:21:46.057
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:22:04.907 (18.85s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:22:04.907
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:22:12.968 (8.061s)
> Enter [It] should not return an error if the Ingress V1 definition is valid with Ingress Class - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:164 @ 04/04/23 22:22:12.968
< Exit [It] should not return an error if the Ingress V1 definition is valid with Ingress Class - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:164 @ 04/04/23 22:22:18.358 (5.39s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:22:18.358
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:22:18.592 (234ms)
+
+
+ > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:22:18.592
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:22:47.015 (28.422s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:22:47.015
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:22:55.073 (8.059s)
> Enter [It] should allow overlaps of host and paths with canary annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:87 @ 04/04/23 22:22:55.073
< Exit [It] should allow overlaps of host and paths with canary annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:87 @ 04/04/23 22:22:58.439 (3.366s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:22:58.439
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:22:58.64 (201ms)
+
+
+ > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:19.251
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:26.76 (7.509s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:04:26.76
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:04:38.808 (12.048s)
> Enter [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 04/04/23 18:04:38.808
STEP: configuring certificate_by_lua and skipping Nginx configuration of the new certificate - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:128 @ 04/04/23 18:04:55.931
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:136 @ 04/04/23 18:05:04.12
< Exit [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 04/04/23 18:05:04.15 (25.342s)
> Enter [It] supports requests with domain with trailing dot - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:145 @ 04/04/23 18:05:04.15
< Exit [It] supports requests with domain with trailing dot - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:145 @ 04/04/23 18:05:04.174 (24ms)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:04.174
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:04.407 (234ms)
+
+
+ > Enter [BeforeEach] [Annotations] preserve-trailing-slash - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:04.408
< Exit [BeforeEach] [Annotations] preserve-trailing-slash - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:11.385 (6.978s)
> Enter [BeforeEach] [Annotations] preserve-trailing-slash - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/preservetrailingslash.go:30 @ 04/04/23 18:05:11.385
< Exit [BeforeEach] [Annotations] preserve-trailing-slash - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/preservetrailingslash.go:30 @ 04/04/23 18:05:15.42 (4.034s)
> Enter [It] should allow preservation of trailing slashes - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/preservetrailingslash.go:34 @ 04/04/23 18:05:15.42
< Exit [It] should allow preservation of trailing slashes - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/preservetrailingslash.go:34 @ 04/04/23 18:05:22.428 (7.008s)
> Enter [AfterEach] [Annotations] preserve-trailing-slash - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:22.428
< Exit [AfterEach] [Annotations] preserve-trailing-slash - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:22.626 (198ms)
+
+
+ > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:22.626
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:29.568 (6.942s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:05:29.568
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:05:33.606 (4.037s)
> Enter [It] should set valid proxy timeouts - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:115 @ 04/04/23 18:05:33.606
< Exit [It] should set valid proxy timeouts - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:115 @ 04/04/23 18:05:43.732 (10.127s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:43.732
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:43.917 (184ms)
+
+
+ > Enter [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:43.917
< Exit [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:51.802 (7.885s)
> Enter [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:32 @ 04/04/23 18:05:51.802
< Exit [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:32 @ 04/04/23 18:05:55.831 (4.029s)
> Enter [It] should exist a proxy_host using the upstream-vhost annotation value - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:57 @ 04/04/23 18:05:55.831
< Exit [It] should exist a proxy_host using the upstream-vhost annotation value - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:57 @ 04/04/23 18:06:05.978 (10.147s)
> Enter [AfterEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:05.978
< Exit [AfterEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:06.188 (210ms)
+
+
+ > Enter [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:06.189
< Exit [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:14.133 (7.945s)
> Enter [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:34 @ 04/04/23 18:06:14.133
< Exit [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:34 @ 04/04/23 18:06:18.165 (4.031s)
> Enter [It] should not exists Server header in the response - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:38 @ 04/04/23 18:06:18.165
< Exit [It] should not exists Server header in the response - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:38 @ 04/04/23 18:06:35.378 (17.213s)
> Enter [AfterEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:35.378
< Exit [AfterEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:35.637 (259ms)
+
+
+ > Enter [BeforeEach] [Setting] Configmap - limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:35.637
< Exit [BeforeEach] [Setting] Configmap - limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:42.521 (6.884s)
> Enter [BeforeEach] [Setting] Configmap - limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/settings/limit_rate.go:32 @ 04/04/23 18:06:42.521
< Exit [BeforeEach] [Setting] Configmap - limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/settings/limit_rate.go:32 @ 04/04/23 18:06:46.54 (4.019s)
> Enter [It] Check limit-rate config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/limit_rate.go:36 @ 04/04/23 18:06:46.54
< Exit [It] Check limit-rate config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/limit_rate.go:36 @ 04/04/23 18:07:17.039 (30.499s)
> Enter [AfterEach] [Setting] Configmap - limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:17.039
< Exit [AfterEach] [Setting] Configmap - limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:17.22 (180ms)
+
+
+ > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:17.22
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:24.225 (7.005s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:07:24.225
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:07:26.256 (2.031s)
> Enter [It] does not set the path to / on the generated cookie if there's more than one rule referring to the same backend - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:121 @ 04/04/23 18:07:26.256
< Exit [It] does not set the path to / on the generated cookie if there's more than one rule referring to the same backend - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:121 @ 04/04/23 18:07:36.45 (10.194s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:36.45
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:36.633 (183ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:36.633
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:43.537 (6.903s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:07:43.537
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:07:51.596 (8.059s)
> Enter [It] should response with a 200 status from the mainline upstream when requests are made to the mainline ingress - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:48 @ 04/04/23 18:07:51.596
< Exit [It] should response with a 200 status from the mainline upstream when requests are made to the mainline ingress - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:48 @ 04/04/23 18:08:08.813 (17.217s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:08.813
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:09.063 (249ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:09.063
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:16.959 (7.896s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:08:16.959
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:08:25.017 (8.058s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:08:25.017
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 04/04/23 18:08:25.017
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 04/04/23 18:08:35.191
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 04/04/23 18:08:45.372
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:08:55.507 (30.491s)
> Enter [It] should still return status code 200 after auth backend is deleted using cache - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:155 @ 04/04/23 18:08:55.507
STEP: Adding a global-auth-cache-key to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:163 @ 04/04/23 18:08:55.507
< Exit [It] should still return status code 200 after auth backend is deleted using cache - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:155 @ 04/04/23 18:09:12.69 (17.183s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:12.69
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:12.914 (224ms)
+
+
+ > Enter [BeforeEach] [Ingress] DeepInspection - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:12.915
< Exit [BeforeEach] [Ingress] DeepInspection - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:19.799 (6.884s)
> Enter [BeforeEach] [Ingress] DeepInspection - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/deep_inspection.go:30 @ 04/04/23 18:09:19.799
< Exit [BeforeEach] [Ingress] DeepInspection - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/deep_inspection.go:30 @ 04/04/23 18:09:23.825 (4.026s)
> Enter [It] should drop whole ingress if one path matches invalid regex - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/deep_inspection.go:34 @ 04/04/23 18:09:23.825
< Exit [It] should drop whole ingress if one path matches invalid regex - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/deep_inspection.go:34 @ 04/04/23 18:09:41.065 (17.24s)
> Enter [AfterEach] [Ingress] DeepInspection - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:41.065
< Exit [AfterEach] [Ingress] DeepInspection - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:41.299 (233ms)
+
+
+ > Enter [BeforeEach] [Setting] [Lua] lua-shared-dicts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:41.299
< Exit [BeforeEach] [Setting] [Lua] lua-shared-dicts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:49.196 (7.896s)
> Enter [It] configures lua shared dicts - /go/src/k8s.io/ingress-nginx/test/e2e/settings/lua_shared_dicts.go:29 @ 04/04/23 18:09:49.196
< Exit [It] configures lua shared dicts - /go/src/k8s.io/ingress-nginx/test/e2e/settings/lua_shared_dicts.go:29 @ 04/04/23 18:10:01.416 (12.22s)
> Enter [AfterEach] [Setting] [Lua] lua-shared-dicts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:01.416
< Exit [AfterEach] [Setting] [Lua] lua-shared-dicts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:01.602 (187ms)
+
+
+ > Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:01.603
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:08.48 (6.877s)
> Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 04/04/23 18:10:08.48
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 04/04/23 18:10:12.502 (4.022s)
> Enter [It] should use correct longest path match - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:66 @ 04/04/23 18:10:12.502
STEP: creating a regular ingress definition - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:69 @ 04/04/23 18:10:12.502
STEP: making a request to the non-rewritten location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:78 @ 04/04/23 18:10:22.752
STEP: creating an ingress definition with the rewrite-target annotation set on the "/" location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:88 @ 04/04/23 18:10:22.759
STEP: making a second request to the non-rewritten location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:102 @ 04/04/23 18:10:32.852
< Exit [It] should use correct longest path match - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:66 @ 04/04/23 18:10:32.86 (20.358s)
> Enter [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:32.86
< Exit [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:33.04 (180ms)
+
+
+ > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:33.04
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:40.925 (7.885s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:10:40.925
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:10:44.945 (4.02s)
> Enter [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 04/04/23 18:10:44.945
Apr 4 18:10:54.109: INFO: Unexpected TLS error: tls: failed to verify certificate: x509: certificate is valid for ingress.local, not settings-tls
< Exit [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 04/04/23 18:10:56.109 (11.164s)
> Enter [It] setting max-age parameter - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:111 @ 04/04/23 18:10:56.109
< Exit [It] setting max-age parameter - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:111 @ 04/04/23 18:11:06.315 (10.206s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:06.315
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:06.527 (212ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:06.528
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:13.431 (6.904s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:11:13.431
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:11:21.479 (8.048s)
> Enter [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:301 @ 04/04/23 18:11:21.479
< Exit [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:301 @ 04/04/23 18:11:49.732 (28.253s)
> Enter [It] user with global-auth-always-set-cookie key in configmap retains cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:348 @ 04/04/23 18:11:49.732
< Exit [It] user with global-auth-always-set-cookie key in configmap retains cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:348 @ 04/04/23 18:11:56.743 (7.011s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:56.743
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:56.926 (183ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:56.926
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:03.815 (6.889s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:12:03.815
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:12:11.862 (8.047s)
> Enter [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:301 @ 04/04/23 18:12:11.862
< Exit [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:301 @ 04/04/23 18:12:40.103 (28.241s)
> Enter [It] user retains cookie by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:326 @ 04/04/23 18:12:40.103
< Exit [It] user retains cookie by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:326 @ 04/04/23 18:12:40.112 (9ms)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:40.112
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:40.334 (222ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:40.335
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:47.184 (6.849s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:12:47.184
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:12:51.214 (4.031s)
> Enter [It] should not allow - portless origin with wildcard origin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:515 @ 04/04/23 18:12:51.214
< Exit [It] should not allow - portless origin with wildcard origin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:515 @ 04/04/23 18:12:58.232 (7.018s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:58.232
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:58.436 (203ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:58.436
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:05.332 (6.896s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:13:05.332
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:13:09.361 (4.029s)
> Enter [It] should return status code 200 when authentication is configured with a map and Authorization header is sent - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:199 @ 04/04/23 18:13:09.361
< Exit [It] should return status code 200 when authentication is configured with a map and Authorization header is sent - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:199 @ 04/04/23 18:13:21.468 (12.107s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:21.468
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:21.639 (171ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:21.639
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:29.514 (7.875s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:13:29.514
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:13:33.537 (4.023s)
> Enter [It] should pass URL-encoded certificate to upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:161 @ 04/04/23 18:13:33.537
< Exit [It] should pass URL-encoded certificate to upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:161 @ 04/04/23 18:13:47.331 (13.794s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:47.331
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:47.532 (202ms)
+
+
+ > Enter [BeforeEach] [Default Backend] custom service - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:47.533
< Exit [BeforeEach] [Default Backend] custom service - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:54.43 (6.897s)
> Enter [It] uses custom default backend that returns 200 as status code - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/custom_default_backend.go:36 @ 04/04/23 18:13:54.43
< Exit [It] uses custom default backend that returns 200 as status code - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/custom_default_backend.go:36 @ 04/04/23 18:14:10.603 (16.173s)
> Enter [AfterEach] [Default Backend] custom service - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:10.603
< Exit [AfterEach] [Default Backend] custom service - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:10.797 (195ms)
+
+
+ > Enter [BeforeEach] [Annotations] whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:10.798
< Exit [BeforeEach] [Annotations] whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:17.742 (6.944s)
> Enter [BeforeEach] [Annotations] whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipwhitelist.go:30 @ 04/04/23 18:14:17.742
< Exit [BeforeEach] [Annotations] whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipwhitelist.go:30 @ 04/04/23 18:14:21.766 (4.024s)
> Enter [It] should set valid ip whitelist range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipwhitelist.go:34 @ 04/04/23 18:14:21.766
< Exit [It] should set valid ip whitelist range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipwhitelist.go:34 @ 04/04/23 18:14:31.914 (10.148s)
> Enter [AfterEach] [Annotations] whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:31.914
< Exit [AfterEach] [Annotations] whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:32.125 (211ms)
+
+
+ > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:32.125
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:40.045 (7.92s)
> Enter [It] should return 200 for service type=ExternalName using a port name - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:184 @ 04/04/23 18:14:40.045
< Exit [It] should return 200 for service type=ExternalName using a port name - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:184 @ 04/04/23 18:14:50.345 (10.299s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:50.345
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:50.661 (317ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:50.662
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:57.86 (7.198s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:14:57.86
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:15:01.901 (4.041s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:15:01.901
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:15:16.075 (14.174s)
> Enter [It] should not create additional upstream block when auth-keepalive is not set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:552 @ 04/04/23 18:15:16.075
< Exit [It] should not create additional upstream block when auth-keepalive is not set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:552 @ 04/04/23 18:15:39.289 (23.214s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:39.289
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:39.523 (234ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:39.523
< Exit [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:46.413 (6.89s)
> Enter [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:43 @ 04/04/23 18:15:46.413
< Exit [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:43 @ 04/04/23 18:16:05.358 (18.945s)
> Enter [It] should return status code 401 when accessing '/' unauthentication - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:54 @ 04/04/23 18:16:05.358
< Exit [It] should return status code 401 when accessing '/' unauthentication - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:54 @ 04/04/23 18:16:08.518 (3.16s)
> Enter [AfterEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:08.518
< Exit [AfterEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:08.699 (180ms)
+
+
+ > Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:08.699
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:15.641 (6.942s)
> Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 04/04/23 18:16:15.641
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 04/04/23 18:16:26.725 (11.084s)
> Enter [It] should enable PROXY Protocol for HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:112 @ 04/04/23 18:16:26.725
< Exit [It] should enable PROXY Protocol for HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:112 @ 04/04/23 18:17:59.041 (1m32.316s)
> Enter [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:59.041
< Exit [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:59.27 (229ms)
+
+
+ > Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:59.27
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:07.156 (7.885s)
> Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 04/04/23 18:18:07.156
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 04/04/23 18:18:19.212 (12.057s)
> Enter [It] should ignore catch all Ingress with backend - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:50 @ 04/04/23 18:18:19.212
< Exit [It] should ignore catch all Ingress with backend - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:50 @ 04/04/23 18:18:39.618 (20.406s)
> Enter [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:39.618
< Exit [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:39.83 (212ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:39.831
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:46.716 (6.885s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:18:46.716
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:18:50.744 (4.028s)
> Enter [It] should allow headers for cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:137 @ 04/04/23 18:18:50.744
< Exit [It] should allow headers for cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:137 @ 04/04/23 18:19:00.902 (10.159s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:00.902
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:01.091 (189ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:01.092
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:09.007 (7.915s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:19:09.007
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:19:17.081 (8.074s)
> Enter [It] should return 404 status for requests to the canary if no matching ingress is found - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:80 @ 04/04/23 18:19:17.081
< Exit [It] should return 404 status for requests to the canary if no matching ingress is found - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:80 @ 04/04/23 18:19:24.105 (7.024s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:24.105
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:24.388 (283ms)
+
+
+ > Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:24.389
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:43.748 (2m19.359s)
> Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 04/04/23 18:21:43.748
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 04/04/23 18:21:57.954 (14.206s)
> Enter [It] handles endpoints only changes (down scaling of replicas) - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:87 @ 04/04/23 18:21:57.954
< Exit [It] handles endpoints only changes (down scaling of replicas) - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:87 @ 04/04/23 18:22:20.304 (22.351s)
> Enter [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:20.304
< Exit [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:20.502 (198ms)
+
+
+ > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:20.503
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:27.369 (6.866s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:22:27.369
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:22:31.399 (4.03s)
> Enter [It] should not set proxy client-max-body-size to incorrect value - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:100 @ 04/04/23 18:22:31.399
< Exit [It] should not set proxy client-max-body-size to incorrect value - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:100 @ 04/04/23 18:22:41.545 (10.146s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:41.545
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:41.748 (203ms)
+
+
+ > Enter [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:41.748
< Exit [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:58.304 (2m16.556s)
> Enter [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:32 @ 04/04/23 18:24:58.304
< Exit [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:32 @ 04/04/23 18:25:07.351 (9.047s)
> Enter [It] reuse port should be disabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:44 @ 04/04/23 18:25:07.351
< Exit [It] reuse port should be disabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:44 @ 04/04/23 18:25:17.463 (10.112s)
> Enter [AfterEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:17.463
< Exit [AfterEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:17.721 (257ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:17.721
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:36 (2m18.279s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:27:36
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:27:40.022 (4.023s)
> Enter [It] should set snippet "proxy_set_header My-Custom-Header 42;" when external auth is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:266 @ 04/04/23 18:27:40.022
< Exit [It] should set snippet "proxy_set_header My-Custom-Header 42;" when external auth is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:266 @ 04/04/23 18:27:50.223 (10.201s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:50.224
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:50.413 (190ms)
+
+
+ > Enter [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:50.414
< Exit [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:04.312 (13.898s)
> Enter [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:38 @ 04/04/23 18:28:04.312
< Exit [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:38 @ 04/04/23 18:28:11.43 (7.118s)
> Enter [It] should set the X-Forwarded-Port header to 443 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:100 @ 04/04/23 18:28:11.43
Apr 4 18:28:24.664: INFO: Unexpected TLS error: tls: failed to verify certificate: x509: certificate is valid for ingress.local, not forwarded-headers
< Exit [It] should set the X-Forwarded-Port header to 443 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:100 @ 04/04/23 18:28:29.799 (18.368s)
> Enter [AfterEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:29.799
< Exit [AfterEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:30.029 (230ms)
+
+
+ > Enter [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:30.03
< Exit [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:36.888 (6.859s)
> Enter [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:31 @ 04/04/23 18:28:36.888
< Exit [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:31 @ 04/04/23 18:28:40.919 (4.03s)
> Enter [It] set snippet "more_set_headers "Foo1: Bar1";" in all locations" - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:35 @ 04/04/23 18:28:40.919
< Exit [It] set snippet "more_set_headers "Foo1: Bar1";" in all locations" - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:35 @ 04/04/23 18:28:51.095 (10.176s)
> Enter [AfterEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:51.095
< Exit [AfterEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:51.273 (178ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:51.273
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:59.672 (8.399s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:28:59.672
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:29:07.713 (8.041s)
> Enter [It] should route requests to the correct upstream if the canary ingress is modified - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:307 @ 04/04/23 18:29:07.713
STEP: routing requests destined for the mainline ingress to the mainline upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:351 @ 04/04/23 18:29:32.166
STEP: routing requests destined for the canary ingress to the canary upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:360 @ 04/04/23 18:29:32.169
< Exit [It] should route requests to the correct upstream if the canary ingress is modified - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:307 @ 04/04/23 18:29:32.172 (24.459s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:32.172
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:32.356 (184ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:32.356
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:39.249 (6.892s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:29:39.249
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:29:43.271 (4.022s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:29:43.271
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:29:57.423 (14.152s)
> Enter [It] should not create additional upstream block when auth-keepalive is negative - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:590 @ 04/04/23 18:29:57.423
< Exit [It] should not create additional upstream block when auth-keepalive is negative - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:590 @ 04/04/23 18:30:20.684 (23.26s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:20.684
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:20.873 (189ms)
+
+
+ > Enter [BeforeEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:20.873
< Exit [BeforeEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:27.823 (6.95s)
> Enter [It] should create sync events - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_sync_events.go:53 @ 04/04/23 18:30:27.823
< Exit [It] should create sync events - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_sync_events.go:53 @ 04/04/23 18:30:49.071 (21.248s)
> Enter [AfterEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:49.071
< Exit [AfterEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:49.267 (196ms)
+
+
+ > Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:49.267
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:56.179 (6.912s)
> Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:30:56.179
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:31:00.207 (4.028s)
> Enter [It] should set client_body_buffer_size to 1K - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:57 @ 04/04/23 18:31:00.207
< Exit [It] should set client_body_buffer_size to 1K - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:57 @ 04/04/23 18:31:10.334 (10.127s)
> Enter [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:10.334
< Exit [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:10.562 (228ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:10.562
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:17.468 (6.905s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:31:17.468
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:31:21.488 (4.02s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:31:21.488
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:31:35.745 (14.257s)
> Enter [It] keeps processing new ingresses even if one of the existing ingresses is misconfigured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:505 @ 04/04/23 18:31:35.745
< Exit [It] keeps processing new ingresses even if one of the existing ingresses is misconfigured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:505 @ 04/04/23 18:31:46.949 (11.204s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:46.949
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:47.158 (209ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:47.158
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:55.054 (7.895s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:31:55.054
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:31:59.086 (4.032s)
> Enter [It] should allow origin for cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:110 @ 04/04/23 18:31:59.086
< Exit [It] should allow origin for cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:110 @ 04/04/23 18:32:06.117 (7.031s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:06.117
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:06.335 (217ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:06.335
< Exit [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:13.216 (6.881s)
> Enter [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:43 @ 04/04/23 18:32:13.216
< Exit [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:43 @ 04/04/23 18:32:30.126 (16.91s)
> Enter [It] should return status code 200 when accessing '/' authentication - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:68 @ 04/04/23 18:32:30.126
< Exit [It] should return status code 200 when accessing '/' authentication - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:68 @ 04/04/23 18:32:34.111 (3.985s)
> Enter [AfterEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:34.111
< Exit [AfterEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:34.285 (174ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:34.285
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:42.164 (7.878s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:32:42.164
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:32:46.19 (4.026s)
> Enter [It] should not allow - single origin without port and origin with required port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:405 @ 04/04/23 18:32:46.19
< Exit [It] should not allow - single origin without port and origin with required port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:405 @ 04/04/23 18:32:53.221 (7.031s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:53.221
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:53.428 (207ms)
+
+
+ > Enter [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:53.428
< Exit [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:00.295 (6.867s)
> Enter [It] should set gzip_min_length to 100 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:78 @ 04/04/23 18:33:00.295
< Exit [It] should set gzip_min_length to 100 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:78 @ 04/04/23 18:33:17.519 (17.224s)
> Enter [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:17.519
< Exit [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:17.698 (178ms)
+
+
+ > Enter [BeforeEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:17.698
< Exit [BeforeEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:24.578 (6.881s)
> Enter [It] should have worker_rlimit_nofile option and be independent on amount of worker processes - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_options.go:38 @ 04/04/23 18:33:24.578
< Exit [It] should have worker_rlimit_nofile option and be independent on amount of worker processes - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_options.go:38 @ 04/04/23 18:33:34.73 (10.152s)
> Enter [AfterEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:34.73
< Exit [AfterEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:34.905 (175ms)
+
+
+ > Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:34.906
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:44.808 (9.902s)
> Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:33:44.808
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:33:55.842 (11.034s)
> Enter [It] should set keepalive time to upstream server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:77 @ 04/04/23 18:33:55.842
< Exit [It] should set keepalive time to upstream server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:77 @ 04/04/23 18:34:05.994 (10.152s)
> Enter [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:05.994
< Exit [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:06.258 (264ms)
+
+
+
+
+
+ > Enter [BeforeEach] [Shutdown] ingress controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:06.259
< Exit [BeforeEach] [Shutdown] ingress controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:14.168 (7.909s)
> Enter [BeforeEach] [Shutdown] ingress controller - /go/src/k8s.io/ingress-nginx/test/e2e/gracefulshutdown/shutdown.go:35 @ 04/04/23 18:34:14.168
< Exit [BeforeEach] [Shutdown] ingress controller - /go/src/k8s.io/ingress-nginx/test/e2e/gracefulshutdown/shutdown.go:35 @ 04/04/23 18:34:25.207 (11.04s)
> Enter [It] should shutdown in less than 60 secons without pending connections - /go/src/k8s.io/ingress-nginx/test/e2e/gracefulshutdown/shutdown.go:40 @ 04/04/23 18:34:25.207
< Exit [It] should shutdown in less than 60 secons without pending connections - /go/src/k8s.io/ingress-nginx/test/e2e/gracefulshutdown/shutdown.go:40 @ 04/04/23 18:34:36.4 (11.193s)
> Enter [AfterEach] [Shutdown] ingress controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:36.4
< Exit [AfterEach] [Shutdown] ingress controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:36.599 (199ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:36.6
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:44.48 (7.88s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:34:44.48
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:34:48.503 (4.024s)
> Enter [BeforeEach] when external authentication is configured with a custom redirect param - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:651 @ 04/04/23 18:34:48.503
< Exit [BeforeEach] when external authentication is configured with a custom redirect param - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:651 @ 04/04/23 18:35:02.728 (14.224s)
> Enter [It] should return status code 200 when signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:678 @ 04/04/23 18:35:02.728
< Exit [It] should return status code 200 when signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:678 @ 04/04/23 18:35:02.742 (15ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:02.742
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:02.951 (209ms)
+
+
+ > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:02.951
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:09.829 (6.877s)
> Enter [It] should sync ingress on external name service addition/deletion - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:311 @ 04/04/23 18:35:09.829
< Exit [It] should sync ingress on external name service addition/deletion - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:311 @ 04/04/23 18:35:30.35 (20.521s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:30.35
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:30.552 (202ms)
+
+
+ > Enter [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:30.552
< Exit [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:37.481 (6.929s)
> Enter [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:39 @ 04/04/23 18:35:37.481
< Exit [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:39 @ 04/04/23 18:35:48.587 (11.106s)
> Enter [It] should pass unknown traffic to default backend and handle known traffic - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:79 @ 04/04/23 18:35:48.587
< Exit [It] should pass unknown traffic to default backend and handle known traffic - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:79 @ 04/04/23 18:36:17.402 (28.814s)
> Enter [AfterEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:17.402
< Exit [AfterEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:17.602 (201ms)
+
+
+ > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:17.603
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:24.47 (6.867s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:36:24.47
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:36:35.523 (11.052s)
> Enter [It] should enable the log-format-escape-json - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:47 @ 04/04/23 18:36:35.523
< Exit [It] should enable the log-format-escape-json - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:47 @ 04/04/23 18:36:45.69 (10.167s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:45.69
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:45.908 (218ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:45.908
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:52.807 (6.899s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:36:52.807
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:36:56.83 (4.024s)
> Enter [It] should 302 redirect to error page instead of 400 when auth-tls-error-page is set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:114 @ 04/04/23 18:36:56.83
< Exit [It] should 302 redirect to error page instead of 400 when auth-tls-error-page is set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:114 @ 04/04/23 18:37:10.803 (13.972s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:10.803
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:10.971 (169ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:10.972
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:17.855 (6.884s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:37:17.855
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:37:21.879 (4.023s)
> Enter [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:383 @ 04/04/23 18:37:21.879
< Exit [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:383 @ 04/04/23 18:37:43.087 (21.209s)
> Enter [It] user does not retain cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:422 @ 04/04/23 18:37:43.087
< Exit [It] user does not retain cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:422 @ 04/04/23 18:37:43.095 (8ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:43.095
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:43.321 (225ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:43.321
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:50.242 (6.92s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:37:50.242
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:37:58.297 (8.055s)
> Enter [It] should not use canary as a catch-all server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:863 @ 04/04/23 18:37:58.297
< Exit [It] should not use canary as a catch-all server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:863 @ 04/04/23 18:38:15.503 (17.206s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:15.503
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:15.723 (220ms)
+
+
+ > Enter [BeforeEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:15.724
< Exit [BeforeEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:22.643 (6.92s)
> Enter [It] should return 404 sending requests when only a default backend is running - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:33 @ 04/04/23 18:38:22.643
STEP: basic HTTP GET request without host to path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:27.644
STEP: basic HTTP GET request without host to path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:27.657
STEP: basic HTTPS GET request without host to path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:27.667
STEP: basic HTTPS GET request without host to path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:27.695
STEP: basic HTTP POST request without host to path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:27.708
STEP: basic HTTP POST request without host to path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:27.712
STEP: basic HTTPS POST request without host to path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:28.052
STEP: basic HTTPS POST request without host to path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:28.468
STEP: basic HTTP GET request to host foo.bar.com and path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:28.852
STEP: basic HTTP GET request to host foo.bar.com and path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:29.25
STEP: basic HTTPS GET request to host foo.bar.com and path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:29.647
STEP: basic HTTPS GET request to host foo.bar.com and path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:30.07
STEP: basic HTTP POST request to host foo.bar.com and path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:30.469
STEP: basic HTTP POST request to host foo.bar.com and path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:30.847
STEP: basic HTTPS POST request to host foo.bar.com and path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:31.252
STEP: basic HTTPS POST request to host foo.bar.com and path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:31.65
< Exit [It] should return 404 sending requests when only a default backend is running - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:33 @ 04/04/23 18:38:32.067 (9.424s)
> Enter [AfterEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:32.067
< Exit [AfterEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:32.276 (208ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:32.276
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:40.184 (7.908s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:38:40.184
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:38:48.25 (8.066s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:38:48.25
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 04/04/23 18:38:48.25
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 04/04/23 18:38:58.421
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 04/04/23 18:39:08.584
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:39:18.813 (30.563s)
> Enter [It] should return status code 200 when request whitelisted (via no-auth-locations) service and 401 when request protected service - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:102 @ 04/04/23 18:39:18.813
STEP: Adding a no-auth-locations for /bar to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:104 @ 04/04/23 18:39:18.813
STEP: Sending a request to protected service /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:111 @ 04/04/23 18:39:29.026
STEP: Sending a request to whitelisted service /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:118 @ 04/04/23 18:39:29.042
< Exit [It] should return status code 200 when request whitelisted (via no-auth-locations) service and 401 when request protected service - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:102 @ 04/04/23 18:39:29.049 (10.236s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:29.049
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:29.257 (208ms)
+
+
+ > Enter [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:29.257
< Exit [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:37.143 (7.885s)
> Enter [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:32 @ 04/04/23 18:39:37.143
< Exit [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:32 @ 04/04/23 18:39:39.168 (2.025s)
> Enter [It] should return status code 200 for hosts defined in two ingresses, different path with one alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:87 @ 04/04/23 18:39:39.168
< Exit [It] should return status code 200 for hosts defined in two ingresses, different path with one alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:87 @ 04/04/23 18:39:56.292 (17.124s)
> Enter [AfterEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:56.292
< Exit [AfterEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:56.478 (186ms)
+
+
+ > Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:56.478
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:03.36 (6.881s)
> Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:40:03.36
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:40:14.407 (11.047s)
> Enter [It] should set keepalive_timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:40 @ 04/04/23 18:40:14.407
< Exit [It] should set keepalive_timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:40 @ 04/04/23 18:40:24.598 (10.191s)
> Enter [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:24.598
< Exit [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:24.819 (221ms)
+
+
+ > Enter [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:24.819
< Exit [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:39.201 (14.382s)
> Enter [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:38 @ 04/04/23 18:40:39.201
< Exit [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:38 @ 04/04/23 18:40:46.467 (7.266s)
> Enter [It] should set X-Forwarded-Port headers accordingly when listening on a non-default HTTP port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:48 @ 04/04/23 18:40:46.467
< Exit [It] should set X-Forwarded-Port headers accordingly when listening on a non-default HTTP port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:48 @ 04/04/23 18:40:56.662 (10.195s)
> Enter [AfterEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:56.662
< Exit [AfterEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:56.852 (191ms)
+
+
+ > Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:19.258
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:27.76 (8.502s)
> Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:04:27.76
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:04:39.782 (12.022s)
> Enter [It] should set backend protocol to grpc:// and use grpc_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:64 @ 04/04/23 18:04:39.782
< Exit [It] should set backend protocol to grpc:// and use grpc_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:64 @ 04/04/23 18:04:49.993 (10.211s)
> Enter [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:04:49.993
< Exit [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:04:50.223 (229ms)
+
+
+ > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:50.223
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:58.145 (7.922s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:04:58.145
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:05:02.17 (4.025s)
> Enter [It] should enable modsecurity without using 'modsecurity on;' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:110 @ 04/04/23 18:05:02.17
< Exit [It] should enable modsecurity without using 'modsecurity on;' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:110 @ 04/04/23 18:05:19.394 (17.225s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:19.394
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:19.624 (230ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:19.625
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:26.544 (6.92s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:05:26.544
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:05:30.589 (4.045s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:05:30.589
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:05:58.841 (28.251s)
> Enter [It] should create additional upstream block when auth-keepalive is set with HTTP/1.x - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:623 @ 04/04/23 18:05:58.841
< Exit [It] should create additional upstream block when auth-keepalive is set with HTTP/1.x - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:623 @ 04/04/23 18:06:22.065 (23.224s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:22.065
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:22.266 (201ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:22.267
< Exit [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:29.196 (6.929s)
> Enter [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:33 @ 04/04/23 18:06:29.196
< Exit [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:33 @ 04/04/23 18:06:40.24 (11.044s)
> Enter [It] should block User-Agents defined in the ConfigMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:55 @ 04/04/23 18:06:40.24
< Exit [It] should block User-Agents defined in the ConfigMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:55 @ 04/04/23 18:06:50.425 (10.185s)
> Enter [AfterEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:50.425
< Exit [AfterEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:50.601 (177ms)
+
+
+ > Enter [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:50.602
< Exit [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:57.545 (6.943s)
> Enter [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:31 @ 04/04/23 18:06:57.545
< Exit [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:31 @ 04/04/23 18:07:01.588 (4.043s)
> Enter [It] should set the X-Forwarded-Prefix to the annotation value - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:35 @ 04/04/23 18:07:01.588
< Exit [It] should set the X-Forwarded-Prefix to the annotation value - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:35 @ 04/04/23 18:07:11.685 (10.097s)
> Enter [AfterEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:11.685
< Exit [AfterEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:11.883 (198ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:11.883
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:18.774 (6.89s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:07:18.774
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:07:22.815 (4.041s)
> Enter [It] should allow correct origins - missing subdomain + origin with wildcard origin and correct origin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:535 @ 04/04/23 18:07:22.815
< Exit [It] should allow correct origins - missing subdomain + origin with wildcard origin and correct origin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:535 @ 04/04/23 18:07:29.864 (7.049s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:29.864
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:30.072 (208ms)
+
+
+ > Enter [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:30.072
< Exit [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:48.992 (2m18.92s)
> Enter [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:32 @ 04/04/23 18:09:48.992
< Exit [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:32 @ 04/04/23 18:09:53.047 (4.055s)
> Enter [It] should set mirror-target to http://localhost/mirror - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:36 @ 04/04/23 18:09:53.047
< Exit [It] should set mirror-target to http://localhost/mirror - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:36 @ 04/04/23 18:10:03.229 (10.182s)
> Enter [AfterEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:03.229
< Exit [AfterEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:03.446 (217ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:03.446
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:10.362 (6.916s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:10:10.362
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:10:14.4 (4.038s)
> Enter [It] should return status code 200 when no authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:46 @ 04/04/23 18:10:14.4
< Exit [It] should return status code 200 when no authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:46 @ 04/04/23 18:10:24.616 (10.216s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:24.616
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:24.82 (204ms)
+
+
+ > Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:24.821
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:31.7 (6.879s)
> Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 04/04/23 18:10:31.7
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 04/04/23 18:10:42.759 (11.059s)
> Enter [It] should respect port passed by the PROXY Protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:46 @ 04/04/23 18:10:42.759
< Exit [It] should respect port passed by the PROXY Protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:46 @ 04/04/23 18:12:14.993 (1m32.235s)
> Enter [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:14.993
< Exit [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:15.384 (390ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:15.384
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:22.265 (6.881s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:12:22.265
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:12:24.285 (2.02s)
> Enter [It] should return status code 503 when authentication is configured with an invalid secret - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:65 @ 04/04/23 18:12:24.285
< Exit [It] should return status code 503 when authentication is configured with an invalid secret - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:65 @ 04/04/23 18:12:34.441 (10.156s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:34.441
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:34.624 (183ms)
+
+
+ > Enter [BeforeEach] [Setting] Add no tls redirect locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:34.624
< Exit [BeforeEach] [Setting] Add no tls redirect locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:41.556 (6.931s)
> Enter [It] Check no tls redirect locations config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_tls_redirect_locations.go:31 @ 04/04/23 18:12:41.556
< Exit [It] Check no tls redirect locations config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_tls_redirect_locations.go:31 @ 04/04/23 18:13:01.842 (20.286s)
> Enter [AfterEach] [Setting] Add no tls redirect locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:01.842
< Exit [AfterEach] [Setting] Add no tls redirect locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:02.025 (183ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:02.025
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:09.923 (7.898s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:13:09.923
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:13:13.962 (4.038s)
> Enter [It] should not allow - single origin with port and origin without port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:386 @ 04/04/23 18:13:13.962
< Exit [It] should not allow - single origin with port and origin without port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:386 @ 04/04/23 18:13:20.977 (7.016s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:20.977
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:21.159 (181ms)
+
+
+ > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:21.159
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:29.044 (7.885s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:13:29.044
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:13:40.088 (11.044s)
> Enter [It] should disable the log-format-escape-json - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:55 @ 04/04/23 18:13:40.088
< Exit [It] should disable the log-format-escape-json - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:55 @ 04/04/23 18:13:50.23 (10.141s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:50.23
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:50.426 (197ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:50.427
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:57.36 (6.933s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:13:57.36
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:14:01.385 (4.026s)
> Enter [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 04/04/23 18:14:01.385
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 04/04/23 18:14:06.428
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 04/04/23 18:14:16.618
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 04/04/23 18:14:26.768
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 04/04/23 18:14:36.897
< Exit [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 04/04/23 18:14:52.087 (50.702s)
> Enter [It] should deny login for different servers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:820 @ 04/04/23 18:14:52.087
STEP: logging into server thisHost /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:821 @ 04/04/23 18:14:52.087
STEP: receiving an internal server error without cache on thisHost location /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:833 @ 04/04/23 18:14:59.113
< Exit [It] should deny login for different servers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:820 @ 04/04/23 18:15:59.128 (1m7.041s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:59.128
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:59.362 (234ms)
+
+
+ > Enter [BeforeEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:59.363
< Exit [BeforeEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:06.334 (6.971s)
> Enter [It] should set ingress details variables for ingresses with host without IngressRuleValue, only Backend - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/without_host.go:55 @ 04/04/23 18:16:06.334
< Exit [It] should set ingress details variables for ingresses with host without IngressRuleValue, only Backend - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/without_host.go:55 @ 04/04/23 18:16:20.803 (14.469s)
> Enter [AfterEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:20.803
< Exit [AfterEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:21.76 (957ms)
+
+
+ > Enter [BeforeEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:21.77
< Exit [BeforeEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:31.035 (9.266s)
> Enter [It] should respond with a standard redirect code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:33 @ 04/04/23 18:16:31.035
STEP: setting permanent-redirect annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:34 @ 04/04/23 18:16:31.036
STEP: sending request to redirected URL path - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:52 @ 04/04/23 18:16:41.175
< Exit [It] should respond with a standard redirect code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:33 @ 04/04/23 18:16:41.182 (10.147s)
> Enter [AfterEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:41.182
< Exit [AfterEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:41.409 (227ms)
+
+
+ > Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:41.409
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:57.856 (2m16.447s)
> Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 04/04/23 18:18:57.856
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 04/04/23 18:19:09.919 (12.063s)
> Enter [It] should allow Ingress with rules - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:123 @ 04/04/23 18:19:09.919
< Exit [It] should allow Ingress with rules - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:123 @ 04/04/23 18:19:20.272 (10.353s)
> Enter [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:20.272
< Exit [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:20.675 (403ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:20.677
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:28.892 (8.215s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:19:28.892
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:19:32.924 (4.032s)
> Enter [It] should return 200 using auth-tls-match-cn where atleast one of the regex options matches CN from client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:324 @ 04/04/23 18:19:32.924
< Exit [It] should return 200 using auth-tls-match-cn where atleast one of the regex options matches CN from client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:324 @ 04/04/23 18:19:43.863 (10.939s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:43.863
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:44.064 (200ms)
+
+
+ > Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:44.064
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:53.434 (9.37s)
> Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 04/04/23 18:19:53.434
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 04/04/23 18:19:55.451 (2.017s)
> Enter [It] should exists opentelemetry directive when is enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:60 @ 04/04/23 18:19:55.451
< Exit [It] should exists opentelemetry directive when is enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:60 @ 04/04/23 18:20:12.863 (17.412s)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:12.863
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:13.699 (836ms)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 04/04/23 18:20:13.699
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 04/04/23 18:20:13.699 (0s)
+
+
+ > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:13.7
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:22.723 (9.023s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:20:22.723
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:20:26.762 (4.038s)
> Enter [It] should not set invalid proxy timeouts - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:136 @ 04/04/23 18:20:26.762
< Exit [It] should not set invalid proxy timeouts - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:136 @ 04/04/23 18:20:36.907 (10.146s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:36.907
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:37.137 (230ms)
+
+
+ > Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:37.137
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:45.044 (7.907s)
> Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 04/04/23 18:20:45.044
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 04/04/23 18:20:49.07 (4.026s)
> Enter [It] should not exists opentelemetry directive - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:47 @ 04/04/23 18:20:49.07
< Exit [It] should not exists opentelemetry directive - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:47 @ 04/04/23 18:21:06.287 (17.217s)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:06.287
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:06.513 (226ms)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 04/04/23 18:21:06.513
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 04/04/23 18:21:06.513 (0s)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:06.513
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:13.397 (6.884s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:21:13.397
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:21:15.42 (2.023s)
> Enter [It] should return status code 401 and cors headers when authentication and cors is configured but Authorization header is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:144 @ 04/04/23 18:21:15.42
< Exit [It] should return status code 401 and cors headers when authentication and cors is configured but Authorization header is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:144 @ 04/04/23 18:21:26.454 (11.034s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:26.454
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:26.651 (198ms)
+
+
+ > Enter [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:26.652
< Exit [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:33.515 (6.863s)
> Enter [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:80 @ 04/04/23 18:21:33.515
< Exit [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:80 @ 04/04/23 18:21:43.707 (10.192s)
> Enter [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:43.707
< Exit [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:43.924 (216ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:43.924
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:50.816 (6.892s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:21:50.816
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:21:54.851 (4.035s)
> Enter [It] should allow - single origin for multiple cors values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:169 @ 04/04/23 18:21:54.851
< Exit [It] should allow - single origin for multiple cors values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:169 @ 04/04/23 18:22:01.873 (7.022s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:01.873
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:02.061 (188ms)
+
+
+ > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:02.061
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:09.943 (7.882s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:22:09.943
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:22:20.994 (11.051s)
> Enter [It] log-format-escape-json enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:82 @ 04/04/23 18:22:20.994
< Exit [It] log-format-escape-json enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:82 @ 04/04/23 18:22:34.191 (13.197s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:34.191
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:34.407 (216ms)
+
+
+ > Enter [BeforeEach] [Ingress] [PathType] mix Exact and Prefix paths - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:34.407
< Exit [BeforeEach] [Ingress] [PathType] mix Exact and Prefix paths - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:41.334 (6.927s)
> Enter [BeforeEach] [Ingress] [PathType] mix Exact and Prefix paths - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:33 @ 04/04/23 18:22:41.334
< Exit [BeforeEach] [Ingress] [PathType] mix Exact and Prefix paths - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:33 @ 04/04/23 18:22:45.355 (4.021s)
> Enter [It] should choose the correct location - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:39 @ 04/04/23 18:22:45.355
STEP: Checking exact request to / - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:63 @ 04/04/23 18:23:02.535
STEP: Checking prefix request to /bar - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:76 @ 04/04/23 18:23:02.543
STEP: Checking exact request to /foo - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:109 @ 04/04/23 18:23:19.72
STEP: Checking prefix request to /foo/bar - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:122 @ 04/04/23 18:23:19.723
STEP: Checking prefix request to /foobar - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:134 @ 04/04/23 18:23:19.724
< Exit [It] should choose the correct location - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:39 @ 04/04/23 18:23:19.726 (34.371s)
> Enter [AfterEach] [Ingress] [PathType] mix Exact and Prefix paths - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:19.726
< Exit [AfterEach] [Ingress] [PathType] mix Exact and Prefix paths - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:19.917 (190ms)
+
+
+ > Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:19.917
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:27.858 (7.94s)
> Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:23:27.858
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:23:31.884 (4.027s)
> Enter [It] should set client_body_buffer_size to 1m - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:101 @ 04/04/23 18:23:31.884
< Exit [It] should set client_body_buffer_size to 1m - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:101 @ 04/04/23 18:23:42.035 (10.15s)
> Enter [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:42.035
< Exit [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:42.253 (218ms)
+
+
+ > Enter [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:42.254
< Exit [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:50.152 (7.898s)
> Enter [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:35 @ 04/04/23 18:23:50.152
< Exit [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:35 @ 04/04/23 18:23:59.193 (9.041s)
> Enter [It] should not trust X-Forwarded headers when setting is false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:92 @ 04/04/23 18:23:59.193
< Exit [It] should not trust X-Forwarded headers when setting is false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:92 @ 04/04/23 18:24:16.594 (17.4s)
> Enter [AfterEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:16.594
< Exit [AfterEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:16.994 (401ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:16.995
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:25.428 (8.433s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:24:25.428
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:24:33.475 (8.047s)
> Enter [It] should route requests split between mainline and canary if canary weight is 100 and weight total is 200 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:834 @ 04/04/23 18:24:33.475
< Exit [It] should route requests split between mainline and canary if canary weight is 100 and weight total is 200 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:834 @ 04/04/23 18:25:28.827 (55.352s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:28.827
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:29.073 (245ms)
+
+
+ > Enter [BeforeEach] [Annotations] http2-push-preload - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:29.073
< Exit [BeforeEach] [Annotations] http2-push-preload - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:35.955 (6.882s)
> Enter [BeforeEach] [Annotations] http2-push-preload - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/http2pushpreload.go:30 @ 04/04/23 18:25:35.955
< Exit [BeforeEach] [Annotations] http2-push-preload - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/http2pushpreload.go:30 @ 04/04/23 18:25:39.976 (4.021s)
> Enter [It] enable the http2-push-preload directive - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/http2pushpreload.go:34 @ 04/04/23 18:25:39.976
< Exit [It] enable the http2-push-preload directive - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/http2pushpreload.go:34 @ 04/04/23 18:25:50.116 (10.14s)
> Enter [AfterEach] [Annotations] http2-push-preload - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:50.116
< Exit [AfterEach] [Annotations] http2-push-preload - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:50.35 (233ms)
+
+
+ > Enter [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:50.35
< Exit [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:57.262 (6.911s)
> Enter [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:35 @ 04/04/23 18:25:57.262
< Exit [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:35 @ 04/04/23 18:26:08.325 (11.063s)
> Enter [It] trusts X-Forwarded-For header only when setting is true - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:40 @ 04/04/23 18:26:08.325
STEP: ensuring single values are parsed correctly - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:54 @ 04/04/23 18:26:25.541
< Exit [It] trusts X-Forwarded-For header only when setting is true - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:40 @ 04/04/23 18:26:25.551 (17.226s)
> Enter [AfterEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:25.551
< Exit [AfterEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:25.758 (207ms)
+
+
+ > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:25.758
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:32.641 (6.883s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:26:32.641
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:26:36.668 (4.026s)
> Enter [It] should disable modsecurity - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:74 @ 04/04/23 18:26:36.668
< Exit [It] should disable modsecurity - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:74 @ 04/04/23 18:26:46.879 (10.212s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:46.879
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:47.059 (180ms)
+
+
+ > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:47.06
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:53.958 (6.898s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:26:53.958
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:26:57.986 (4.028s)
> Enter [It] should enable modsecurity through the config map but ignore snippet as disabled by admin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:305 @ 04/04/23 18:26:57.986
< Exit [It] should enable modsecurity through the config map but ignore snippet as disabled by admin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:305 @ 04/04/23 18:27:27.257 (29.271s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:27.257
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:27.443 (186ms)
+
+
+ > Enter [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:27.443
< Exit [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:34.37 (6.927s)
> Enter [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:31 @ 04/04/23 18:27:34.37
< Exit [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:31 @ 04/04/23 18:27:38.399 (4.029s)
> Enter [It] only allow explicitly allowed IPs, deny all others - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:86 @ 04/04/23 18:27:38.399
STEP: sending request from an explicitly denied IP range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:115 @ 04/04/23 18:27:55.604
STEP: sending request from an implicitly denied IP - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:123 @ 04/04/23 18:27:55.61
STEP: sending request from an explicitly allowed IP range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:131 @ 04/04/23 18:27:55.616
STEP: sending request from an explicitly allowed IP range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:139 @ 04/04/23 18:27:55.623
< Exit [It] only allow explicitly allowed IPs, deny all others - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:86 @ 04/04/23 18:28:02.653 (24.254s)
> Enter [AfterEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:02.653
< Exit [AfterEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:02.902 (249ms)
+
+
+ > Enter [BeforeEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:02.903
< Exit [BeforeEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:09.803 (6.9s)
> Enter [It] should be disabled when set to false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/multi_accept.go:49 @ 04/04/23 18:28:09.803
< Exit [It] should be disabled when set to false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/multi_accept.go:49 @ 04/04/23 18:28:20.04 (10.238s)
> Enter [AfterEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:20.041
< Exit [AfterEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:20.276 (236ms)
+
+
+ > Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:20.277
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:28.169 (7.892s)
> Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:28:28.169
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:28:30.185 (2.016s)
> Enter [It] should set backend protocol to grpcs:// and use grpc_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:79 @ 04/04/23 18:28:30.185
< Exit [It] should set backend protocol to grpcs:// and use grpc_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:79 @ 04/04/23 18:28:40.334 (10.15s)
> Enter [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:40.334
< Exit [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:40.52 (185ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:40.52
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:47.397 (6.877s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:28:47.397
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:28:51.425 (4.028s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:28:51.425
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:29:05.527 (14.103s)
> Enter [It] should redirect to signin url when not signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:494 @ 04/04/23 18:29:05.527
< Exit [It] should redirect to signin url when not signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:494 @ 04/04/23 18:29:05.539 (12ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:05.539
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:05.766 (227ms)
+
+
+ > Enter [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:05.767
< Exit [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:12.664 (6.897s)
> Enter [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:32 @ 04/04/23 18:29:12.664
< Exit [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:32 @ 04/04/23 18:29:16.693 (4.029s)
> Enter [It] should set valid proxy timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:36 @ 04/04/23 18:29:16.693
< Exit [It] should set valid proxy timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:36 @ 04/04/23 18:29:33.899 (17.207s)
> Enter [AfterEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:33.899
< Exit [AfterEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:34.123 (224ms)
+
+
+ > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:34.124
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:42.012 (7.888s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:29:42.012
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:29:46.039 (4.027s)
> Enter [It] should enable modsecurity with transaction ID and OWASP rules - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:53 @ 04/04/23 18:29:46.039
< Exit [It] should enable modsecurity with transaction ID and OWASP rules - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:53 @ 04/04/23 18:29:56.186 (10.147s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:56.186
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:56.375 (189ms)
+
+
+ > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:56.375
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:03.267 (6.892s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:30:03.267
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:30:07.298 (4.031s)
> Enter [It] should change the default proxy HTTP version - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:233 @ 04/04/23 18:30:07.298
< Exit [It] should change the default proxy HTTP version - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:233 @ 04/04/23 18:30:17.47 (10.172s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:17.47
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:17.686 (215ms)
+
+
+ > Enter [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:17.686
< Exit [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:35.008 (2m17.322s)
> Enter [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:36 @ 04/04/23 18:32:35.008
< Exit [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:36 @ 04/04/23 18:32:39.033 (4.025s)
> Enter [It] should return the fake SSL certificate if the secret is invalid - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:82 @ 04/04/23 18:32:39.033
< Exit [It] should return the fake SSL certificate if the secret is invalid - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:82 @ 04/04/23 18:32:52.207 (13.174s)
> Enter [AfterEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:52.207
< Exit [AfterEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:52.41 (203ms)
+
+
+ > Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:52.41
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:59.312 (6.902s)
> Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:32:59.312
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:33:03.343 (4.031s)
> Enter [It] should set client_body_buffer_size to 1000 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:35 @ 04/04/23 18:33:03.343
< Exit [It] should set client_body_buffer_size to 1000 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:35 @ 04/04/23 18:33:13.571 (10.227s)
> Enter [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:13.571
< Exit [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:13.79 (220ms)
+
+
+ > Enter [BeforeEach] [Setting] OCSP - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:13.791
< Exit [BeforeEach] [Setting] OCSP - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:20.666 (6.876s)
> Enter [BeforeEach] [Setting] OCSP - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:45 @ 04/04/23 18:33:20.666
< Exit [BeforeEach] [Setting] OCSP - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:45 @ 04/04/23 18:33:24.686 (4.02s)
> Enter [It] should enable OCSP and contain stapling information in the connection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:49 @ 04/04/23 18:33:24.686
STEP: running cfssl gencert -initca ca_csr.json | cfssljson -bare ca - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:216 @ 04/04/23 18:33:31.697
STEP: running cfssl gencert -ca ca.pem -ca-key ca-key.pem -config=cfssl_config.json -profile=intermediate intermediate_ca_csr.json | cfssljson -bare intermediate_ca - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:216 @ 04/04/23 18:33:32.042
STEP: running cfssl gencert -ca intermediate_ca.pem -ca-key intermediate_ca-key.pem -config=cfssl_config.json -profile=ocsp ocsp_csr.json | cfssljson -bare ocsp - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:216 @ 04/04/23 18:33:32.211
STEP: running cfssl serve -db-config=db-config.json -ca-key=intermediate_ca-key.pem -ca=intermediate_ca.pem -config=cfssl_config.json -responder=ocsp.pem -responder-key=ocsp-key.pem - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:228 @ 04/04/23 18:33:32.385
STEP: running cfssl gencert -remote=localhost -profile=server leaf_csr.json | cfssljson -bare leaf - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:238 @ 04/04/23 18:33:37.385
STEP: running cfssl ocsprefresh -ca intermediate_ca.pem -responder=ocsp.pem -responder-key=ocsp-key.pem -db-config=db-config.json - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:252 @ 04/04/23 18:33:37.548
< Exit [It] should enable OCSP and contain stapling information in the connection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:49 @ 04/04/23 18:34:06.016 (41.33s)
> Enter [AfterEach] [Setting] OCSP - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:06.016
< Exit [AfterEach] [Setting] OCSP - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:06.329 (312ms)
+
+
+ > Enter [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:06.329
< Exit [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:13.238 (6.909s)
> Enter [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:38 @ 04/04/23 18:34:13.238
< Exit [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:38 @ 04/04/23 18:34:17.265 (4.027s)
> Enter [It] should allow multiple auth with satisfy any - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:84 @ 04/04/23 18:34:17.265
< Exit [It] should allow multiple auth with satisfy any - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:84 @ 04/04/23 18:34:33.244 (15.979s)
> Enter [AfterEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:33.244
< Exit [AfterEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:33.413 (169ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:33.413
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:40.3 (6.887s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:34:40.3
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:34:44.318 (4.018s)
> Enter [It] should not set snippet "proxy_set_header My-Custom-Header 42;" when external auth is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:284 @ 04/04/23 18:34:44.318
< Exit [It] should not set snippet "proxy_set_header My-Custom-Header 42;" when external auth is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:284 @ 04/04/23 18:34:54.489 (10.171s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:54.489
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:54.674 (185ms)
+
+
+ > Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:54.674
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:01.542 (6.868s)
> Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 04/04/23 18:35:01.542
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 04/04/23 18:35:15.829 (14.287s)
> Enter [It] handles endpoints only changes consistently (down scaling of replicas vs. empty service) - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:125 @ 04/04/23 18:35:15.829
< Exit [It] handles endpoints only changes consistently (down scaling of replicas vs. empty service) - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:125 @ 04/04/23 18:35:42.1 (26.271s)
> Enter [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:42.1
< Exit [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:42.298 (198ms)
+
+
+ > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:42.298
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:50.176 (7.878s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:35:50.176
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:35:54.197 (4.021s)
> Enter [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 04/04/23 18:35:54.197
Apr 4 18:36:03.338: INFO: Unexpected TLS error: tls: failed to verify certificate: x509: certificate is valid for ingress.local, not settings-tls
< Exit [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 04/04/23 18:36:05.327 (11.13s)
> Enter [It] setting preload parameter - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:146 @ 04/04/23 18:36:05.327
< Exit [It] setting preload parameter - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:146 @ 04/04/23 18:36:15.512 (10.185s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:15.512
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:15.744 (233ms)
+
+
+ > Enter [BeforeEach] [Endpointslices] long service name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:15.745
< Exit [BeforeEach] [Endpointslices] long service name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:23.617 (7.872s)
> Enter [BeforeEach] [Endpointslices] long service name - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/longname.go:34 @ 04/04/23 18:36:23.617
< Exit [BeforeEach] [Endpointslices] long service name - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/longname.go:34 @ 04/04/23 18:36:27.64 (4.023s)
> Enter [It] should return 200 when service name has max allowed number of characters 63 - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/longname.go:38 @ 04/04/23 18:36:27.64
STEP: checking if the service is reached - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/longname.go:48 @ 04/04/23 18:36:37.807
< Exit [It] should return 200 when service name has max allowed number of characters 63 - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/longname.go:38 @ 04/04/23 18:36:37.815 (10.175s)
> Enter [AfterEach] [Endpointslices] long service name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:37.815
< Exit [AfterEach] [Endpointslices] long service name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:38.05 (235ms)
+
+
+ > Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:38.05
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:45.936 (7.886s)
> Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 04/04/23 18:36:45.936
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 04/04/23 18:36:47.961 (2.026s)
> Enter [It] should add fastcgi_index in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:54 @ 04/04/23 18:36:47.961
< Exit [It] should add fastcgi_index in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:54 @ 04/04/23 18:36:58.079 (10.118s)
> Enter [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:58.079
< Exit [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:58.306 (226ms)
+
+
+ > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:58.306
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:16.416 (2m18.11s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:39:16.416
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:39:20.463 (4.047s)
> Enter [It] should enable modsecurity globally and with modsecurity-snippet block requests - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:189 @ 04/04/23 18:39:20.463
< Exit [It] should enable modsecurity globally and with modsecurity-snippet block requests - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:189 @ 04/04/23 18:39:49.668 (29.205s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:49.668
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:49.888 (220ms)
+
+
+ > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:49.888
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:57.8 (7.912s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:39:57.8
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:40:01.823 (4.023s)
> Enter [It] should not use ports during the HTTP to HTTPS redirection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:187 @ 04/04/23 18:40:01.823
Apr 4 18:40:10.971: INFO: Unexpected TLS error: tls: failed to verify certificate: x509: certificate is valid for ingress.local, not settings-tls
< Exit [It] should not use ports during the HTTP to HTTPS redirection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:187 @ 04/04/23 18:40:12.979 (11.155s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:12.979
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:13.188 (209ms)
+
+
+ > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:13.188
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:21.087 (7.899s)
> Enter [It] should return 200 for service type=ExternalName with a port defined - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:129 @ 04/04/23 18:40:21.087
< Exit [It] should return 200 for service type=ExternalName with a port defined - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:129 @ 04/04/23 18:40:31.585 (10.498s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:31.585
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:31.773 (188ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:31.773
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:38.672 (6.898s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:40:38.672
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:40:42.706 (4.034s)
> Enter [BeforeEach] when external authentication is configured with a custom redirect param - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:651 @ 04/04/23 18:40:42.706
< Exit [BeforeEach] when external authentication is configured with a custom redirect param - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:651 @ 04/04/23 18:40:56.901 (14.195s)
> Enter [It] should redirect to signin url when not signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:687 @ 04/04/23 18:40:56.901
< Exit [It] should redirect to signin url when not signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:687 @ 04/04/23 18:40:56.912 (10ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:56.912
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:57.097 (186ms)
+
+
+ I0404 18:04:54.427675 25 request.go:690] Waited for 1.19834838s due to client-side throttling, not priority and fairness, request: GET:https://10.96.0.1:443/api/v1/namespaces/e2e-tests-limit-connections-1680631459257336272-jn44f/services/nginx-ingress-controller
+ > Enter [BeforeEach] [Annotations] Annotation - limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:19.256
< Exit [BeforeEach] [Annotations] Annotation - limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:26.817 (7.56s)
> Enter [BeforeEach] [Annotations] Annotation - limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitconnections.go:34 @ 04/04/23 18:04:26.817
< Exit [BeforeEach] [Annotations] Annotation - limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitconnections.go:34 @ 04/04/23 18:04:38.845 (12.028s)
> Enter [It] should limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitconnections.go:38 @ 04/04/23 18:04:38.845
< Exit [It] should limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitconnections.go:38 @ 04/04/23 18:05:03.259 (24.414s)
> Enter [AfterEach] [Annotations] Annotation - limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:03.259
< Exit [AfterEach] [Annotations] Annotation - limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:03.482 (224ms)
+
+
+ > Enter [BeforeEach] [Ingress] [PathType] exact - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:03.483
< Exit [BeforeEach] [Ingress] [PathType] exact - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:10.366 (6.883s)
> Enter [BeforeEach] [Ingress] [PathType] exact - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_exact.go:33 @ 04/04/23 18:05:10.366
< Exit [BeforeEach] [Ingress] [PathType] exact - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_exact.go:33 @ 04/04/23 18:05:14.405 (4.039s)
> Enter [It] should choose exact location for /exact - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_exact.go:37 @ 04/04/23 18:05:14.405
< Exit [It] should choose exact location for /exact - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_exact.go:37 @ 04/04/23 18:05:41.807 (27.402s)
> Enter [AfterEach] [Ingress] [PathType] exact - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:41.807
< Exit [AfterEach] [Ingress] [PathType] exact - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:42.078 (271ms)
+
+
+ > Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:42.079
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:50.08 (8.002s)
> Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 04/04/23 18:05:50.08
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 04/04/23 18:05:54.108 (4.028s)
> Enter [It] [BAD_ANNOTATIONS] should drop an ingress if there is an invalid character in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:36 @ 04/04/23 18:05:54.108
< Exit [It] [BAD_ANNOTATIONS] should drop an ingress if there is an invalid character in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:36 @ 04/04/23 18:06:21.53 (27.422s)
> Enter [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:21.53
< Exit [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:21.804 (274ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:21.804
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:28.705 (6.901s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:06:28.705
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:06:32.732 (4.027s)
> Enter [It] should not break functionality - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:267 @ 04/04/23 18:06:32.732
< Exit [It] should not break functionality - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:267 @ 04/04/23 18:06:39.756 (7.024s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:39.756
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:39.957 (201ms)
+
+
+ > Enter [BeforeEach] [Annotations] app-root - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:39.958
< Exit [BeforeEach] [Annotations] app-root - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:47.864 (7.907s)
> Enter [BeforeEach] [Annotations] app-root - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/approot.go:31 @ 04/04/23 18:06:47.864
< Exit [BeforeEach] [Annotations] app-root - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/approot.go:31 @ 04/04/23 18:06:51.912 (4.047s)
> Enter [It] should redirect to /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/approot.go:35 @ 04/04/23 18:06:51.912
< Exit [It] should redirect to /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/approot.go:35 @ 04/04/23 18:07:02.086 (10.175s)
> Enter [AfterEach] [Annotations] app-root - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:02.086
< Exit [AfterEach] [Annotations] app-root - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:02.297 (211ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:02.297
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:10.188 (7.891s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:07:10.188
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:07:14.226 (4.037s)
> Enter [It] should return 200 using auth-tls-match-cn with matching CN from client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:295 @ 04/04/23 18:07:14.226
< Exit [It] should return 200 using auth-tls-match-cn with matching CN from client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:295 @ 04/04/23 18:07:25.018 (10.792s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:25.018
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:25.219 (201ms)
+
+
+ > Enter [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:25.22
< Exit [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:33.104 (7.884s)
> Enter [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:31 @ 04/04/23 18:07:33.104
< Exit [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:31 @ 04/04/23 18:07:35.129 (2.025s)
> Enter [It] only deny explicitly denied IPs, allow all others - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:35 @ 04/04/23 18:07:35.129
STEP: sending request from an explicitly denied IP range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:61 @ 04/04/23 18:07:52.29
STEP: sending request from an explicitly denied IP address - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:69 @ 04/04/23 18:07:52.298
STEP: sending request from an implicitly allowed IP range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:77 @ 04/04/23 18:07:52.304
< Exit [It] only deny explicitly denied IPs, allow all others - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:35 @ 04/04/23 18:07:59.326 (24.197s)
> Enter [AfterEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:59.326
< Exit [AfterEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:59.52 (194ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:59.52
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:06.412 (6.892s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:08:06.412
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:08:14.461 (8.049s)
> Enter [It] should not use canary with domain as a server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:891 @ 04/04/23 18:08:14.461
< Exit [It] should not use canary with domain as a server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:891 @ 04/04/23 18:08:31.701 (17.24s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:31.701
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:31.909 (208ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:31.909
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:39.801 (7.892s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:08:39.801
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:08:43.836 (4.035s)
> Enter [It] should set "proxy_set_header 'My-Custom-Header' '42';" when auth-headers are set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:301 @ 04/04/23 18:08:43.836
< Exit [It] should set "proxy_set_header 'My-Custom-Header' '42';" when auth-headers are set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:301 @ 04/04/23 18:08:54.106 (10.269s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:54.106
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:54.318 (212ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:54.318
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:01.207 (6.889s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:09:01.207
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:09:09.264 (8.058s)
> Enter [It] should routes to mainline upstream when the given Regex causes error - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:566 @ 04/04/23 18:09:09.264
STEP: routing requests to the mainline upstream when the given Regex causes error - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:591 @ 04/04/23 18:09:26.43
< Exit [It] should routes to mainline upstream when the given Regex causes error - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:566 @ 04/04/23 18:09:26.434 (17.169s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:26.434
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:26.658 (224ms)
+
+
+ > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:26.658
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:33.593 (6.935s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:09:33.593
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:09:37.637 (4.044s)
> Enter [It] should delete Ingress when class is removed - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:192 @ 04/04/23 18:09:37.637
< Exit [It] should delete Ingress when class is removed - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:192 @ 04/04/23 18:10:02.989 (25.352s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:02.989
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:03.188 (199ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:03.189
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:11.089 (7.901s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:10:11.09
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:10:19.123 (8.033s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:10:19.123
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 04/04/23 18:10:19.123
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 04/04/23 18:10:29.295
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 04/04/23 18:10:39.491
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:10:49.631 (30.509s)
> Enter [It] should proxy_method method when global-auth-method is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:197 @ 04/04/23 18:10:49.631
STEP: Adding a global-auth-method to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:202 @ 04/04/23 18:10:49.631
< Exit [It] should proxy_method method when global-auth-method is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:197 @ 04/04/23 18:10:59.844 (10.213s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:59.844
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:00.053 (208ms)
+
+
+ > Enter [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:00.053
< Exit [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:17.888 (2m17.835s)
> Enter [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:32 @ 04/04/23 18:13:17.888
< Exit [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:32 @ 04/04/23 18:13:21.926 (4.038s)
> Enter [It] should not set invalid proxy timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:52 @ 04/04/23 18:13:21.926
< Exit [It] should not set invalid proxy timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:52 @ 04/04/23 18:13:39.103 (17.177s)
> Enter [AfterEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:39.103
< Exit [AfterEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:39.316 (214ms)
+
+
+ > Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:39.317
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:46.2 (6.883s)
> Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 04/04/23 18:13:46.2
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 04/04/23 18:13:51.228 (5.028s)
> Enter [It] should add fastcgi_param in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:71 @ 04/04/23 18:13:51.228
< Exit [It] should add fastcgi_param in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:71 @ 04/04/23 18:14:01.351 (10.123s)
> Enter [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:01.351
< Exit [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:01.572 (222ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:01.573
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:08.451 (6.878s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:14:08.451
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:14:12.484 (4.033s)
> Enter [It] should enable cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:35 @ 04/04/23 18:14:12.484
< Exit [It] should enable cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:35 @ 04/04/23 18:14:22.62 (10.136s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:22.62
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:22.8 (179ms)
+
+
+ > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:22.8
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:29.697 (6.897s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:14:29.697
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:14:33.724 (4.026s)
> Enter [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 04/04/23 18:14:33.724
< Exit [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 04/04/23 18:14:43.071 (9.347s)
> Enter [It] overriding what's set from the upstream - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:166 @ 04/04/23 18:14:43.071
< Exit [It] overriding what's set from the upstream - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:166 @ 04/04/23 18:14:50.277 (7.207s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:50.277
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:50.564 (287ms)
+
+
+ > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:50.566
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:57.791 (7.225s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:14:57.791
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:15:01.819 (4.028s)
> Enter [It] picks up the previously missing secret for a given ingress without reloading - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:70 @ 04/04/23 18:15:01.819
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:94 @ 04/04/23 18:15:18.959
STEP: skipping Nginx reload - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:101 @ 04/04/23 18:15:21.991
< Exit [It] picks up the previously missing secret for a given ingress without reloading - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:70 @ 04/04/23 18:15:22.003 (20.184s)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:22.003
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:22.173 (170ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:22.173
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:30.052 (7.879s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:15:30.052
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:15:32.076 (2.024s)
> Enter [It] should disable cors allow credentials - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:94 @ 04/04/23 18:15:32.076
< Exit [It] should disable cors allow credentials - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:94 @ 04/04/23 18:15:42.292 (10.217s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:42.292
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:42.533 (240ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:42.533
< Exit [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:49.463 (6.93s)
> Enter [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:43 @ 04/04/23 18:15:49.463
< Exit [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:43 @ 04/04/23 18:16:08.363 (18.9s)
> Enter [It] should return status code 200 when accessing '/noauth' unauthenticated - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:82 @ 04/04/23 18:16:08.363
< Exit [It] should return status code 200 when accessing '/noauth' unauthenticated - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:82 @ 04/04/23 18:16:11.514 (3.151s)
> Enter [AfterEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:11.514
< Exit [AfterEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:11.73 (216ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:11.73
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:18.612 (6.881s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:16:18.612
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:16:28.726 (10.115s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:16:28.726
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 04/04/23 18:16:28.726
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 04/04/23 18:16:38.887
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 04/04/23 18:16:49.114
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:16:59.322 (30.595s)
> Enter [It] should return status code 401 when request any protected service - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:85 @ 04/04/23 18:16:59.322
STEP: Sending a request to protected service /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:87 @ 04/04/23 18:16:59.322
STEP: Sending a request to protected service /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:94 @ 04/04/23 18:16:59.333
< Exit [It] should return status code 401 when request any protected service - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:85 @ 04/04/23 18:16:59.342 (20ms)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:59.342
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:59.57 (229ms)
+
+
+ > Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:59.571
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:06.433 (6.862s)
> Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 04/04/23 18:17:06.433
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 04/04/23 18:17:18.505 (12.072s)
> Enter [It] should ignore catch all Ingress with backend and rules - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:69 @ 04/04/23 18:17:18.505
< Exit [It] should ignore catch all Ingress with backend and rules - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:69 @ 04/04/23 18:17:28.675 (10.171s)
> Enter [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:28.675
< Exit [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:28.85 (174ms)
+
+
+ > Enter [BeforeEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:28.85
< Exit [BeforeEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:37.72 (8.87s)
> Enter [It] should have worker_rlimit_nofile option - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_options.go:31 @ 04/04/23 18:17:37.72
< Exit [It] should have worker_rlimit_nofile option - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_options.go:31 @ 04/04/23 18:17:40.919 (3.199s)
> Enter [AfterEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:40.919
< Exit [AfterEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:41.126 (207ms)
+
+
+ > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:41.126
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:49.014 (7.887s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:17:49.014
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:17:53.032 (4.018s)
> Enter [It] should not use ports or X-Forwarded-Host during the HTTP to HTTPS redirection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:205 @ 04/04/23 18:17:53.032
Apr 4 18:18:09.269: INFO: Unexpected TLS error: tls: failed to verify certificate: x509: certificate is valid for ingress.local, not settings-tls
< Exit [It] should not use ports or X-Forwarded-Host during the HTTP to HTTPS redirection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:205 @ 04/04/23 18:18:11.272 (18.241s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:11.272
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:11.48 (208ms)
+
+
+ > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:11.48
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:18.335 (6.854s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:18:18.335
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:18:22.355 (4.02s)
> Enter [It] should build proxy next upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:194 @ 04/04/23 18:18:22.355
< Exit [It] should build proxy next upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:194 @ 04/04/23 18:18:32.501 (10.146s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:32.501
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:32.736 (236ms)
+
+
+ > Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:32.737
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:39.632 (6.895s)
> Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 04/04/23 18:18:39.632
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 04/04/23 18:18:50.669 (11.037s)
> Enter [It] should respect proto passed by the PROXY Protocol server port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:79 @ 04/04/23 18:18:50.669
< Exit [It] should respect proto passed by the PROXY Protocol server port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:79 @ 04/04/23 18:20:22.888 (1m32.219s)
> Enter [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:22.888
< Exit [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:23.276 (388ms)
+
+
+ > Enter [BeforeEach] [Annotations] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:23.277
< Exit [BeforeEach] [Annotations] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:31.164 (7.887s)
> Enter [BeforeEach] [Annotations] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/sslciphers.go:31 @ 04/04/23 18:20:31.164
< Exit [BeforeEach] [Annotations] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/sslciphers.go:31 @ 04/04/23 18:20:33.226 (2.062s)
> Enter [It] should change ssl ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/sslciphers.go:35 @ 04/04/23 18:20:33.226
< Exit [It] should change ssl ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/sslciphers.go:35 @ 04/04/23 18:20:43.402 (10.176s)
> Enter [AfterEach] [Annotations] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:43.402
< Exit [AfterEach] [Annotations] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:43.603 (201ms)
+
+
+ > Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:43.603
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:50.486 (6.883s)
> Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:20:50.486
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:20:54.514 (4.028s)
> Enter [It] should set client_body_buffer_size to 1k - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:79 @ 04/04/23 18:20:54.514
< Exit [It] should set client_body_buffer_size to 1k - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:79 @ 04/04/23 18:21:04.738 (10.224s)
> Enter [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:04.738
< Exit [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:04.947 (209ms)
+
+
+ > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:04.947
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:11.835 (6.888s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:21:11.835
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:21:15.853 (4.017s)
> Enter [It] should turn off proxy-request-buffering - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:179 @ 04/04/23 18:21:15.853
< Exit [It] should turn off proxy-request-buffering - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:179 @ 04/04/23 18:21:26.03 (10.178s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:26.03
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:26.226 (196ms)
+
+
+ > Enter [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:26.227
< Exit [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:34.123 (7.896s)
> Enter [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:33 @ 04/04/23 18:21:34.123
< Exit [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:33 @ 04/04/23 18:21:38.158 (4.035s)
> Enter [It] should get information for a specific backend server - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:56 @ 04/04/23 18:21:38.158
< Exit [It] should get information for a specific backend server - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:56 @ 04/04/23 18:21:48.595 (10.437s)
> Enter [AfterEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:48.595
< Exit [AfterEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:48.793 (198ms)
+
+
+ > Enter [BeforeEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:98 @ 04/04/23 18:21:48.794
< Exit [BeforeEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:98 @ 04/04/23 18:21:50.797 (2.003s)
> Enter [It] start nginx with default configuration - /go/src/k8s.io/ingress-nginx/test/e2e/nginx/nginx.go:102 @ 04/04/23 18:21:50.797
< Exit [It] start nginx with default configuration - /go/src/k8s.io/ingress-nginx/test/e2e/nginx/nginx.go:102 @ 04/04/23 18:21:59.838 (9.042s)
> Enter [AfterEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:99 @ 04/04/23 18:21:59.839
< Exit [AfterEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:99 @ 04/04/23 18:21:59.841 (3ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:59.842
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:07.232 (7.39s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:22:07.232
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:22:11.252 (4.02s)
> Enter [It] should set cors max-age - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:78 @ 04/04/23 18:22:11.252
< Exit [It] should set cors max-age - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:78 @ 04/04/23 18:22:21.435 (10.182s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:21.435
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:21.724 (289ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:21.725
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:29.212 (7.488s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:22:29.212
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:22:33.245 (4.033s)
> Enter [It] should allow - matching origin+port with wildcard origin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:488 @ 04/04/23 18:22:33.245
< Exit [It] should allow - matching origin+port with wildcard origin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:488 @ 04/04/23 18:22:40.278 (7.032s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:40.278
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:40.502 (224ms)
+
+
+ > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:40.502
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:47.367 (6.865s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:22:47.368
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:22:51.389 (4.021s)
> Enter [It] should change cookie name on ingress definition change - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:64 @ 04/04/23 18:22:51.389
< Exit [It] should change cookie name on ingress definition change - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:64 @ 04/04/23 18:23:06.598 (15.209s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:06.598
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:06.803 (205ms)
+
+
+ > Enter [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:06.804
< Exit [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:13.683 (6.879s)
> Enter [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:31 @ 04/04/23 18:23:13.683
< Exit [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:31 @ 04/04/23 18:23:17.702 (4.019s)
> Enter [It] should add value of server-snippet setting to all ingress config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:35 @ 04/04/23 18:23:17.702
< Exit [It] should add value of server-snippet setting to all ingress config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:35 @ 04/04/23 18:23:50.157 (32.455s)
> Enter [AfterEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:50.157
< Exit [AfterEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:50.365 (209ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:50.366
< Exit [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:57.248 (6.882s)
> Enter [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:33 @ 04/04/23 18:23:57.248
< Exit [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:33 @ 04/04/23 18:24:06.308 (9.06s)
> Enter [It] should block Referers defined in the ConfigMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:88 @ 04/04/23 18:24:06.308
< Exit [It] should block Referers defined in the ConfigMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:88 @ 04/04/23 18:24:16.602 (10.294s)
> Enter [AfterEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:16.602
< Exit [AfterEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:17.016 (414ms)
+
+
+ > Enter [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:17.016
< Exit [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:25.558 (8.541s)
> Enter [It] should set gzip_types to application/javascript - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:89 @ 04/04/23 18:24:25.558
< Exit [It] should set gzip_types to application/javascript - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:89 @ 04/04/23 18:24:42.749 (17.191s)
> Enter [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:42.749
< Exit [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:42.994 (245ms)
+
+
+ > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:42.994
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:49.859 (6.865s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:24:49.859
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:24:55.885 (6.025s)
> Enter [It] should exists opentracing_operation_name directive when is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:115 @ 04/04/23 18:24:55.885
< Exit [It] should exists opentracing_operation_name directive when is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:115 @ 04/04/23 18:25:13.047 (17.162s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:13.047
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:13.223 (176ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:25:13.223
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:25:13.223 (0s)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:13.223
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:21.122 (7.899s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:25:21.122
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:25:27.151 (6.029s)
> Enter [It] should not allow - single origin for multiple cors values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:196 @ 04/04/23 18:25:27.151
< Exit [It] should not allow - single origin for multiple cors values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:196 @ 04/04/23 18:25:34.17 (7.019s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:34.17
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:34.371 (201ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:34.371
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:41.275 (6.904s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:25:41.275
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:25:49.318 (8.044s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:25:49.318
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 04/04/23 18:25:49.318
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 04/04/23 18:25:59.469
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 04/04/23 18:26:09.647
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:26:19.839 (30.521s)
> Enter [It] should set snippet when global external auth is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:250 @ 04/04/23 18:26:19.839
STEP: Adding a global-auth-snippet to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:254 @ 04/04/23 18:26:19.839
< Exit [It] should set snippet when global external auth is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:250 @ 04/04/23 18:26:29.995 (10.156s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:29.995
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:30.195 (200ms)
+
+
+ > Enter [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:30.195
< Exit [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:37.066 (6.871s)
> Enter [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:31 @ 04/04/23 18:26:37.066
< Exit [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:31 @ 04/04/23 18:26:41.082 (4.015s)
> Enter [It] add valid directives to server via server snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:35 @ 04/04/23 18:26:41.082
< Exit [It] add valid directives to server via server snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:35 @ 04/04/23 18:26:51.227 (10.145s)
> Enter [AfterEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:51.227
< Exit [AfterEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:51.453 (226ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:51.453
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:58.324 (6.87s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:26:58.324
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:27:02.348 (4.024s)
> Enter [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 04/04/23 18:27:02.348
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 04/04/23 18:27:07.377
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 04/04/23 18:27:17.563
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 04/04/23 18:27:27.77
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 04/04/23 18:27:37.89
< Exit [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 04/04/23 18:27:53.085 (50.737s)
> Enter [It] should deny login for different location on same server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:792 @ 04/04/23 18:27:53.085
STEP: receiving an internal server error without cache on location /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:811 @ 04/04/23 18:28:00.105
< Exit [It] should deny login for different location on same server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:792 @ 04/04/23 18:29:00.109 (1m7.024s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:00.109
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:00.314 (205ms)
+
+
+ > Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:00.314
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:08.193 (7.878s)
> Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 04/04/23 18:29:08.193
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 04/04/23 18:29:10.222 (2.029s)
> Enter [It] should return OK for service with backend protocol FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:102 @ 04/04/23 18:29:10.222
< Exit [It] should return OK for service with backend protocol FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:102 @ 04/04/23 18:29:20.442 (10.22s)
> Enter [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:20.442
< Exit [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:20.65 (208ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:20.651
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:27.592 (6.941s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:29:27.592
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:29:35.635 (8.044s)
> Enter [It] should route requests only to canary if canary weight is equal to canary weight total - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:775 @ 04/04/23 18:29:35.635
< Exit [It] should route requests only to canary if canary weight is equal to canary weight total - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:775 @ 04/04/23 18:29:52.866 (17.23s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:52.866
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:53.101 (235ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] modsecurity-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:53.101
< Exit [BeforeEach] [Setting] [Security] modsecurity-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:00.998 (7.896s)
> Enter [It] should add value of modsecurity-snippet setting to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/modsecurity/modsecurity_snippet.go:30 @ 04/04/23 18:30:00.998
< Exit [It] should add value of modsecurity-snippet setting to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/modsecurity/modsecurity_snippet.go:30 @ 04/04/23 18:30:11.215 (10.217s)
> Enter [AfterEach] [Setting] [Security] modsecurity-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:11.215
< Exit [AfterEach] [Setting] [Security] modsecurity-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:11.436 (221ms)
+
+
+ > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:11.436
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:18.304 (6.868s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:30:18.304
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:30:22.331 (4.027s)
> Enter [It] should exists opentracing directive when is enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:71 @ 04/04/23 18:30:22.331
< Exit [It] should exists opentracing directive when is enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:71 @ 04/04/23 18:30:39.546 (17.216s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:39.546
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:39.763 (217ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:30:39.763
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:30:39.763 (0s)
+
+
+ > Enter [BeforeEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:39.763
< Exit [BeforeEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:47.146 (7.383s)
> Enter [It] Check persistent affinity mode - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinitymode.go:67 @ 04/04/23 18:30:47.146
< Exit [It] Check persistent affinity mode - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinitymode.go:67 @ 04/04/23 18:32:47.648 (2m0.502s)
> Enter [AfterEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:47.648
< Exit [AfterEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:47.827 (179ms)
+
+
+ > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:47.827
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:04.512 (2m16.685s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:35:04.512
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:35:08.555 (4.042s)
> Enter [It] should ignore Ingress with a different class annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:68 @ 04/04/23 18:35:08.555
< Exit [It] should ignore Ingress with a different class annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:68 @ 04/04/23 18:35:25.764 (17.209s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:25.764
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:25.96 (196ms)
+
+
+ > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:25.96
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:33.883 (7.923s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:35:33.883
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:35:37.911 (4.028s)
> Enter [It] should enable opentracing using jaeger - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:172 @ 04/04/23 18:35:37.911
< Exit [It] should enable opentracing using jaeger - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:172 @ 04/04/23 18:35:57.93 (20.019s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:57.93
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:58.103 (173ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:35:58.103
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:35:58.103 (0s)
+
+
+ > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:58.104
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:05.96 (7.857s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:36:05.96
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:36:14.017 (8.056s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:36:14.017
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 04/04/23 18:36:14.017
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 04/04/23 18:36:24.203
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 04/04/23 18:36:34.361
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:36:44.521 (30.504s)
> Enter [It] should add custom error page when global-auth-signin url is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:210 @ 04/04/23 18:36:44.521
STEP: Adding a global-auth-signin to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:215 @ 04/04/23 18:36:44.521
< Exit [It] should add custom error page when global-auth-signin url is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:210 @ 04/04/23 18:36:54.694 (10.173s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:54.694
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:54.922 (228ms)
+
+
+ > Enter [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:54.922
< Exit [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:02.365 (7.443s)
> Enter [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:31 @ 04/04/23 18:37:02.365
< Exit [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:31 @ 04/04/23 18:37:08.389 (6.023s)
> Enter [It] disable-stream-access-log set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:71 @ 04/04/23 18:37:08.389
< Exit [It] disable-stream-access-log set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:71 @ 04/04/23 18:37:25.61 (17.222s)
> Enter [AfterEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:25.611
< Exit [AfterEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:25.869 (258ms)
+
+
+ > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:25.869
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:32.759 (6.89s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:37:32.759
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:37:36.785 (4.026s)
> Enter [It] should enable opentracing using jaeger with sampler host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:184 @ 04/04/23 18:37:36.785
< Exit [It] should enable opentracing using jaeger with sampler host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:184 @ 04/04/23 18:37:56.815 (20.03s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:56.815
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:57.041 (227ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:37:57.041
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:37:57.041 (0s)
+
+
+ > Enter [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:57.042
< Exit [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:04.9 (7.858s)
> Enter [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:34 @ 04/04/23 18:38:04.9
< Exit [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:34 @ 04/04/23 18:38:15.932 (11.032s)
> Enter [It] Add a custom header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:40 @ 04/04/23 18:38:15.932
< Exit [It] Add a custom header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:40 @ 04/04/23 18:38:26.137 (10.204s)
> Enter [AfterEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:26.137
< Exit [AfterEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:26.471 (334ms)
+
+
+ > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:26.471
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:33.322 (6.851s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:38:33.322
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:38:37.351 (4.029s)
> Enter [It] should serve Ingress when class is updated between annotation and ingressClassName - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:323 @ 04/04/23 18:38:37.351
< Exit [It] should serve Ingress when class is updated between annotation and ingressClassName - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:323 @ 04/04/23 18:39:02.787 (25.436s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:02.787
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:03.018 (231ms)
+
+
+ > Enter [BeforeEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:03.025
< Exit [BeforeEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:11.02 (7.995s)
> Enter [It] should return 503 when all backend service endpoints are unavailable - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_backend.go:54 @ 04/04/23 18:39:11.02
< Exit [It] should return 503 when all backend service endpoints are unavailable - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_backend.go:54 @ 04/04/23 18:39:21.316 (10.296s)
> Enter [AfterEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:21.316
< Exit [AfterEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:21.504 (188ms)
+
+
+ > Enter [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:21.504
< Exit [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:29.492 (7.988s)
> Enter [It] should set gzip_disable to msie6 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:67 @ 04/04/23 18:39:29.492
< Exit [It] should set gzip_disable to msie6 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:67 @ 04/04/23 18:39:46.643 (17.151s)
> Enter [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:46.643
< Exit [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:46.835 (192ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:46.835
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:53.72 (6.885s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:39:53.72
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:40:01.768 (8.048s)
> Enter [It] routes traffic to either mainline or canary backend (legacy behavior) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:1058 @ 04/04/23 18:40:01.768
< Exit [It] routes traffic to either mainline or canary backend (legacy behavior) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:1058 @ 04/04/23 18:40:57.335 (55.567s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:57.335
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:57.533 (198ms)
+
+
+ > Enter [BeforeEach] [Status] status update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:19.249
< Exit [BeforeEach] [Status] status update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:26.794 (7.545s)
> Enter [It] should update status field after client-go reconnection - /go/src/k8s.io/ingress-nginx/test/e2e/status/update.go:43 @ 04/04/23 18:04:26.794
Apr 4 18:04:26.794: INFO: Asynchronously running '/bin/bash -c /usr/local/bin/kubectl proxy --accept-hosts=.* --address=0.0.0.0 --port=0'
Apr 4 18:04:49.019: INFO: waiting for leader election and initial status update
Apr 4 18:05:29.033: INFO: Asynchronously running '/bin/bash -c /usr/local/bin/kubectl proxy --accept-hosts=.* --address=0.0.0.0 --port=42431'
< Exit [It] should update status field after client-go reconnection - /go/src/k8s.io/ingress-nginx/test/e2e/status/update.go:43 @ 04/04/23 18:05:39.069 (1m12.275s)
> Enter [AfterEach] [Status] status update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:39.069
< Exit [AfterEach] [Status] status update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:39.293 (225ms)
+
+
+ > Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:39.294
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:46.218 (6.925s)
> Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:05:46.218
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:05:50.239 (4.02s)
> Enter [It] should set client_body_buffer_size to 1M - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:123 @ 04/04/23 18:05:50.239
< Exit [It] should set client_body_buffer_size to 1M - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:123 @ 04/04/23 18:06:00.422 (10.184s)
> Enter [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:00.422
< Exit [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:00.649 (227ms)
+
+
+ > Enter [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:00.649
< Exit [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:07.542 (6.893s)
> Enter [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:32 @ 04/04/23 18:06:07.542
< Exit [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:32 @ 04/04/23 18:06:11.569 (4.027s)
> Enter [It] should exist a proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:36 @ 04/04/23 18:06:11.569
< Exit [It] should exist a proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:36 @ 04/04/23 18:06:21.772 (10.203s)
> Enter [AfterEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:21.772
< Exit [AfterEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:21.963 (191ms)
+
+
+ > Enter [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:21.964
< Exit [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:28.888 (6.924s)
> Enter [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:34 @ 04/04/23 18:06:28.888
< Exit [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:34 @ 04/04/23 18:06:39.938 (11.05s)
> Enter [It] Add multiple custom headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:65 @ 04/04/23 18:06:39.938
< Exit [It] Add multiple custom headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:65 @ 04/04/23 18:06:50.151 (10.213s)
> Enter [AfterEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:50.151
< Exit [AfterEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:50.374 (223ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:50.375
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:57.307 (6.932s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:06:57.307
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:07:05.355 (8.048s)
> Enter [It] should route requests to the correct upstream if mainline ingress is created before the canary ingress - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:161 @ 04/04/23 18:07:05.355
STEP: routing requests destined for the mainline ingress to the maineline upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:185 @ 04/04/23 18:07:22.519
STEP: routing requests destined for the canary ingress to the canary upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:195 @ 04/04/23 18:07:22.526
< Exit [It] should route requests to the correct upstream if mainline ingress is created before the canary ingress - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:161 @ 04/04/23 18:07:22.534 (17.179s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:22.534
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:22.759 (225ms)
+
+
+ > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:22.759
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:29.671 (6.912s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:07:29.671
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:07:40.702 (11.031s)
> Enter [It] should set proxy-headers-hash-max-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:68 @ 04/04/23 18:07:40.702
< Exit [It] should set proxy-headers-hash-max-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:68 @ 04/04/23 18:07:50.922 (10.22s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:50.922
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:51.164 (242ms)
+
+
+ > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:51.164
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:59.041 (7.877s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:07:59.041
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:08:03.067 (4.025s)
> Enter [It] should ignore Ingress with different controller class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:104 @ 04/04/23 18:08:03.067
< Exit [It] should ignore Ingress with different controller class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:104 @ 04/04/23 18:08:20.253 (17.187s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:20.253
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:20.455 (201ms)
+
+
+ > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:20.455
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:27.83 (7.375s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:08:27.83
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:08:38.87 (11.04s)
> Enter [It] log-format-escape-none enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:128 @ 04/04/23 18:08:38.87
< Exit [It] log-format-escape-none enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:128 @ 04/04/23 18:08:52.098 (13.228s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:52.098
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:52.323 (225ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:52.323
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:59.233 (6.909s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:08:59.233
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:09:03.258 (4.025s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:09:03.258
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:09:17.471 (14.213s)
> Enter [It] should return status code 200 when signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:485 @ 04/04/23 18:09:17.471
< Exit [It] should return status code 200 when signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:485 @ 04/04/23 18:09:17.477 (6ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:17.477
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:17.663 (186ms)
+
+
+ > Enter [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:17.664
< Exit [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:24.618 (6.955s)
> Enter [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:40 @ 04/04/23 18:09:24.618
< Exit [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:40 @ 04/04/23 18:09:37.752 (13.134s)
> Enter [It] uses default ssl certificate for host based ingress when configured certificate does not match host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:80 @ 04/04/23 18:09:37.752
STEP: making sure new ingress is deployed - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:90 @ 04/04/23 18:09:44.916
STEP: making sure the configured default ssl certificate is being used - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:96 @ 04/04/23 18:09:48.094
< Exit [It] uses default ssl certificate for host based ingress when configured certificate does not match host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:80 @ 04/04/23 18:09:50.119 (12.367s)
> Enter [AfterEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:50.119
< Exit [AfterEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:50.349 (230ms)
+
+
+ > Enter [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:50.349
< Exit [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:57.22 (6.871s)
> Enter [It] should return OK for service with backend protocol GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:68 @ 04/04/23 18:09:57.22
< Exit [It] should return OK for service with backend protocol GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:68 @ 04/04/23 18:10:11.466 (14.247s)
> Enter [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:11.466
< Exit [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:11.655 (189ms)
+
+
+ > Enter [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:11.655
< Exit [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:18.528 (6.872s)
> Enter [It] should be enabled with default settings - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:39 @ 04/04/23 18:10:18.528
< Exit [It] should be enabled with default settings - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:39 @ 04/04/23 18:10:28.683 (10.155s)
> Enter [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:28.683
< Exit [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:28.876 (193ms)
+
+
+ > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:28.876
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:35.756 (6.88s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:10:35.756
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:10:39.781 (4.025s)
> Enter [It] should include opentracing_trust_incoming_span off directive when disabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:85 @ 04/04/23 18:10:39.781
< Exit [It] should include opentracing_trust_incoming_span off directive when disabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:85 @ 04/04/23 18:10:56.965 (17.184s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:56.965
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:57.186 (221ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:10:57.186
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:10:57.186 (0s)
+
+
+ > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:57.186
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:05.078 (7.892s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:11:05.078
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:11:09.104 (4.027s)
> Enter [It] should warn user when use-regex is true and session-cookie-path is not set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:294 @ 04/04/23 18:11:09.104
< Exit [It] should warn user when use-regex is true and session-cookie-path is not set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:294 @ 04/04/23 18:11:22.32 (13.216s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:22.32
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:22.585 (265ms)
+
+
+ > Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:22.585
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:29.564 (6.979s)
> Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:11:29.564
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:11:33.585 (4.021s)
> Enter [It] should set backend protocol to '' and use ajp_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:109 @ 04/04/23 18:11:33.585
< Exit [It] should set backend protocol to '' and use ajp_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:109 @ 04/04/23 18:11:43.812 (10.227s)
> Enter [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:43.812
< Exit [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:44.056 (244ms)
+
+
+ > Enter [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:44.057
< Exit [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:52.078 (8.021s)
> Enter [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:37 @ 04/04/23 18:11:52.078
< Exit [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:37 @ 04/04/23 18:11:54.141 (2.063s)
> Enter [It] should add stream-snippet and drop annotations per admin config - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:85 @ 04/04/23 18:11:54.141
< Exit [It] should add stream-snippet and drop annotations per admin config - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:85 @ 04/04/23 18:12:23.359 (29.218s)
> Enter [AfterEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:23.359
< Exit [AfterEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:23.53 (171ms)
+
+
+ > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:23.53
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:30.423 (6.893s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:12:30.423
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:12:34.455 (4.032s)
> Enter [It] should not set secure in cookie with provided false annotation on http - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:435 @ 04/04/23 18:12:34.455
< Exit [It] should not set secure in cookie with provided false annotation on http - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:435 @ 04/04/23 18:12:44.621 (10.166s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:44.621
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:44.832 (211ms)
+
+
+ > Enter [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:44.833
< Exit [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:52.267 (7.434s)
> Enter [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:42 @ 04/04/23 18:12:52.267
< Exit [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:42 @ 04/04/23 18:12:52.272 (5ms)
> Enter [It] should expose an ExternalName TCP service - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:80 @ 04/04/23 18:12:52.272
< Exit [It] should expose an ExternalName TCP service - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:80 @ 04/04/23 18:12:55.617 (3.345s)
> Enter [AfterEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:55.617
< Exit [AfterEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:55.87 (253ms)
+
+
+ > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:55.871
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:02.782 (6.911s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:13:02.782
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:13:06.807 (4.025s)
> Enter [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 04/04/23 18:13:06.807
STEP: configuring certificate_by_lua and skipping Nginx configuration of the new certificate - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:128 @ 04/04/23 18:13:23.944
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:136 @ 04/04/23 18:13:32.097
< Exit [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 04/04/23 18:13:32.106 (25.299s)
> Enter [It] removes HTTPS configuration when we delete TLS spec - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:233 @ 04/04/23 18:13:32.106
< Exit [It] removes HTTPS configuration when we delete TLS spec - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:233 @ 04/04/23 18:13:37.112 (5.005s)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:37.112
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:37.281 (169ms)
+
+
+ > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:37.281
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:45.19 (7.908s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:13:45.19
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:13:49.209 (4.019s)
> Enter [It] should not exists opentracing_location_operation_name directive when is empty - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:130 @ 04/04/23 18:13:49.209
< Exit [It] should not exists opentracing_location_operation_name directive when is empty - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:130 @ 04/04/23 18:14:06.443 (17.233s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:06.443
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:06.621 (178ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:14:06.621
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:14:06.621 (0s)
+
+
+ > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:06.621
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:13.543 (6.921s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:14:13.543
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:14:17.569 (4.026s)
> Enter [It] picks up the certificate when we add TLS spec to existing ingress - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:45 @ 04/04/23 18:14:17.569
< Exit [It] picks up the certificate when we add TLS spec to existing ingress - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:45 @ 04/04/23 18:14:33.037 (15.469s)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:33.037
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:33.234 (196ms)
+
+
+ > Enter [BeforeEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:98 @ 04/04/23 18:14:33.234
< Exit [BeforeEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:98 @ 04/04/23 18:14:35.237 (2.003s)
> Enter [It] fails when using root directive - /go/src/k8s.io/ingress-nginx/test/e2e/nginx/nginx.go:124 @ 04/04/23 18:14:35.237
< Exit [It] fails when using root directive - /go/src/k8s.io/ingress-nginx/test/e2e/nginx/nginx.go:124 @ 04/04/23 18:15:35.27 (1m0.034s)
> Enter [AfterEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:99 @ 04/04/23 18:15:35.27
< Exit [AfterEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:99 @ 04/04/23 18:15:35.272 (2ms)
+
+
+ > Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:35.273
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:43.177 (7.905s)
> Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 04/04/23 18:15:43.177
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 04/04/23 18:15:45.196 (2.019s)
> Enter [It] should fail to use longest match for documented warning - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:158 @ 04/04/23 18:15:45.196
STEP: creating a regular ingress definition - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:161 @ 04/04/23 18:15:45.196
STEP: creating an ingress definition with the use-regex annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:165 @ 04/04/23 18:15:52.212
STEP: check that '/foo/bar/bar' does not match the longest exact path - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:179 @ 04/04/23 18:16:02.371
< Exit [It] should fail to use longest match for documented warning - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:158 @ 04/04/23 18:16:02.374 (17.178s)
> Enter [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:02.374
< Exit [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:02.58 (206ms)
+
+
+ > Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:02.581
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:12.465 (9.885s)
> Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 04/04/23 18:16:12.465
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 04/04/23 18:16:16.495 (4.03s)
> Enter [It] should not exists opentelemetry_operation_name directive when is empty - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:89 @ 04/04/23 18:16:16.495
< Exit [It] should not exists opentelemetry_operation_name directive when is empty - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:89 @ 04/04/23 18:16:33.975 (17.48s)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:33.975
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:34.598 (623ms)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 04/04/23 18:16:34.598
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 04/04/23 18:16:34.598 (0s)
+
+
+ > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:34.603
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:41.474 (6.871s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:16:41.474
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:16:43.493 (2.019s)
> Enter [It] should disable modsecurity using 'modsecurity off;' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:132 @ 04/04/23 18:16:43.493
< Exit [It] should disable modsecurity using 'modsecurity off;' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:132 @ 04/04/23 18:17:00.623 (17.13s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:00.623
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:00.822 (199ms)
+
+
+ > Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:00.823
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:07.712 (6.89s)
> Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:17:07.712
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:17:18.751 (11.038s)
> Enter [It] should set the request count to upstream server through one keep alive connection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:86 @ 04/04/23 18:17:18.751
< Exit [It] should set the request count to upstream server through one keep alive connection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:86 @ 04/04/23 18:17:28.957 (10.206s)
> Enter [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:28.957
< Exit [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:29.194 (237ms)
+
+
+ > Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:29.195
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:39.14 (9.946s)
> Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:17:39.14
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:17:50.186 (11.045s)
> Enter [It] should set keepalive_requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:48 @ 04/04/23 18:17:50.186
< Exit [It] should set keepalive_requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:48 @ 04/04/23 18:18:00.312 (10.127s)
> Enter [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:00.312
< Exit [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:00.496 (184ms)
+
+
+ > Enter [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:00.496
< Exit [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:07.399 (6.903s)
> Enter [It] should set gzip_comp_level to 4 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:56 @ 04/04/23 18:18:07.399
< Exit [It] should set gzip_comp_level to 4 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:56 @ 04/04/23 18:18:24.593 (17.194s)
> Enter [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:24.593
< Exit [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:24.792 (199ms)
+
+
+ > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:24.793
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:31.73 (6.937s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:18:31.73
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:18:35.753 (4.023s)
> Enter [It] should set sticky cookie SERVERID - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:42 @ 04/04/23 18:18:35.753
< Exit [It] should set sticky cookie SERVERID - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:42 @ 04/04/23 18:18:45.94 (10.187s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:45.94
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:46.161 (221ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:46.161
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:54.022 (7.861s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:18:54.022
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:18:58.047 (4.025s)
> Enter [It] should allow - missing origins (should allow all origins) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:571 @ 04/04/23 18:18:58.047
< Exit [It] should allow - missing origins (should allow all origins) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:571 @ 04/04/23 18:19:05.106 (7.059s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:05.106
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:05.287 (181ms)
+
+
+ > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:05.287
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:13.171 (7.884s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:19:13.171
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:19:17.198 (4.027s)
> Enter [It] should not set affinity across all server locations when using separate ingresses - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:320 @ 04/04/23 18:19:17.198
< Exit [It] should not set affinity across all server locations when using separate ingresses - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:320 @ 04/04/23 18:19:34.328 (17.129s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:34.328
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:34.564 (236ms)
+
+
+ > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:34.564
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:42.455 (7.891s)
> Enter [It] should return 200 for service type=ExternalName without a port defined - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:95 @ 04/04/23 18:19:42.455
< Exit [It] should return 200 for service type=ExternalName without a port defined - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:95 @ 04/04/23 18:19:52.995 (10.54s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:52.995
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:53.197 (202ms)
+
+
+
+ > Enter [BeforeEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:53.198
< Exit [BeforeEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:00.144 (6.946s)
> Enter [It] enables access logging for default backend - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:88 @ 04/04/23 18:20:00.144
[SKIPPED] enable-access-log-for-default-backend
In [It] at: /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:90 @ 04/04/23 18:20:00.144
< Exit [It] enables access logging for default backend - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:88 @ 04/04/23 18:20:00.144 (0s)
> Enter [AfterEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:00.144
< Exit [AfterEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:00.767 (622ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:00.767
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:09.884 (9.117s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:20:09.884
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:20:13.952 (4.068s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:20:13.952
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:20:28.231 (14.28s)
> Enter [It] should overwrite Foo header with auth response - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:529 @ 04/04/23 18:20:28.231
< Exit [It] should overwrite Foo header with auth response - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:529 @ 04/04/23 18:20:32.452 (4.22s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:32.452
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:32.657 (205ms)
+
+
+ > Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:32.657
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:39.572 (6.914s)
> Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 04/04/23 18:20:39.572
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 04/04/23 18:20:43.594 (4.022s)
> Enter [It] should use ~* location modifier if regex annotation is present - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:111 @ 04/04/23 18:20:43.594
STEP: creating a regular ingress definition - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:114 @ 04/04/23 18:20:43.594
STEP: creating an ingress definition with the use-regex amd rewrite-target annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:123 @ 04/04/23 18:20:53.786
STEP: ensuring '/foo' matches '~* ^/foo' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:137 @ 04/04/23 18:21:03.945
STEP: ensuring '/foo/bar' matches '~* ^/foo.+' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:147 @ 04/04/23 18:21:03.953
< Exit [It] should use ~* location modifier if regex annotation is present - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:111 @ 04/04/23 18:21:03.959 (20.365s)
> Enter [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:03.959
< Exit [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:04.173 (214ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:04.173
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:12.085 (7.912s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:21:12.085
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:21:16.104 (4.019s)
> Enter [It] should return status code 401 when authentication is configured but Authorization header is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:89 @ 04/04/23 18:21:16.104
< Exit [It] should return status code 401 when authentication is configured but Authorization header is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:89 @ 04/04/23 18:21:27.134 (11.029s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:27.134
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:27.321 (187ms)
+
+
+ > Enter [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:27.321
< Exit [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:34.238 (6.917s)
> Enter [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:32 @ 04/04/23 18:21:34.238
< Exit [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:32 @ 04/04/23 18:21:38.265 (4.026s)
> Enter [It] should disable mirror-request-body - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:67 @ 04/04/23 18:21:38.265
< Exit [It] should disable mirror-request-body - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:67 @ 04/04/23 18:21:48.462 (10.197s)
> Enter [AfterEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:48.462
< Exit [AfterEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:48.677 (215ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:48.677
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:55.595 (6.918s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:21:55.595
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:21:59.616 (4.02s)
> Enter [BeforeEach] with invalid auth-url should deny whole location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:866 @ 04/04/23 18:21:59.616
< Exit [BeforeEach] with invalid auth-url should deny whole location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:866 @ 04/04/23 18:22:09.78 (10.165s)
> Enter [It] should return 503 (location was denied) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:879 @ 04/04/23 18:22:09.78
< Exit [It] should return 503 (location was denied) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:879 @ 04/04/23 18:22:09.787 (6ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:09.787
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:10.018 (231ms)
+
+
+ > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:10.018
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:17.91 (7.892s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:22:17.91
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:22:21.937 (4.027s)
> Enter [It] should setup proxy cookies - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:215 @ 04/04/23 18:22:21.937
< Exit [It] should setup proxy cookies - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:215 @ 04/04/23 18:22:32.141 (10.205s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:32.141
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:32.312 (170ms)
+
+
+ > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:32.312
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:39.246 (6.934s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:22:39.246
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:22:43.274 (4.028s)
> Enter [BeforeEach] Without IngressClass Cluster scoped Permission - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:587 @ 04/04/23 18:22:43.274
< Exit [BeforeEach] Without IngressClass Cluster scoped Permission - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:587 @ 04/04/23 18:22:50.32 (7.047s)
> Enter [It] should ignore Ingress with only IngressClassName - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:652 @ 04/04/23 18:22:50.32
< Exit [It] should ignore Ingress with only IngressClassName - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:652 @ 04/04/23 18:23:00.536 (10.216s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:00.536
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:00.771 (235ms)
+
+
+ > Enter [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:00.772
< Exit [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:07.648 (6.876s)
> Enter [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:39 @ 04/04/23 18:23:07.648
< Exit [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:39 @ 04/04/23 18:23:18.858 (11.21s)
> Enter [It] should enable ssl-passthrough-proxy-port on a different port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:56 @ 04/04/23 18:23:18.858
< Exit [It] should enable ssl-passthrough-proxy-port on a different port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:56 @ 04/04/23 18:23:30.073 (11.215s)
> Enter [AfterEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:30.073
< Exit [AfterEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:30.267 (194ms)
+
+
+ > Enter [BeforeEach] [Default Backend] change default settings - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:30.267
< Exit [BeforeEach] [Default Backend] change default settings - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:37.168 (6.901s)
> Enter [BeforeEach] [Default Backend] change default settings - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/with_hosts.go:34 @ 04/04/23 18:23:37.168
< Exit [BeforeEach] [Default Backend] change default settings - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/with_hosts.go:34 @ 04/04/23 18:23:41.193 (4.024s)
> Enter [It] should apply the annotation to the default backend - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/with_hosts.go:38 @ 04/04/23 18:23:41.193
< Exit [It] should apply the annotation to the default backend - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/with_hosts.go:38 @ 04/04/23 18:23:51.36 (10.167s)
> Enter [AfterEach] [Default Backend] change default settings - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:51.36
< Exit [AfterEach] [Default Backend] change default settings - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:51.551 (192ms)
+
+
+ > Enter [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:51.552
< Exit [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:58.412 (6.86s)
> Enter [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:42 @ 04/04/23 18:23:58.412
< Exit [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:42 @ 04/04/23 18:24:02.44 (4.027s)
> Enter [It] should include geoip2 line in config when enabled and db file exists - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:46 @ 04/04/23 18:24:02.44
Apr 4 18:24:11.771: INFO: Connecting to github.com (140.82.113.4:443)
Connecting to github.com (140.82.113.4:443)
Connecting to raw.githubusercontent.com (185.199.108.133:443)
saving to '/etc/nginx/geoip/GeoLite2-Country.mmdb'
GeoLite2-Country.mmd 100%!|(MISSING)********************************| 17952 0:00:00 ETA
'/etc/nginx/geoip/GeoLite2-Country.mmdb' saved
< Exit [It] should include geoip2 line in config when enabled and db file exists - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:46 @ 04/04/23 18:24:22.088 (19.648s)
> Enter [AfterEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:22.088
< Exit [AfterEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:22.674 (586ms)
+
+
+ > Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:22.675
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:30.572 (7.897s)
> Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 04/04/23 18:24:30.572
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 04/04/23 18:24:34.603 (4.031s)
> Enter [It] should allow for custom rewrite parameters - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:190 @ 04/04/23 18:24:34.603
STEP: creating an ingress definition with the use-regex annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:193 @ 04/04/23 18:24:34.603
STEP: check that '/foo/bar/bar' redirects to custom rewrite - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:206 @ 04/04/23 18:24:44.755
< Exit [It] should allow for custom rewrite parameters - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:190 @ 04/04/23 18:24:44.757 (10.154s)
> Enter [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:44.757
< Exit [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:44.959 (202ms)
+
+
+ > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:44.96
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:53.864 (8.905s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:24:53.864
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:25:04.899 (11.035s)
> Enter [It] should set server_names_hash_bucket_size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:40 @ 04/04/23 18:25:04.899
< Exit [It] should set server_names_hash_bucket_size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:40 @ 04/04/23 18:25:15.061 (10.162s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:15.061
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:15.316 (255ms)
+
+
+ > Enter [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:15.316
< Exit [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:39.846 (24.53s)
> Enter [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:38 @ 04/04/23 18:25:39.846
< Exit [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:38 @ 04/04/23 18:25:47.041 (7.195s)
> Enter [It] should set X-Forwarded-Port header to 443 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:70 @ 04/04/23 18:25:47.041
< Exit [It] should set X-Forwarded-Port header to 443 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:70 @ 04/04/23 18:25:59.374 (12.333s)
> Enter [AfterEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:59.374
< Exit [AfterEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:59.585 (211ms)
+
+
+ > Enter [BeforeEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:59.585
< Exit [BeforeEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:06.445 (6.86s)
> Enter [It] should create sync events (default) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_sync_events.go:35 @ 04/04/23 18:26:06.445
< Exit [It] should create sync events (default) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_sync_events.go:35 @ 04/04/23 18:26:20.681 (14.236s)
> Enter [AfterEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:20.681
< Exit [AfterEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:20.877 (196ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:20.877
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:27.751 (6.874s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:26:27.751
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:26:31.787 (4.036s)
> Enter [It] should not allow - unmatching origin with wildcard origin (2 subdomains) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:468 @ 04/04/23 18:26:31.787
< Exit [It] should not allow - unmatching origin with wildcard origin (2 subdomains) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:468 @ 04/04/23 18:26:38.82 (7.032s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:38.82
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:39.022 (203ms)
+
+
+ > Enter [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:39.023
< Exit [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:46.929 (7.906s)
> Enter [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:32 @ 04/04/23 18:26:46.929
< Exit [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:32 @ 04/04/23 18:26:50.949 (4.02s)
> Enter [It] should not set invalid proxy send timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:52 @ 04/04/23 18:26:50.949
< Exit [It] should not set invalid proxy send timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:52 @ 04/04/23 18:27:08.052 (17.103s)
> Enter [AfterEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:08.052
< Exit [AfterEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:08.24 (188ms)
+
+
+ > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:08.24
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:16.131 (7.891s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:27:16.131
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:27:27.187 (11.056s)
> Enter [It] should set server_names_hash_max_size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:48 @ 04/04/23 18:27:27.187
< Exit [It] should set server_names_hash_max_size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:48 @ 04/04/23 18:27:37.411 (10.224s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:37.411
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:37.656 (245ms)
+
+
+ > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:37.657
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:44.535 (6.879s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:27:44.535
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:27:48.555 (4.02s)
> Enter [It] should set proxy client-max-body-size to 8m - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:85 @ 04/04/23 18:27:48.555
< Exit [It] should set proxy client-max-body-size to 8m - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:85 @ 04/04/23 18:27:58.71 (10.155s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:58.71
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:58.954 (244ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:58.955
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:06.864 (7.909s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:28:06.864
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:28:10.897 (4.033s)
> Enter [It] should not break functionality with extra domain - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:314 @ 04/04/23 18:28:10.897
< Exit [It] should not break functionality with extra domain - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:314 @ 04/04/23 18:28:17.933 (7.036s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:17.933
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:18.142 (209ms)
+
+
+ > Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:18.142
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:26.105 (7.963s)
> Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 04/04/23 18:28:26.105
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 04/04/23 18:28:28.133 (2.028s)
> Enter [It] proxy-ssl-location-only flag should change the nginx config server part - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:150 @ 04/04/23 18:28:28.133
< Exit [It] proxy-ssl-location-only flag should change the nginx config server part - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:150 @ 04/04/23 18:29:01.214 (33.081s)
> Enter [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:01.214
< Exit [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:01.431 (217ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:01.431
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:19.232 (2m17.801s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:31:19.232
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:31:23.279 (4.047s)
> Enter [BeforeEach] with invalid auth-url should deny whole location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:866 @ 04/04/23 18:31:23.279
< Exit [BeforeEach] with invalid auth-url should deny whole location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:866 @ 04/04/23 18:31:33.459 (10.18s)
> Enter [It] should add error to the config - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:887 @ 04/04/23 18:31:33.459
< Exit [It] should add error to the config - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:887 @ 04/04/23 18:31:36.583 (3.124s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:36.583
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:36.807 (224ms)
+
+
+ > Enter [BeforeEach] [Default Backend] SSL - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:36.808
< Exit [BeforeEach] [Default Backend] SSL - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:43.735 (6.927s)
> Enter [It] should return a self generated SSL certificate - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/ssl.go:29 @ 04/04/23 18:31:43.735
STEP: checking SSL Certificate using the NGINX IP address - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/ssl.go:30 @ 04/04/23 18:31:43.735
STEP: checking SSL Certificate using the NGINX catch all server - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/ssl.go:45 @ 04/04/23 18:31:48.771
< Exit [It] should return a self generated SSL certificate - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/ssl.go:29 @ 04/04/23 18:31:48.798 (5.063s)
> Enter [AfterEach] [Default Backend] SSL - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:48.798
< Exit [AfterEach] [Default Backend] SSL - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:49.002 (204ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:49.002
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:55.884 (6.881s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:31:55.884
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:31:59.898 (4.014s)
> Enter [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 04/04/23 18:31:59.898
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 04/04/23 18:32:04.919
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 04/04/23 18:32:15.067
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 04/04/23 18:32:25.279
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 04/04/23 18:32:35.453
< Exit [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 04/04/23 18:32:50.643 (50.746s)
> Enter [It] should return status code 200 when signed in after auth backend is deleted - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:772 @ 04/04/23 18:32:50.643
< Exit [It] should return status code 200 when signed in after auth backend is deleted - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:772 @ 04/04/23 18:32:57.666 (7.022s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:57.666
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:57.876 (210ms)
+
+
+ > Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:57.876
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:04.793 (6.917s)
> Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 04/04/23 18:33:04.793
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 04/04/23 18:33:08.814 (4.021s)
> Enter [It] should set valid proxy-ssl-secret, proxy-ssl-protocols - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:122 @ 04/04/23 18:33:08.814
< Exit [It] should set valid proxy-ssl-secret, proxy-ssl-protocols - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:122 @ 04/04/23 18:33:19.338 (10.524s)
> Enter [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:19.338
< Exit [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:19.552 (213ms)
+
+
+ > Enter [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:19.552
< Exit [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:26.442 (6.89s)
> Enter [It] should be disabled by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:32 @ 04/04/23 18:33:26.442
< Exit [It] should be disabled by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:32 @ 04/04/23 18:33:29.606 (3.164s)
> Enter [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:29.606
< Exit [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:29.78 (174ms)
+
+
+ > Enter [BeforeEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:29.78
< Exit [BeforeEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:36.668 (6.887s)
> Enter [It] Balanced affinity mode should balance - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinitymode.go:34 @ 04/04/23 18:33:36.668
< Exit [It] Balanced affinity mode should balance - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinitymode.go:34 @ 04/04/23 18:33:54.927 (18.259s)
> Enter [AfterEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:54.927
< Exit [AfterEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:55.127 (200ms)
+
+
+ > Enter [BeforeEach] [Setting] proxy-next-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:55.128
< Exit [BeforeEach] [Setting] proxy-next-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:03.016 (7.888s)
> Enter [BeforeEach] [Setting] proxy-next-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_next_upstream.go:32 @ 04/04/23 18:34:03.016
< Exit [BeforeEach] [Setting] proxy-next-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_next_upstream.go:32 @ 04/04/23 18:34:07.036 (4.021s)
> Enter [It] should build proxy next upstream using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_next_upstream.go:36 @ 04/04/23 18:34:07.036
< Exit [It] should build proxy next upstream using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_next_upstream.go:36 @ 04/04/23 18:34:24.255 (17.219s)
> Enter [AfterEach] [Setting] proxy-next-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:24.255
< Exit [AfterEach] [Setting] proxy-next-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:24.485 (230ms)
+
+
+ > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:24.485
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:31.385 (6.9s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:34:31.385
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:34:35.427 (4.042s)
> Enter [It] should set proxy_redirect to off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:36 @ 04/04/23 18:34:35.427
< Exit [It] should set proxy_redirect to off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:36 @ 04/04/23 18:34:45.603 (10.176s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:45.603
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:45.78 (178ms)
+
+
+ > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:45.781
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:52.66 (6.879s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:34:52.66
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:34:56.689 (4.029s)
> Enter [It] should not exists opentracing_operation_name directive when is empty - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:100 @ 04/04/23 18:34:56.689
< Exit [It] should not exists opentracing_operation_name directive when is empty - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:100 @ 04/04/23 18:35:13.844 (17.155s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:13.844
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:14.078 (234ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:35:14.078
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:35:14.078 (0s)
+
+
+ > Enter [BeforeEach] [Annotations] influxdb-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:14.078
< Exit [BeforeEach] [Annotations] influxdb-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:22.011 (7.933s)
> Enter [BeforeEach] [Annotations] influxdb-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/influxdb.go:42 @ 04/04/23 18:35:22.011
< Exit [BeforeEach] [Annotations] influxdb-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/influxdb.go:42 @ 04/04/23 18:35:38.056 (16.045s)
> Enter [It] should send the request metric to the influxdb server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/influxdb.go:48 @ 04/04/23 18:35:38.056
< Exit [It] should send the request metric to the influxdb server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/influxdb.go:48 @ 04/04/23 18:35:59.417 (21.362s)
> Enter [AfterEach] [Annotations] influxdb-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:59.417
< Exit [AfterEach] [Annotations] influxdb-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:59.632 (215ms)
+
+
+ > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:59.632
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:06.509 (6.876s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:36:06.509
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:36:10.532 (4.023s)
> Enter [It] should enable opentracing using datadog - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:241 @ 04/04/23 18:36:10.532
< Exit [It] should enable opentracing using datadog - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:241 @ 04/04/23 18:36:30.574 (20.042s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:30.574
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:30.81 (237ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:36:30.81
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:36:30.81 (0s)
+
+
+ > Enter [BeforeEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:30.811
< Exit [BeforeEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:37.689 (6.878s)
> Enter [It] should set ingress details variables for ingresses without a host - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/without_host.go:34 @ 04/04/23 18:36:37.689
< Exit [It] should set ingress details variables for ingresses without a host - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/without_host.go:34 @ 04/04/23 18:36:51.912 (14.223s)
> Enter [AfterEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:51.912
< Exit [AfterEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:52.088 (176ms)
+
+
+ > Enter [BeforeEach] [Setting] main-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:52.088
< Exit [BeforeEach] [Setting] main-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:59.999 (7.911s)
> Enter [It] should add value of main-snippet setting to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/main_snippet.go:31 @ 04/04/23 18:36:59.999
< Exit [It] should add value of main-snippet setting to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/main_snippet.go:31 @ 04/04/23 18:37:10.187 (10.188s)
> Enter [AfterEach] [Setting] main-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:10.187
< Exit [AfterEach] [Setting] main-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:10.413 (225ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:10.413
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:17.279 (6.866s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:37:17.279
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:37:21.337 (4.058s)
> Enter [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:532 @ 04/04/23 18:37:21.337
STEP: routing requests to the mainline upstream when header is set to 'DoCananry' and header-value is 'DoCanary' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:557 @ 04/04/23 18:37:38.545
< Exit [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:532 @ 04/04/23 18:37:38.552 (17.215s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:38.552
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:38.772 (219ms)
+
+
+ > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:38.772
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:45.664 (6.892s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:37:45.664
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:37:49.681 (4.017s)
> Enter [It] should serve Ingress when class is added - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:257 @ 04/04/23 18:37:49.681
< Exit [It] should serve Ingress when class is added - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:257 @ 04/04/23 18:38:15.087 (25.406s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:15.087
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:15.266 (179ms)
+
+
+ > Enter [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:15.266
< Exit [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:23.144 (7.877s)
> Enter [It] should return OK for service with backend protocol GRPCS - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:199 @ 04/04/23 18:38:23.144
< Exit [It] should return OK for service with backend protocol GRPCS - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:199 @ 04/04/23 18:38:39.406 (16.262s)
> Enter [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:39.406
< Exit [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:39.613 (207ms)
+
+
+ > Enter [BeforeEach] [Annotations] annotation-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:39.613
< Exit [BeforeEach] [Annotations] annotation-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:46.507 (6.894s)
> Enter [BeforeEach] [Annotations] annotation-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/globalratelimit.go:34 @ 04/04/23 18:38:46.507
< Exit [BeforeEach] [Annotations] annotation-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/globalratelimit.go:34 @ 04/04/23 18:38:50.531 (4.023s)
> Enter [It] generates correct configuration - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/globalratelimit.go:38 @ 04/04/23 18:38:50.531
STEP: regenerating the correct configuration after update - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/globalratelimit.go:65 @ 04/04/23 18:39:12.735
< Exit [It] generates correct configuration - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/globalratelimit.go:38 @ 04/04/23 18:39:23.972 (33.441s)
> Enter [AfterEach] [Annotations] annotation-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:23.972
< Exit [AfterEach] [Annotations] annotation-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:24.525 (553ms)
+
+
+ > Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:24.526
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:32.928 (8.402s)
> Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 04/04/23 18:39:32.928
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 04/04/23 18:39:36.954 (4.026s)
> Enter [It] [BAD_ANNOTATIONS] should drop an ingress if there is a forbidden word in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:67 @ 04/04/23 18:39:36.954
< Exit [It] [BAD_ANNOTATIONS] should drop an ingress if there is a forbidden word in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:67 @ 04/04/23 18:40:09.289 (32.335s)
> Enter [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:09.289
< Exit [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:09.487 (198ms)
+
+
+ > Enter [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:09.487
< Exit [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:16.38 (6.893s)
> Enter [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:31 @ 04/04/23 18:40:16.38
< Exit [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:31 @ 04/04/23 18:40:20.419 (4.039s)
> Enter [It] should not add X-Forwarded-Prefix if the annotation value is empty - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:57 @ 04/04/23 18:40:20.419
< Exit [It] should not add X-Forwarded-Prefix if the annotation value is empty - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:57 @ 04/04/23 18:40:30.626 (10.207s)
> Enter [AfterEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:30.626
< Exit [AfterEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:30.822 (196ms)
+
+
+ > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:30.822
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:37.735 (6.913s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:40:37.735
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:40:41.759 (4.024s)
> Enter [It] should ignore Ingress without IngressClass configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:164 @ 04/04/23 18:40:41.759
< Exit [It] should ignore Ingress without IngressClass configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:164 @ 04/04/23 18:40:58.984 (17.225s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:58.984
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:59.238 (254ms)
+
+
+ > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:19.257
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:26.759 (7.502s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:04:26.759
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:04:38.804 (12.045s)
> Enter [It] should set cookie with domain - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:225 @ 04/04/23 18:04:38.804
< Exit [It] should set cookie with domain - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:225 @ 04/04/23 18:04:49.017 (10.213s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:04:49.017
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:04:49.223 (207ms)
+
+
+ > Enter [BeforeEach] [Service] Nil Service Backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:49.225
< Exit [BeforeEach] [Service] Nil Service Backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:57.104 (7.879s)
> Enter [BeforeEach] [Service] Nil Service Backend - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_nil_backend.go:34 @ 04/04/23 18:04:57.104
< Exit [BeforeEach] [Service] Nil Service Backend - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_nil_backend.go:34 @ 04/04/23 18:05:01.132 (4.029s)
> Enter [It] should return 404 when backend service is nil - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_nil_backend.go:38 @ 04/04/23 18:05:01.132
STEP: setting an ingress with a nil backend - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_nil_backend.go:39 @ 04/04/23 18:05:01.132
< Exit [It] should return 404 when backend service is nil - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_nil_backend.go:38 @ 04/04/23 18:05:18.375 (17.242s)
> Enter [AfterEach] [Service] Nil Service Backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:18.375
< Exit [AfterEach] [Service] Nil Service Backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:18.574 (200ms)
+
+
+ > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:18.575
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:25.47 (6.895s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:05:25.47
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:05:29.501 (4.031s)
> Enter [It] should set the path to /something on the generated cookie - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:99 @ 04/04/23 18:05:29.501
< Exit [It] should set the path to /something on the generated cookie - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:99 @ 04/04/23 18:05:39.685 (10.184s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:39.685
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:39.886 (201ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:39.886
< Exit [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:46.798 (6.912s)
> Enter [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:33 @ 04/04/23 18:05:46.798
< Exit [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:33 @ 04/04/23 18:05:57.853 (11.055s)
> Enter [It] should block CIDRs defined in the ConfigMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:38 @ 04/04/23 18:05:57.853
< Exit [It] should block CIDRs defined in the ConfigMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:38 @ 04/04/23 18:06:08.065 (10.213s)
> Enter [AfterEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:08.065
< Exit [AfterEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:08.304 (239ms)
+
+
+ > Enter [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:08.304
< Exit [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:15.196 (6.891s)
> Enter [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:32 @ 04/04/23 18:06:15.196
< Exit [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:32 @ 04/04/23 18:06:19.22 (4.024s)
> Enter [It] should set valid proxy read timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:36 @ 04/04/23 18:06:19.22
< Exit [It] should set valid proxy read timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:36 @ 04/04/23 18:06:36.431 (17.211s)
> Enter [AfterEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:36.431
< Exit [AfterEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:36.678 (246ms)
+
+
+ > Enter [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:36.678
< Exit [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:43.562 (6.884s)
> Enter [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:32 @ 04/04/23 18:06:43.562
< Exit [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:32 @ 04/04/23 18:06:47.588 (4.026s)
> Enter [It] should set valid proxy send timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:36 @ 04/04/23 18:06:47.588
< Exit [It] should set valid proxy send timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:36 @ 04/04/23 18:07:04.782 (17.194s)
> Enter [AfterEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:04.782
< Exit [AfterEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:04.961 (179ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:04.961
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:12.853 (7.892s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:07:12.853
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:07:20.912 (8.059s)
> Enter [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:426 @ 04/04/23 18:07:20.912
STEP: routing requests to the canary upstream when header is set to 'DoCanary' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:451 @ 04/04/23 18:07:38.088
STEP: routing requests to the mainline upstream when header is set to 'always' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:460 @ 04/04/23 18:07:38.092
STEP: routing requests to the mainline upstream when header is set to 'never' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:469 @ 04/04/23 18:07:38.097
STEP: routing requests to the mainline upstream when header is set to anything else - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:478 @ 04/04/23 18:07:38.101
< Exit [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:426 @ 04/04/23 18:07:38.105 (17.192s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:38.105
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:38.312 (208ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:38.313
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:45.57 (7.258s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:07:45.57
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:07:49.597 (4.027s)
> Enter [BeforeEach] when external authentication is configured with a custom redirect param - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:651 @ 04/04/23 18:07:49.597
< Exit [BeforeEach] when external authentication is configured with a custom redirect param - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:651 @ 04/04/23 18:08:17.835 (28.238s)
> Enter [It] keeps processing new ingresses even if one of the existing ingresses is misconfigured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:698 @ 04/04/23 18:08:17.835
< Exit [It] keeps processing new ingresses even if one of the existing ingresses is misconfigured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:698 @ 04/04/23 18:08:29.028 (11.193s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:29.028
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:29.254 (225ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:29.254
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:37.146 (7.892s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:08:37.146
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:08:45.193 (8.047s)
> Enter [It] should route requests to the correct upstream if mainline ingress is created after the canary ingress - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:206 @ 04/04/23 18:08:45.193
STEP: routing requests destined for the mainline ingress to the mainelin upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:231 @ 04/04/23 18:09:02.324
STEP: routing requests destined for the canary ingress to the canary upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:240 @ 04/04/23 18:09:02.332
< Exit [It] should route requests to the correct upstream if mainline ingress is created after the canary ingress - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:206 @ 04/04/23 18:09:02.337 (17.144s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:02.337
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:02.545 (208ms)
+
+
+ > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:02.545
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:09.432 (6.887s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:09:09.432
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:09:13.454 (4.022s)
> Enter [It] should enable modsecurity with snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:91 @ 04/04/23 18:09:13.454
< Exit [It] should enable modsecurity with snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:91 @ 04/04/23 18:09:23.682 (10.227s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:23.682
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:23.867 (185ms)
+
+
+ > Enter [BeforeEach] [Setting] settings-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:23.867
< Exit [BeforeEach] [Setting] settings-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:41.632 (2m17.765s)
> Enter [BeforeEach] [Setting] settings-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/settings/globalratelimit.go:34 @ 04/04/23 18:11:41.632
< Exit [BeforeEach] [Setting] settings-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/settings/globalratelimit.go:34 @ 04/04/23 18:11:45.686 (4.054s)
> Enter [It] generates correct NGINX configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/globalratelimit.go:38 @ 04/04/23 18:11:45.686
STEP: generating correct defaults - /go/src/k8s.io/ingress-nginx/test/e2e/settings/globalratelimit.go:43 @ 04/04/23 18:11:52.711
STEP: applying customizations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/globalratelimit.go:61 @ 04/04/23 18:11:55.865
< Exit [It] generates correct NGINX configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/globalratelimit.go:38 @ 04/04/23 18:12:06.074 (20.388s)
> Enter [AfterEach] [Setting] settings-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:06.074
< Exit [AfterEach] [Setting] settings-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:06.248 (175ms)
+
+
+ > Enter [BeforeEach] [Setting] [Load Balancer] EWMA - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:06.248
< Exit [BeforeEach] [Setting] [Load Balancer] EWMA - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:13.645 (7.397s)
> Enter [BeforeEach] [Setting] [Load Balancer] EWMA - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/ewma.go:34 @ 04/04/23 18:12:13.645
< Exit [BeforeEach] [Setting] [Load Balancer] EWMA - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/ewma.go:34 @ 04/04/23 18:12:24.689 (11.044s)
> Enter [It] does not fail requests - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/ewma.go:42 @ 04/04/23 18:12:24.689
Apr 4 18:12:39.085: INFO: Request distribution: map[echo-7b6bf466cc-4gqhv:16 echo-7b6bf466cc-kbjqx:9 echo-7b6bf466cc-scqj9:5]
< Exit [It] does not fail requests - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/ewma.go:42 @ 04/04/23 18:12:39.085 (14.396s)
> Enter [AfterEach] [Setting] [Load Balancer] EWMA - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:39.085
< Exit [AfterEach] [Setting] [Load Balancer] EWMA - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:39.295 (210ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:39.295
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:47.18 (7.884s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:12:47.18
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:12:51.204 (4.024s)
> Enter [It] should expose headers for cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:153 @ 04/04/23 18:12:51.204
< Exit [It] should expose headers for cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:153 @ 04/04/23 18:13:01.392 (10.189s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:01.392
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:01.572 (180ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:01.573
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:08.45 (6.878s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:13:08.45
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:13:16.493 (8.042s)
> Enter [It] always routes traffic to canary if first request was affinitized to canary (default behavior) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:943 @ 04/04/23 18:13:16.493
< Exit [It] always routes traffic to canary if first request was affinitized to canary (default behavior) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:943 @ 04/04/23 18:13:42.089 (25.596s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:42.089
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:42.311 (222ms)
+
+
+ > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:42.312
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:49.227 (6.915s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:13:49.227
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:14:00.268 (11.041s)
> Enter [It] should disable the log-format-escape-none - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:71 @ 04/04/23 18:14:00.268
< Exit [It] should disable the log-format-escape-none - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:71 @ 04/04/23 18:14:10.406 (10.138s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:10.406
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:10.583 (177ms)
+
+
+ > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:10.584
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:17.985 (7.402s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:14:17.985
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:14:22.015 (4.03s)
> Enter [It] should set proxy_redirect to default - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:52 @ 04/04/23 18:14:22.015
< Exit [It] should set proxy_redirect to default - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:52 @ 04/04/23 18:14:32.238 (10.222s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:32.238
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:32.409 (172ms)
+
+
+ > Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:32.41
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:40.329 (7.92s)
> Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:14:40.329
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:14:51.355 (11.026s)
> Enter [It] should set keepalive connection to upstream server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:59 @ 04/04/23 18:14:51.356
< Exit [It] should set keepalive connection to upstream server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:59 @ 04/04/23 18:15:01.513 (10.157s)
> Enter [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:01.513
< Exit [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:01.717 (204ms)
+
+
+ > Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:01.717
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:08.628 (6.911s)
> Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:15:08.628
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:15:12.654 (4.026s)
> Enter [It] should set backend protocol to https:// and use proxy_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:34 @ 04/04/23 18:15:12.654
< Exit [It] should set backend protocol to https:// and use proxy_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:34 @ 04/04/23 18:15:22.863 (10.21s)
> Enter [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:22.863
< Exit [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:23.117 (253ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:23.117
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:31.017 (7.9s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:15:31.017
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:15:35.052 (4.035s)
> Enter [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:372 @ 04/04/23 18:15:35.052
STEP: routing requests to the canary upstream when header is set to 'always' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:395 @ 04/04/23 18:15:52.235
STEP: routing requests to the mainline upstream when header is set to 'never' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:404 @ 04/04/23 18:15:52.237
STEP: routing requests to the mainline upstream when header is set to anything else - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:414 @ 04/04/23 18:15:52.239
< Exit [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:372 @ 04/04/23 18:15:52.24 (17.188s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:52.24
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:52.427 (187ms)
+
+
+ > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:52.428
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:59.303 (6.876s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:15:59.303
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:16:03.326 (4.022s)
> Enter [It] should exists opentracing_location_operation_name directive when is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:145 @ 04/04/23 18:16:03.326
< Exit [It] should exists opentracing_location_operation_name directive when is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:145 @ 04/04/23 18:16:20.959 (17.634s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:20.959
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:22.171 (1.211s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:16:22.171
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:16:22.171 (0s)
+
+
+ > Enter [BeforeEach] [Annotations] limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:22.172
< Exit [BeforeEach] [Annotations] limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:31.372 (9.2s)
> Enter [BeforeEach] [Annotations] limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitrate.go:33 @ 04/04/23 18:16:31.372
< Exit [BeforeEach] [Annotations] limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitrate.go:33 @ 04/04/23 18:16:35.41 (4.038s)
> Enter [It] Check limit-rate annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitrate.go:37 @ 04/04/23 18:16:35.41
< Exit [It] Check limit-rate annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitrate.go:37 @ 04/04/23 18:16:49.822 (14.412s)
> Enter [AfterEach] [Annotations] limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:49.822
< Exit [AfterEach] [Annotations] limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:50.037 (215ms)
+
+
+ > Enter [BeforeEach] [Setting] configmap stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:50.037
< Exit [BeforeEach] [Setting] configmap stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:57.908 (7.87s)
> Enter [BeforeEach] [Setting] configmap stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/settings/stream_snippet.go:38 @ 04/04/23 18:16:57.908
< Exit [BeforeEach] [Setting] configmap stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/settings/stream_snippet.go:38 @ 04/04/23 18:17:01.931 (4.024s)
> Enter [It] should add value of stream-snippet via config map to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/stream_snippet.go:42 @ 04/04/23 18:17:01.931
< Exit [It] should add value of stream-snippet via config map to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/stream_snippet.go:42 @ 04/04/23 18:17:24.158 (22.227s)
> Enter [AfterEach] [Setting] configmap stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:24.158
< Exit [AfterEach] [Setting] configmap stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:24.349 (191ms)
+
+
+ > Enter [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:24.35
< Exit [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:31.239 (6.889s)
> Enter [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:79 @ 04/04/23 18:17:31.239
< Exit [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:79 @ 04/04/23 18:17:39.264 (8.025s)
> Enter [It] should connect to the same pod - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:83 @ 04/04/23 18:17:39.264
< Exit [It] should connect to the same pod - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:83 @ 04/04/23 18:18:09.666 (30.402s)
> Enter [AfterEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:09.666
< Exit [AfterEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:09.903 (237ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:09.904
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:16.786 (6.882s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:18:16.786
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:18:20.804 (4.018s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:18:20.804
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:18:35.029 (14.226s)
> Enter [It] should not create additional upstream block when auth-keepalive is set with HTTP/2 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:609 @ 04/04/23 18:18:35.029
< Exit [It] should not create additional upstream block when auth-keepalive is set with HTTP/2 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:609 @ 04/04/23 18:18:41.107 (6.078s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:41.107
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:41.32 (212ms)
+
+
+ > Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:41.32
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:49.195 (7.875s)
> Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 04/04/23 18:18:49.195
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 04/04/23 18:18:53.217 (4.022s)
> Enter [It] should set valid proxy-ssl-secret - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:37 @ 04/04/23 18:18:53.217
< Exit [It] should set valid proxy-ssl-secret - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:37 @ 04/04/23 18:19:04.077 (10.86s)
> Enter [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:04.077
< Exit [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:04.257 (181ms)
+
+
+ > Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:04.258
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:12.153 (7.895s)
> Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 04/04/23 18:19:12.153
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 04/04/23 18:19:16.174 (4.021s)
> Enter [It] should set valid proxy-ssl-secret, proxy-ssl-ciphers to HIGH:!AES - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:94 @ 04/04/23 18:19:16.174
< Exit [It] should set valid proxy-ssl-secret, proxy-ssl-ciphers to HIGH:!AES - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:94 @ 04/04/23 18:19:27.319 (11.146s)
> Enter [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:27.32
< Exit [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:27.668 (348ms)
+
+
+ > Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:27.668
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:34.827 (7.159s)
> Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:19:34.827
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:19:38.85 (4.023s)
> Enter [It] should set backend protocol to '' and use fastcgi_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:94 @ 04/04/23 18:19:38.85
< Exit [It] should set backend protocol to '' and use fastcgi_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:94 @ 04/04/23 18:19:49.066 (10.216s)
> Enter [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:49.066
< Exit [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:49.312 (246ms)
+
+
+ > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:49.312
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:57.192 (7.879s)
> Enter [It] should return status 502 for service type=ExternalName with an invalid host - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:153 @ 04/04/23 18:19:57.192
< Exit [It] should return status 502 for service type=ExternalName with an invalid host - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:153 @ 04/04/23 18:20:12.695 (15.504s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:12.695
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:13.536 (840ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:13.536
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:20.628 (7.092s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:20:20.628
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:20:28.704 (8.077s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:20:28.704
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 04/04/23 18:20:28.704
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 04/04/23 18:20:38.882
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 04/04/23 18:20:49.057
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:20:59.272 (30.567s)
> Enter [It] should set request-redirect when global-auth-request-redirect is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:237 @ 04/04/23 18:20:59.272
STEP: Adding a global-auth-request-redirect to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:242 @ 04/04/23 18:20:59.272
< Exit [It] should set request-redirect when global-auth-request-redirect is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:237 @ 04/04/23 18:21:09.45 (10.178s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:09.45
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:09.625 (175ms)
+
+
+ > Enter [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:09.625
< Exit [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:16.495 (6.87s)
> Enter [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:36 @ 04/04/23 18:21:16.495
< Exit [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:36 @ 04/04/23 18:21:20.516 (4.021s)
> Enter [It] should not use the Service Cluster IP and Port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:99 @ 04/04/23 18:21:20.516
STEP: checking if the service is reached - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:113 @ 04/04/23 18:21:37.731
STEP: checking if the Service Cluster IP and Port are not used - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:120 @ 04/04/23 18:21:37.737
< Exit [It] should not use the Service Cluster IP and Port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:99 @ 04/04/23 18:21:37.9 (17.384s)
> Enter [AfterEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:37.9
< Exit [AfterEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:38.126 (226ms)
+
+
+ > Enter [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:38.126
< Exit [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:46.024 (7.897s)
> Enter [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:32 @ 04/04/23 18:21:46.024
< Exit [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:32 @ 04/04/23 18:21:50.044 (4.02s)
> Enter [It] should return status code 200 for host 'foo' and 'bar' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:62 @ 04/04/23 18:21:50.044
< Exit [It] should return status code 200 for host 'foo' and 'bar' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:62 @ 04/04/23 18:22:00.233 (10.189s)
> Enter [AfterEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:00.233
< Exit [AfterEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:00.414 (181ms)
+
+
+ > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:00.414
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:07.306 (6.892s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:22:07.306
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:22:18.341 (11.035s)
> Enter [It] should not configure log-format escape by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:40 @ 04/04/23 18:22:18.341
< Exit [It] should not configure log-format escape by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:40 @ 04/04/23 18:22:21.446 (3.105s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:21.446
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:21.733 (287ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:21.733
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:39.876 (2m18.143s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:24:39.876
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:24:47.956 (8.08s)
> Enter [It] should route requests to the correct upstream if the mainline ingress is modified - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:250 @ 04/04/23 18:24:47.956
STEP: routing requests destined fro the mainline ingress to the mainline upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:288 @ 04/04/23 18:25:09.571
STEP: routing requests destined for the canary ingress to the canary upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:297 @ 04/04/23 18:25:09.578
< Exit [It] should route requests to the correct upstream if the mainline ingress is modified - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:250 @ 04/04/23 18:25:09.586 (21.629s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:09.586
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:09.787 (201ms)
+
+
+ > Enter [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:09.787
< Exit [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:16.668 (6.881s)
> Enter [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:79 @ 04/04/23 18:25:16.668
< Exit [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:79 @ 04/04/23 18:25:24.696 (8.028s)
> Enter [It] should connect to the same subset of pods - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:92 @ 04/04/23 18:25:24.696
< Exit [It] should connect to the same subset of pods - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:92 @ 04/04/23 18:25:55.101 (30.405s)
> Enter [AfterEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:55.101
< Exit [AfterEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:55.343 (242ms)
+
+
+ > Enter [BeforeEach] [SSL] redirect to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:55.344
< Exit [BeforeEach] [SSL] redirect to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:02.277 (6.934s)
> Enter [BeforeEach] [SSL] redirect to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/http_redirect.go:32 @ 04/04/23 18:26:02.277
< Exit [BeforeEach] [SSL] redirect to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/http_redirect.go:32 @ 04/04/23 18:26:06.299 (4.021s)
> Enter [It] should redirect from HTTP to HTTPS when secret is missing - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/http_redirect.go:36 @ 04/04/23 18:26:06.299
< Exit [It] should redirect from HTTP to HTTPS when secret is missing - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/http_redirect.go:36 @ 04/04/23 18:26:19.516 (13.217s)
> Enter [AfterEach] [SSL] redirect to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:19.516
< Exit [AfterEach] [SSL] redirect to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:19.717 (201ms)
+
+
+ > Enter [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:19.718
< Exit [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:26.668 (6.951s)
> Enter [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:31 @ 04/04/23 18:26:26.668
< Exit [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:31 @ 04/04/23 18:26:30.695 (4.027s)
> Enter [It] should add global server-snippet and drop annotations per admin config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:92 @ 04/04/23 18:26:30.695
< Exit [It] should add global server-snippet and drop annotations per admin config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:92 @ 04/04/23 18:27:02.982 (32.287s)
> Enter [AfterEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:02.982
< Exit [AfterEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:03.156 (175ms)
+
+
+ > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:03.157
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:11.021 (7.864s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:27:11.021
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:27:15.049 (4.028s)
> Enter [It] should set cookie with expires - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:194 @ 04/04/23 18:27:15.049
< Exit [It] should set cookie with expires - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:194 @ 04/04/23 18:27:25.315 (10.266s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:25.315
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:25.546 (231ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:25.547
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:32.464 (6.917s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:27:32.464
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:27:36.484 (4.02s)
> Enter [It] should allow - matching origin with wildcard origin (2 subdomains) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:425 @ 04/04/23 18:27:36.484
< Exit [It] should allow - matching origin with wildcard origin (2 subdomains) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:425 @ 04/04/23 18:27:43.52 (7.037s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:43.52
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:43.695 (175ms)
+
+
+ > Enter [BeforeEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:43.696
< Exit [BeforeEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:50.592 (6.896s)
> Enter [It] should be enabled when set to true - /go/src/k8s.io/ingress-nginx/test/e2e/settings/multi_accept.go:39 @ 04/04/23 18:27:50.592
< Exit [It] should be enabled when set to true - /go/src/k8s.io/ingress-nginx/test/e2e/settings/multi_accept.go:39 @ 04/04/23 18:28:00.821 (10.229s)
> Enter [AfterEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:00.821
< Exit [AfterEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:01.043 (221ms)
+
+
+ > Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:01.043
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:08.918 (7.875s)
> Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 04/04/23 18:28:08.918
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 04/04/23 18:28:12.942 (4.024s)
> Enter [It] [BAD_ANNOTATIONS] should allow an ingress if there is a default blocklist config in place - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:102 @ 04/04/23 18:28:12.942
< Exit [It] [BAD_ANNOTATIONS] should allow an ingress if there is a default blocklist config in place - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:102 @ 04/04/23 18:28:31.293 (18.352s)
> Enter [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:31.293
< Exit [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:31.512 (218ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:31.512
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:38.394 (6.882s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:28:38.394
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:28:46.454 (8.06s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:28:46.454
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 04/04/23 18:28:46.454
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 04/04/23 18:28:56.618
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 04/04/23 18:29:06.764
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:29:16.991 (30.537s)
> Enter [It] should return status code 200 when request whitelisted (via ingress annotation) service and 401 when request protected service - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:126 @ 04/04/23 18:29:16.991
STEP: Adding an ingress rule for /bar with annotation enable-global-auth = false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:128 @ 04/04/23 18:29:16.991
STEP: Sending a request to protected service /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:140 @ 04/04/23 18:29:21.174
STEP: Sending a request to whitelisted service /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:147 @ 04/04/23 18:29:21.184
< Exit [It] should return status code 200 when request whitelisted (via ingress annotation) service and 401 when request protected service - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:126 @ 04/04/23 18:29:21.191 (4.2s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:21.191
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:21.411 (220ms)
+
+
+ > Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:21.411
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:28.853 (7.441s)
> Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 04/04/23 18:29:28.853
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 04/04/23 18:29:43.082 (14.23s)
> Enter [It] handles an annotation change - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:171 @ 04/04/23 18:29:43.082
< Exit [It] handles an annotation change - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:171 @ 04/04/23 18:29:49.435 (6.352s)
> Enter [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:49.435
< Exit [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:49.619 (185ms)
+
+
+ > Enter [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:49.62
< Exit [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:56.496 (6.875s)
> Enter [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:34 @ 04/04/23 18:29:56.496
< Exit [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:34 @ 04/04/23 18:30:00.515 (4.019s)
> Enter [It] should exists Server header in the response when is enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:50 @ 04/04/23 18:30:00.515
< Exit [It] should exists Server header in the response when is enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:50 @ 04/04/23 18:30:17.68 (17.166s)
> Enter [AfterEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:17.68
< Exit [AfterEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:17.86 (179ms)
+
+
+ > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:17.86
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:24.767 (6.907s)
> Enter [It] works with external name set to incomplete fqdn - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:62 @ 04/04/23 18:30:24.767
< Exit [It] works with external name set to incomplete fqdn - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:62 @ 04/04/23 18:30:38.985 (14.218s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:38.985
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:39.203 (218ms)
+
+
+ > Enter [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:39.204
< Exit [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:47.098 (7.895s)
> Enter [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:33 @ 04/04/23 18:30:47.098
< Exit [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:33 @ 04/04/23 18:30:51.122 (4.023s)
> Enter [It] should list the backend servers - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:37 @ 04/04/23 18:30:51.122
< Exit [It] should list the backend servers - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:37 @ 04/04/23 18:31:01.391 (10.269s)
> Enter [AfterEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:01.391
< Exit [AfterEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:01.582 (191ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:01.582
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:08.498 (6.915s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:31:08.498
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:31:16.564 (8.066s)
> Enter [It] does not crash when canary ingress has multiple paths to the same non-matching backend - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:915 @ 04/04/23 18:31:16.564
< Exit [It] does not crash when canary ingress has multiple paths to the same non-matching backend - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:915 @ 04/04/23 18:31:33.8 (17.236s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:33.8
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:34.042 (242ms)
+
+
+ > Enter [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:34.042
< Exit [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:40.946 (6.904s)
> Enter [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:36 @ 04/04/23 18:31:40.946
< Exit [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:36 @ 04/04/23 18:31:44.981 (4.035s)
> Enter [It] should use the Service Cluster IP and Port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:41 @ 04/04/23 18:31:44.981
STEP: checking if the service is reached - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:53 @ 04/04/23 18:31:55.094
STEP: checking if the Service Cluster IP and Port are used - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:60 @ 04/04/23 18:31:55.098
< Exit [It] should use the Service Cluster IP and Port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:41 @ 04/04/23 18:31:55.252 (10.271s)
> Enter [AfterEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:55.252
< Exit [AfterEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:55.492 (240ms)
+
+
+ > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:55.493
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:02.366 (6.874s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:32:02.366
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:32:06.394 (4.028s)
> Enter [It] should enable modsecurity when enable-owasp-modsecurity-crs is set to true - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:225 @ 04/04/23 18:32:06.394
< Exit [It] should enable modsecurity when enable-owasp-modsecurity-crs is set to true - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:225 @ 04/04/23 18:32:35.569 (29.175s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:35.569
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:35.753 (184ms)
+
+
+
+ > Enter [BeforeEach] [Security] Pod Security Policies with volumes - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:35.753
< Exit [BeforeEach] [Security] Pod Security Policies with volumes - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:42.66 (6.907s)
> Enter [It] should be running with a Pod Security Policy - /go/src/k8s.io/ingress-nginx/test/e2e/settings/pod_security_policy_volumes.go:40 @ 04/04/23 18:32:42.66
[SKIPPED] PSP not supported in this version
In [It] at: /go/src/k8s.io/ingress-nginx/test/e2e/settings/pod_security_policy_volumes.go:53 @ 04/04/23 18:32:42.661
< Exit [It] should be running with a Pod Security Policy - /go/src/k8s.io/ingress-nginx/test/e2e/settings/pod_security_policy_volumes.go:40 @ 04/04/23 18:32:42.661 (1ms)
> Enter [AfterEach] [Security] Pod Security Policies with volumes - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:42.661
< Exit [AfterEach] [Security] Pod Security Policies with volumes - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:42.858 (197ms)
+
+
+ > Enter [BeforeEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:42.858
< Exit [BeforeEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:49.722 (6.864s)
> Enter [It] should respond with a custom redirect code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:61 @ 04/04/23 18:32:49.722
STEP: setting permanent-redirect-code annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:62 @ 04/04/23 18:32:49.722
STEP: sending request to redirected URL path - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:82 @ 04/04/23 18:32:59.899
< Exit [It] should respond with a custom redirect code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:61 @ 04/04/23 18:32:59.901 (10.18s)
> Enter [AfterEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:59.901
< Exit [AfterEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:00.105 (203ms)
+
+
+ > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:00.105
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:07.991 (7.886s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:33:07.991
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:33:19.06 (11.069s)
> Enter [It] should set proxy-headers-hash-bucket-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:60 @ 04/04/23 18:33:19.06
< Exit [It] should set proxy-headers-hash-bucket-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:60 @ 04/04/23 18:33:29.206 (10.146s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:29.206
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:29.433 (227ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:29.433
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:36.312 (6.878s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:33:36.312
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:33:42.335 (6.023s)
> Enter [It] should allow correct origins - single origin for multiple cors values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:216 @ 04/04/23 18:33:42.335
< Exit [It] should allow correct origins - single origin for multiple cors values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:216 @ 04/04/23 18:33:49.381 (7.046s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:49.381
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:49.571 (190ms)
+
+
+ > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:49.571
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:56.527 (6.956s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:33:56.527
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:34:00.557 (4.03s)
> Enter [It] should disable default modsecurity conf setting when modsecurity-snippet is specified - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:347 @ 04/04/23 18:34:00.557
< Exit [It] should disable default modsecurity conf setting when modsecurity-snippet is specified - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:347 @ 04/04/23 18:34:22.694 (22.137s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:22.694
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:22.91 (216ms)
+
+
+ > Enter [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:22.91
< Exit [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:29.807 (6.897s)
> Enter [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:42 @ 04/04/23 18:34:29.807
< Exit [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:42 @ 04/04/23 18:34:29.814 (6ms)
> Enter [It] should expose a TCP service - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:46 @ 04/04/23 18:34:29.814
< Exit [It] should expose a TCP service - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:46 @ 04/04/23 18:34:36.97 (7.156s)
> Enter [AfterEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:36.97
< Exit [AfterEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:37.169 (200ms)
+
+
+ > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:37.17
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:45.073 (7.903s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:34:45.073
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:34:49.091 (4.018s)
> Enter [It] should enable modsecurity through the config map - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:264 @ 04/04/23 18:34:49.091
< Exit [It] should enable modsecurity through the config map - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:264 @ 04/04/23 18:35:18.316 (29.225s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:18.316
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:18.518 (202ms)
+
+
+ > Enter [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:18.518
< Exit [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:25.408 (6.889s)
> Enter [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:32 @ 04/04/23 18:35:25.408
< Exit [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:32 @ 04/04/23 18:35:36.46 (11.052s)
> Enter [It] reuse port should be enabled by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:38 @ 04/04/23 18:35:36.46
< Exit [It] reuse port should be enabled by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:38 @ 04/04/23 18:35:39.652 (3.192s)
> Enter [AfterEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:39.652
< Exit [AfterEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:39.91 (258ms)
+
+
+ > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:39.91
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:46.843 (6.933s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:35:46.843
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:35:50.861 (4.018s)
> Enter [BeforeEach] Without IngressClass Cluster scoped Permission - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:587 @ 04/04/23 18:35:50.861
< Exit [BeforeEach] Without IngressClass Cluster scoped Permission - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:587 @ 04/04/23 18:35:58.882 (8.021s)
> Enter [It] should watch Ingress with correct annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:631 @ 04/04/23 18:35:58.882
< Exit [It] should watch Ingress with correct annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:631 @ 04/04/23 18:36:09.027 (10.145s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:09.027
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:09.241 (213ms)
+
+
+ > Enter [BeforeEach] [Ingress] [PathType] prefix checks - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:09.241
< Exit [BeforeEach] [Ingress] [PathType] prefix checks - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:17.143 (7.901s)
> Enter [BeforeEach] [Ingress] [PathType] prefix checks - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_prefix.go:31 @ 04/04/23 18:36:17.143
< Exit [BeforeEach] [Ingress] [PathType] prefix checks - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_prefix.go:31 @ 04/04/23 18:36:21.166 (4.023s)
> Enter [It] should return 404 when prefix /aaa does not match request /aaaccc - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_prefix.go:35 @ 04/04/23 18:36:21.166
< Exit [It] should return 404 when prefix /aaa does not match request /aaaccc - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_prefix.go:35 @ 04/04/23 18:36:31.412 (10.246s)
> Enter [AfterEach] [Ingress] [PathType] prefix checks - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:31.412
< Exit [AfterEach] [Ingress] [PathType] prefix checks - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:32.055 (644ms)
+
+
+ > Enter [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:32.057
< Exit [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:39.923 (7.865s)
> Enter [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:32 @ 04/04/23 18:36:39.923
< Exit [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:32 @ 04/04/23 18:36:43.949 (4.026s)
> Enter [It] should set mirror-target to https://test.env.com/$request_uri - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:51 @ 04/04/23 18:36:43.949
< Exit [It] should set mirror-target to https://test.env.com/$request_uri - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:51 @ 04/04/23 18:36:54.141 (10.192s)
> Enter [AfterEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:54.141
< Exit [AfterEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:54.342 (200ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:54.342
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:01.212 (6.87s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:37:01.212
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:37:07.231 (6.019s)
> Enter [It] should set valid auth-tls-secret, sslVerify to off, and sslVerifyDepth to 2 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:84 @ 04/04/23 18:37:07.231
< Exit [It] should set valid auth-tls-secret, sslVerify to off, and sslVerifyDepth to 2 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:84 @ 04/04/23 18:37:17.855 (10.625s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:17.855
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:18.076 (221ms)
+
+
+ > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:18.076
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:25.984 (7.907s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:37:25.984
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:37:30.003 (4.019s)
> Enter [It] should work with use-regex annotation and session-cookie-path - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:270 @ 04/04/23 18:37:30.003
< Exit [It] should work with use-regex annotation and session-cookie-path - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:270 @ 04/04/23 18:37:40.203 (10.201s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:40.203
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:40.453 (250ms)
+
+
+ > Enter [BeforeEach] [Setting] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:40.453
< Exit [BeforeEach] [Setting] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:47.317 (6.864s)
> Enter [It] Add ssl ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_ciphers.go:31 @ 04/04/23 18:37:47.317
< Exit [It] Add ssl ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_ciphers.go:31 @ 04/04/23 18:37:57.514 (10.197s)
> Enter [AfterEach] [Setting] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:57.514
< Exit [AfterEach] [Setting] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:57.725 (211ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:57.725
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:04.608 (6.883s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:38:04.608
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:38:08.636 (4.028s)
> Enter [It] should return status code 200 when authentication is configured and Authorization header is sent - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:172 @ 04/04/23 18:38:08.636
< Exit [It] should return status code 200 when authentication is configured and Authorization header is sent - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:172 @ 04/04/23 18:38:20.58 (11.945s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:20.58
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:20.761 (181ms)
+
+
+ > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:20.762
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:27.757 (6.995s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:38:27.757
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:38:31.784 (4.027s)
> Enter [It] should set proxy_redirect to hello.com goodbye.com - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:68 @ 04/04/23 18:38:31.784
< Exit [It] should set proxy_redirect to hello.com goodbye.com - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:68 @ 04/04/23 18:38:41.901 (10.118s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:41.901
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:42.108 (207ms)
+
+
+ > Enter [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:42.108
< Exit [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:50.04 (7.932s)
> Enter [It] use the default configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:32 @ 04/04/23 18:38:50.04
< Exit [It] use the default configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:32 @ 04/04/23 18:38:53.238 (3.198s)
> Enter [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:53.238
< Exit [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:53.443 (205ms)
+
+
+ > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:53.443
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:00.319 (6.876s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:39:00.319
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:39:04.344 (4.026s)
> Enter [It] should not exists opentracing directive - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:58 @ 04/04/23 18:39:04.344
< Exit [It] should not exists opentracing directive - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:58 @ 04/04/23 18:39:21.438 (17.094s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:21.438
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:21.668 (229ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:39:21.668
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:39:21.668 (0s)
+
+
+ > Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:21.67
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:29.901 (8.232s)
> Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 04/04/23 18:39:29.901
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 04/04/23 18:39:40.966 (11.065s)
> Enter [It] should delete Ingress updated to catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:81 @ 04/04/23 18:39:40.966
< Exit [It] should delete Ingress updated to catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:81 @ 04/04/23 18:39:55.23 (14.264s)
> Enter [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:55.23
< Exit [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:55.411 (181ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:55.412
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:03.291 (7.88s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:40:03.291
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:40:11.34 (8.049s)
> Enter [It] should route requests only to mainline if canary weight is 0 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:705 @ 04/04/23 18:40:11.34
< Exit [It] should route requests only to mainline if canary weight is 0 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:705 @ 04/04/23 18:40:31.758 (20.417s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:31.758
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:31.95 (192ms)
+
+
+ > Enter [BeforeEach] single ingress - multiple hosts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:31.951
< Exit [BeforeEach] single ingress - multiple hosts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:39.859 (7.909s)
> Enter [BeforeEach] single ingress - multiple hosts - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/multiple_rules.go:33 @ 04/04/23 18:40:39.859
< Exit [BeforeEach] single ingress - multiple hosts - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/multiple_rules.go:33 @ 04/04/23 18:40:47.913 (8.054s)
> Enter [It] should set the correct $service_name NGINX variable - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/multiple_rules.go:38 @ 04/04/23 18:40:47.913
< Exit [It] should set the correct $service_name NGINX variable - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/multiple_rules.go:38 @ 04/04/23 18:41:01.214 (13.301s)
> Enter [AfterEach] single ingress - multiple hosts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:41:01.214
< Exit [AfterEach] single ingress - multiple hosts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:41:01.409 (195ms)
+
+
+ > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:19.256
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:27.796 (8.54s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:04:27.796
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:04:39.83 (12.034s)
> Enter [BeforeEach] With watch-ingress-without-class flag - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:462 @ 04/04/23 18:04:39.83
< Exit [BeforeEach] With watch-ingress-without-class flag - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:462 @ 04/04/23 18:04:46.871 (7.041s)
> Enter [It] should watch Ingress with no class and ignore ingress with a different class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:482 @ 04/04/23 18:04:46.871
< Exit [It] should watch Ingress with no class and ignore ingress with a different class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:482 @ 04/04/23 18:05:04.134 (17.262s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:04.134
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:04.398 (264ms)
+
+
+ > Enter [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:04.398
< Exit [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:11.399 (7.001s)
> Enter [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:36 @ 04/04/23 18:05:11.399
< Exit [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:36 @ 04/04/23 18:05:15.426 (4.027s)
> Enter [It] should use the Service Cluster IP and Port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:70 @ 04/04/23 18:05:15.426
STEP: checking if the service is reached - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:82 @ 04/04/23 18:05:32.603
STEP: checking if the Service Cluster IP and Port are used - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:89 @ 04/04/23 18:05:32.612
< Exit [It] should use the Service Cluster IP and Port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:70 @ 04/04/23 18:05:32.783 (17.357s)
> Enter [AfterEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:32.783
< Exit [AfterEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:32.966 (182ms)
+
+
+ > Enter [BeforeEach] [Flag] disable-service-external-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:32.966
< Exit [BeforeEach] [Flag] disable-service-external-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:40.858 (7.892s)
> Enter [BeforeEach] [Flag] disable-service-external-name - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_service_external_name.go:38 @ 04/04/23 18:05:40.858
< Exit [BeforeEach] [Flag] disable-service-external-name - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_service_external_name.go:38 @ 04/04/23 18:05:52.924 (12.066s)
> Enter [It] should ignore services of external-name type - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_service_external_name.go:52 @ 04/04/23 18:05:52.924
< Exit [It] should ignore services of external-name type - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_service_external_name.go:52 @ 04/04/23 18:06:13.273 (20.349s)
> Enter [AfterEach] [Flag] disable-service-external-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:13.273
< Exit [AfterEach] [Flag] disable-service-external-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:13.49 (217ms)
+
+
+ > Enter [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:13.49
< Exit [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:20.419 (6.929s)
> Enter [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:38 @ 04/04/23 18:06:20.419
< Exit [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:38 @ 04/04/23 18:06:24.447 (4.029s)
> Enter [It] should configure satisfy directive correctly - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:42 @ 04/04/23 18:06:24.447
< Exit [It] should configure satisfy directive correctly - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:42 @ 04/04/23 18:06:41.792 (17.345s)
> Enter [AfterEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:41.792
< Exit [AfterEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:41.98 (187ms)
+
+
+ > Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:41.98
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:49.854 (7.874s)
> Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:06:49.854
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:07:00.907 (11.052s)
> Enter [It] should set keep alive connection timeout to upstream server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:68 @ 04/04/23 18:07:00.907
< Exit [It] should set keep alive connection timeout to upstream server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:68 @ 04/04/23 18:07:11.072 (10.166s)
> Enter [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:11.073
< Exit [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:11.276 (203ms)
+
+
+ > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:11.277
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:19.172 (7.895s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:07:19.172
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:07:28.212 (9.04s)
> Enter [It] should set vmap-hash-bucket-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:100 @ 04/04/23 18:07:28.212
< Exit [It] should set vmap-hash-bucket-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:100 @ 04/04/23 18:07:38.38 (10.168s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:38.38
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:38.612 (232ms)
+
+
+ > Enter [BeforeEach] [Setting] [Load Balancer] load-balance - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:38.613
< Exit [BeforeEach] [Setting] [Load Balancer] load-balance - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:45.664 (7.051s)
> Enter [BeforeEach] [Setting] [Load Balancer] load-balance - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/configmap.go:31 @ 04/04/23 18:07:45.664
< Exit [BeforeEach] [Setting] [Load Balancer] load-balance - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/configmap.go:31 @ 04/04/23 18:07:49.689 (4.025s)
> Enter [It] should apply the configmap load-balance setting - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/configmap.go:35 @ 04/04/23 18:07:49.689
< Exit [It] should apply the configmap load-balance setting - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/configmap.go:35 @ 04/04/23 18:08:07.048 (17.358s)
> Enter [AfterEach] [Setting] [Load Balancer] load-balance - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:07.048
< Exit [AfterEach] [Setting] [Load Balancer] load-balance - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:07.227 (180ms)
+
+
+ > Enter [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:07.228
< Exit [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:25.86 (2m18.633s)
> Enter [It] authorization metadata should be overwritten by external auth response headers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:126 @ 04/04/23 18:10:25.86
< Exit [It] authorization metadata should be overwritten by external auth response headers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:126 @ 04/04/23 18:10:44.166 (18.305s)
> Enter [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:44.166
< Exit [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:44.384 (218ms)
+
+
+ > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:44.385
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:51.27 (6.885s)
> Enter [It] should update the external name after a service update - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:248 @ 04/04/23 18:10:51.27
STEP: checking the service is updated to use eu.httpbin.org - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:304 @ 04/04/23 18:11:06.958
< Exit [It] should update the external name after a service update - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:248 @ 04/04/23 18:11:07.097 (15.827s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:07.097
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:07.302 (205ms)
+
+
+ > Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:07.302
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:15.212 (7.91s)
> Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 04/04/23 18:11:15.212
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 04/04/23 18:11:19.237 (4.025s)
> Enter [It] should set valid proxy-ssl-secret, proxy-ssl-verify to on, proxy-ssl-verify-depth to 2, and proxy-ssl-server-name to on - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:64 @ 04/04/23 18:11:19.237
< Exit [It] should set valid proxy-ssl-secret, proxy-ssl-verify to on, proxy-ssl-verify-depth to 2, and proxy-ssl-server-name to on - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:64 @ 04/04/23 18:11:30.15 (10.913s)
> Enter [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:30.15
< Exit [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:30.361 (211ms)
+
+
+ > Enter [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:30.361
< Exit [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:37.259 (6.898s)
> Enter [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:30 @ 04/04/23 18:11:37.259
< Exit [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:30 @ 04/04/23 18:11:39.287 (2.028s)
> Enter [It] set rewrite_log on - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:49 @ 04/04/23 18:11:39.287
< Exit [It] set rewrite_log on - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:49 @ 04/04/23 18:11:49.482 (10.195s)
> Enter [AfterEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:49.482
< Exit [AfterEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:49.703 (222ms)
+
+
+ > Enter [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:49.704
< Exit [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:56.672 (6.968s)
> Enter [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:32 @ 04/04/23 18:11:56.672
< Exit [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:32 @ 04/04/23 18:12:07.713 (11.041s)
> Enter [It] reuse port should be enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:52 @ 04/04/23 18:12:07.713
< Exit [It] reuse port should be enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:52 @ 04/04/23 18:12:17.909 (10.196s)
> Enter [AfterEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:17.909
< Exit [AfterEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:18.149 (239ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:18.149
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:26.102 (7.953s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:12:26.102
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:12:34.143 (8.041s)
> Enter [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:604 @ 04/04/23 18:12:34.143
STEP: routing requests to the canary upstream when header value does not match and cookie is set to 'always' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:630 @ 04/04/23 18:12:51.301
< Exit [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:604 @ 04/04/23 18:12:51.309 (17.166s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:51.309
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:51.494 (185ms)
+
+
+ > Enter [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:51.494
< Exit [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:58.391 (6.897s)
> Enter [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:31 @ 04/04/23 18:12:58.391
< Exit [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:31 @ 04/04/23 18:13:02.411 (4.02s)
> Enter [It] drops server snippet if disabled by the administrator - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:61 @ 04/04/23 18:13:02.411
< Exit [It] drops server snippet if disabled by the administrator - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:61 @ 04/04/23 18:13:31.674 (29.262s)
> Enter [AfterEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:31.674
< Exit [AfterEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:31.873 (199ms)
+
+
+ > Enter [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:31.874
< Exit [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:38.753 (6.879s)
> Enter [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:67 @ 04/04/23 18:13:38.753
< Exit [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:67 @ 04/04/23 18:13:48.95 (10.197s)
> Enter [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:48.95
< Exit [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:49.177 (226ms)
+
+
+
+ > Enter [BeforeEach] [Security] Pod Security Policies - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:49.177
< Exit [BeforeEach] [Security] Pod Security Policies - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:57.081 (7.904s)
> Enter [It] should be running with a Pod Security Policy - /go/src/k8s.io/ingress-nginx/test/e2e/settings/pod_security_policy.go:44 @ 04/04/23 18:13:57.081
[SKIPPED] PSP not supported in this version
In [It] at: /go/src/k8s.io/ingress-nginx/test/e2e/settings/pod_security_policy.go:56 @ 04/04/23 18:13:57.084
< Exit [It] should be running with a Pod Security Policy - /go/src/k8s.io/ingress-nginx/test/e2e/settings/pod_security_policy.go:44 @ 04/04/23 18:13:57.084 (2ms)
> Enter [AfterEach] [Security] Pod Security Policies - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:57.084
< Exit [AfterEach] [Security] Pod Security Policies - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:57.316 (232ms)
+
+
+ > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:57.316
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:04.203 (6.887s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:14:04.203
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:14:08.231 (4.028s)
> Enter [It] should enable modsecurity with snippet and block requests - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:153 @ 04/04/23 18:14:08.231
< Exit [It] should enable modsecurity with snippet and block requests - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:153 @ 04/04/23 18:14:30.484 (22.253s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:30.484
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:30.708 (223ms)
+
+
+ > Enter [BeforeEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:30.708
< Exit [BeforeEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:37.628 (6.92s)
> Enter [It] should not create sync events - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_sync_events.go:80 @ 04/04/23 18:14:37.628
< Exit [It] should not create sync events - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_sync_events.go:80 @ 04/04/23 18:15:00.832 (23.203s)
> Enter [AfterEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:00.832
< Exit [AfterEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:01.031 (199ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:01.031
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:07.953 (6.922s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:15:07.953
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:15:11.978 (4.025s)
> Enter [It] should validate auth-tls-verify-client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:206 @ 04/04/23 18:15:11.978
< Exit [It] should validate auth-tls-verify-client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:206 @ 04/04/23 18:15:26.888 (14.91s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:26.888
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:27.083 (195ms)
+
+
+ > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:27.083
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:34.978 (7.895s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:15:34.978
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:15:39.01 (4.032s)
> Enter [It] should enable opentracing using zipkin - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:160 @ 04/04/23 18:15:39.01
< Exit [It] should enable opentracing using zipkin - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:160 @ 04/04/23 18:15:59.042 (20.032s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:59.042
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:59.301 (259ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:15:59.301
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:15:59.301 (0s)
+
+
+ > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:59.302
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:06.324 (7.022s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:16:06.324
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:16:10.352 (4.028s)
> Enter [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 04/04/23 18:16:10.352
STEP: configuring certificate_by_lua and skipping Nginx configuration of the new certificate - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:128 @ 04/04/23 18:16:28.235
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:136 @ 04/04/23 18:16:36.64
< Exit [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 04/04/23 18:16:36.649 (26.297s)
> Enter [It] picks up a non-certificate only change - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:218 @ 04/04/23 18:16:36.649
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:229 @ 04/04/23 18:16:41.653
< Exit [It] picks up a non-certificate only change - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:218 @ 04/04/23 18:16:41.686 (5.038s)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:41.686
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:41.905 (219ms)
+
+
+ > Enter [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:41.905
< Exit [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:48.792 (6.887s)
> Enter [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:35 @ 04/04/23 18:16:48.792
< Exit [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:35 @ 04/04/23 18:16:59.851 (11.059s)
> Enter [It] should not trust X-Forwarded-For header when setting is false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:78 @ 04/04/23 18:16:59.851
< Exit [It] should not trust X-Forwarded-For header when setting is false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:78 @ 04/04/23 18:17:17.088 (17.237s)
> Enter [AfterEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:17.088
< Exit [AfterEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:17.268 (179ms)
+
+
+ > Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:17.268
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:25.143 (7.875s)
> Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 04/04/23 18:17:25.143
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 04/04/23 18:17:39.338 (14.195s)
> Enter [It] configures balancer Lua middleware correctly - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:50 @ 04/04/23 18:17:39.338
< Exit [It] configures balancer Lua middleware correctly - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:50 @ 04/04/23 18:17:45.709 (6.371s)
> Enter [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:45.709
< Exit [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:45.895 (186ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:45.896
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:52.77 (6.874s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:17:52.77
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:18:00.824 (8.054s)
> Enter [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:301 @ 04/04/23 18:18:00.824
< Exit [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:301 @ 04/04/23 18:18:29.039 (28.216s)
> Enter [It] user does not retain cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:337 @ 04/04/23 18:18:29.039
< Exit [It] user does not retain cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:337 @ 04/04/23 18:18:29.048 (9ms)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:29.048
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:29.27 (222ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:29.27
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:36.638 (7.367s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:18:36.638
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:18:40.656 (4.018s)
> Enter [It] should allow - single origin with required port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:358 @ 04/04/23 18:18:40.656
< Exit [It] should allow - single origin with required port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:358 @ 04/04/23 18:18:47.695 (7.04s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:47.695
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:47.919 (224ms)
+
+
+ > Enter [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:47.919
< Exit [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:54.793 (6.873s)
> Enter [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:31 @ 04/04/23 18:18:54.793
< Exit [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:31 @ 04/04/23 18:18:58.818 (4.026s)
> Enter [It] drops snippet "more_set_headers "Foo1: Bar1";" in all locations if disabled by admin" - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:58 @ 04/04/23 18:18:58.818
< Exit [It] drops snippet "more_set_headers "Foo1: Bar1";" in all locations if disabled by admin" - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:58 @ 04/04/23 18:19:28.082 (29.263s)
> Enter [AfterEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:28.082
< Exit [AfterEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:28.561 (479ms)
+
+
+ > Enter [BeforeEach] [Annotations] upstream-vhost - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:28.561
< Exit [BeforeEach] [Annotations] upstream-vhost - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:36.485 (7.924s)
> Enter [BeforeEach] [Annotations] upstream-vhost - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamvhost.go:30 @ 04/04/23 18:19:36.485
< Exit [BeforeEach] [Annotations] upstream-vhost - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamvhost.go:30 @ 04/04/23 18:19:40.514 (4.029s)
> Enter [It] set host to upstreamvhost.bar.com - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamvhost.go:34 @ 04/04/23 18:19:40.514
< Exit [It] set host to upstreamvhost.bar.com - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamvhost.go:34 @ 04/04/23 18:19:50.715 (10.201s)
> Enter [AfterEach] [Annotations] upstream-vhost - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:50.715
< Exit [AfterEach] [Annotations] upstream-vhost - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:50.928 (213ms)
+
+
+ > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:50.928
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:59.376 (8.447s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:19:59.376
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:20:03.412 (4.036s)
> Enter [It] should turn on proxy-buffering - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:157 @ 04/04/23 18:20:03.412
< Exit [It] should turn on proxy-buffering - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:157 @ 04/04/23 18:20:13.859 (10.448s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:13.859
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:15.468 (1.608s)
+
+
+ > Enter [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:15.468
< Exit [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:32.896 (2m17.428s)
> Enter [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:42 @ 04/04/23 18:22:32.896
< Exit [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:42 @ 04/04/23 18:22:32.905 (9ms)
> Enter [It] should reload after an update in the configuration - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:169 @ 04/04/23 18:22:32.905
STEP: setting up a first deployment - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:171 @ 04/04/23 18:22:32.905
STEP: updating the tcp service to a second deployment - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:196 @ 04/04/23 18:22:40.099
< Exit [It] should reload after an update in the configuration - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:169 @ 04/04/23 18:22:50.31 (17.405s)
> Enter [AfterEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:50.31
< Exit [AfterEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:50.534 (224ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:50.534
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:57.402 (6.868s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:22:57.402
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:23:01.417 (4.015s)
> Enter [It] should not break functionality - without `*` - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:291 @ 04/04/23 18:23:01.417
< Exit [It] should not break functionality - without `*` - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:291 @ 04/04/23 18:23:08.429 (7.012s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:08.429
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:08.611 (182ms)
+
+
+ > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:08.611
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:15.499 (6.888s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:23:15.499
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:23:19.526 (4.026s)
> Enter [It] should set secure in cookie with provided false annotation on https - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:458 @ 04/04/23 18:23:19.526
< Exit [It] should set secure in cookie with provided false annotation on https - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:458 @ 04/04/23 18:23:29.716 (10.19s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:29.716
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:29.948 (233ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:29.949
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:36.837 (6.888s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:23:36.837
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:23:40.864 (4.027s)
> Enter [It] should return status code 401 when authentication is configured and Authorization header is sent with invalid credentials - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:116 @ 04/04/23 18:23:40.864
< Exit [It] should return status code 401 when authentication is configured and Authorization header is sent with invalid credentials - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:116 @ 04/04/23 18:23:51.976 (11.112s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:51.976
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:52.182 (206ms)
+
+
+ > Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:52.183
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:00.596 (8.414s)
> Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 04/04/23 18:24:00.596
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 04/04/23 18:24:04.625 (4.028s)
> Enter [It] should exists opentelemetry_operation_name directive when is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:104 @ 04/04/23 18:24:04.625
< Exit [It] should exists opentelemetry_operation_name directive when is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:104 @ 04/04/23 18:24:21.864 (17.239s)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:21.864
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:22.288 (424ms)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 04/04/23 18:24:22.288
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 04/04/23 18:24:22.288 (0s)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:22.289
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:30.179 (7.89s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:24:30.179
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:24:32.201 (2.022s)
> Enter [It] should set cache_key when external auth cache is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:322 @ 04/04/23 18:24:32.201
< Exit [It] should set cache_key when external auth cache is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:322 @ 04/04/23 18:24:42.391 (10.19s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:42.391
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:42.559 (169ms)
+
+
+ > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:42.559
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:49.462 (6.902s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:24:49.462
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:24:55.483 (6.021s)
> Enter [It] should work with server-alias annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:372 @ 04/04/23 18:24:55.483
< Exit [It] should work with server-alias annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:372 @ 04/04/23 18:25:05.677 (10.194s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:05.677
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:05.892 (215ms)
+
+
+ > Enter [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:05.892
< Exit [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:12.767 (6.875s)
> Enter [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:54 @ 04/04/23 18:25:12.767
< Exit [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:54 @ 04/04/23 18:25:22.853 (10.086s)
> Enter [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:22.853
< Exit [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:23.038 (186ms)
+
+
+ > Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:23.039
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:30.928 (7.889s)
> Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:25:30.928
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:25:34.955 (4.027s)
> Enter [It] should set backend protocol to $scheme:// and use proxy_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:49 @ 04/04/23 18:25:34.955
< Exit [It] should set backend protocol to $scheme:// and use proxy_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:49 @ 04/04/23 18:25:45.122 (10.167s)
> Enter [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:45.122
< Exit [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:45.378 (256ms)
+
+
+ > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:45.378
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:52.259 (6.88s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:25:52.259
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:25:56.284 (4.026s)
> Enter [BeforeEach] With ingress-class-by-name flag - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:518 @ 04/04/23 18:25:56.284
< Exit [BeforeEach] With ingress-class-by-name flag - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:518 @ 04/04/23 18:26:05.326 (9.041s)
> Enter [It] should watch Ingress that uses the class name even if spec is different - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:539 @ 04/04/23 18:26:05.326
< Exit [It] should watch Ingress that uses the class name even if spec is different - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:539 @ 04/04/23 18:26:29.579 (24.254s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:29.579
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:29.795 (215ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:29.795
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:36.671 (6.876s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:26:36.671
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:26:40.694 (4.023s)
> Enter [It] should not match - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:338 @ 04/04/23 18:26:40.694
< Exit [It] should not match - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:338 @ 04/04/23 18:26:47.715 (7.021s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:47.715
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:47.897 (182ms)
+
+
+ > Enter [BeforeEach] [Setting] Configmap change - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:47.898
< Exit [BeforeEach] [Setting] Configmap change - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:54.79 (6.892s)
> Enter [BeforeEach] [Setting] Configmap change - /go/src/k8s.io/ingress-nginx/test/e2e/settings/configmap_change.go:32 @ 04/04/23 18:26:54.79
< Exit [BeforeEach] [Setting] Configmap change - /go/src/k8s.io/ingress-nginx/test/e2e/settings/configmap_change.go:32 @ 04/04/23 18:26:58.813 (4.023s)
> Enter [It] should reload after an update in the configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/configmap_change.go:36 @ 04/04/23 18:26:58.813
STEP: adding a whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/settings/configmap_change.go:42 @ 04/04/23 18:27:05.828
STEP: changing error-log-level - /go/src/k8s.io/ingress-nginx/test/e2e/settings/configmap_change.go:61 @ 04/04/23 18:27:16.071
< Exit [It] should reload after an update in the configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/configmap_change.go:36 @ 04/04/23 18:27:29.359 (30.546s)
> Enter [AfterEach] [Setting] Configmap change - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:29.359
< Exit [AfterEach] [Setting] Configmap change - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:29.558 (198ms)
+
+
+ > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:29.558
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:36.431 (6.873s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:27:36.431
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:27:47.466 (11.035s)
> Enter [It] should set variables-hash-bucket-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:80 @ 04/04/23 18:27:47.466
< Exit [It] should set variables-hash-bucket-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:80 @ 04/04/23 18:27:57.638 (10.172s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:57.638
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:57.835 (197ms)
+
+
+ > Enter [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:57.835
< Exit [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:04.708 (6.873s)
> Enter [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:40 @ 04/04/23 18:28:04.708
< Exit [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:40 @ 04/04/23 18:28:20.208 (15.5s)
> Enter [It] uses default ssl certificate for catch-all ingress - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:64 @ 04/04/23 18:28:20.208
STEP: making sure new ingress is deployed - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:68 @ 04/04/23 18:28:27.228
STEP: making sure new ingress is responding - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:74 @ 04/04/23 18:28:30.423
STEP: making sure the configured default ssl certificate is being used - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:76 @ 04/04/23 18:28:30.423
< Exit [It] uses default ssl certificate for catch-all ingress - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:64 @ 04/04/23 18:28:32.435 (12.227s)
> Enter [AfterEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:32.435
< Exit [AfterEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:32.615 (181ms)
+
+
+ > Enter [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:32.616
< Exit [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:39.497 (6.882s)
> Enter [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:42 @ 04/04/23 18:28:39.497
< Exit [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:42 @ 04/04/23 18:28:49.668 (10.171s)
> Enter [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:49.669
< Exit [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:49.884 (215ms)
+
+
+ > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:49.884
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:56.783 (6.899s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:28:56.783
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:29:00.81 (4.027s)
> Enter [It] should enable modsecurity - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:35 @ 04/04/23 18:29:00.81
< Exit [It] should enable modsecurity - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:35 @ 04/04/23 18:29:10.998 (10.189s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:10.998
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:11.21 (212ms)
+
+
+ > Enter [BeforeEach] [Shutdown] Grace period shutdown - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:11.211
< Exit [BeforeEach] [Shutdown] Grace period shutdown - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:19.1 (7.89s)
> Enter [It] /healthz should return status code 500 during shutdown grace period - /go/src/k8s.io/ingress-nginx/test/e2e/gracefulshutdown/grace_period.go:35 @ 04/04/23 18:29:19.1
< Exit [It] /healthz should return status code 500 during shutdown grace period - /go/src/k8s.io/ingress-nginx/test/e2e/gracefulshutdown/grace_period.go:35 @ 04/04/23 18:30:30.168 (1m11.068s)
> Enter [AfterEach] [Shutdown] Grace period shutdown - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:30.168
< Exit [AfterEach] [Shutdown] Grace period shutdown - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:30.345 (177ms)
+
+
+ > Enter [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:30.345
< Exit [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:37.278 (6.932s)
> Enter [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:32 @ 04/04/23 18:30:37.278
< Exit [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:32 @ 04/04/23 18:30:41.303 (4.025s)
> Enter [It] should return status code 200 for host 'foo' and 404 for 'bar' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:36 @ 04/04/23 18:30:41.303
< Exit [It] should return status code 200 for host 'foo' and 404 for 'bar' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:36 @ 04/04/23 18:30:51.481 (10.178s)
> Enter [AfterEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:51.481
< Exit [AfterEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:51.683 (202ms)
+
+
+ > Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:51.684
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:58.618 (6.934s)
> Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 04/04/23 18:30:58.618
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 04/04/23 18:31:09.663 (11.045s)
> Enter [It] should enable PROXY Protocol for TCP - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:155 @ 04/04/23 18:31:09.663
Automatically polling progress:
[Setting] use-proxy-protocol should enable PROXY Protocol for TCP (Spec Runtime: 3m17.98s)
/go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:155
In [It] (Node Runtime: 3m0.001s)
/go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:155
Spec Goroutine
goroutine 2932 [IO wait, 3 minutes]
internal/poll.runtime_pollWait(0x7f9e883a91b8, 0x72)
/usr/local/go/src/runtime/netpoll.go:306
internal/poll.(*pollDesc).wait(0xc0000de300?, 0xc00098a926?, 0x0)
/usr/local/go/src/internal/poll/fd_poll_runtime.go:84
internal/poll.(*pollDesc).waitRead(...)
/usr/local/go/src/internal/poll/fd_poll_runtime.go:89
internal/poll.(*FD).Read(0xc0000de300, {0xc00098a926, 0x15a, 0x15a})
/usr/local/go/src/internal/poll/fd_unix.go:167
net.(*netFD).Read(0xc0000de300, {0xc00098a926?, 0x453656?, 0x380?})
/usr/local/go/src/net/fd_posix.go:55
net.(*conn).Read(0xc000516660, {0xc00098a926?, 0x19913c0?, 0xc00098a700?})
/usr/local/go/src/net/net.go:183
io.ReadAll({0x1f62de0, 0xc000516660})
/usr/local/go/src/io/io.go:701
> k8s.io/ingress-nginx/test/e2e/settings.glob..func38.5()
/go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:211
github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func3({0xa0558e, 0xc000300a80})
/go/src/k8s.io/ingress-nginx/.modcache/github.com/onsi/ginkgo/v2@v2.9.0/internal/node.go:463
github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3()
/go/src/k8s.io/ingress-nginx/.modcache/github.com/onsi/ginkgo/v2@v2.9.0/internal/suite.go:863
github.com/onsi/ginkgo/v2/internal.(*Suite).runNode
/go/src/k8s.io/ingress-nginx/.modcache/github.com/onsi/ginkgo/v2@v2.9.0/internal/suite.go:850
< Exit [It] should enable PROXY Protocol for TCP - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:155 @ 04/04/23 18:41:24.726 (10m15.064s)
> Enter [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:41:24.726
< Exit [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:41:24.943 (217ms)
+
+
+
\ No newline at end of file
From 405a5aa44c828d151c62d914e68cd39954370152 Mon Sep 17 00:00:00 2001
From: Nicholas Orlowsky
Date: Mon, 24 Apr 2023 11:33:50 -0500
Subject: [PATCH 010/283] add some e2e tests (unfinished) + fix findMountPoint
bug
---
pkg/util/runtime/cpu_linux.go | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/pkg/util/runtime/cpu_linux.go b/pkg/util/runtime/cpu_linux.go
index 5228c93a2..4d755f4c5 100644
--- a/pkg/util/runtime/cpu_linux.go
+++ b/pkg/util/runtime/cpu_linux.go
@@ -38,7 +38,6 @@ import (
func NumCPU() int {
cpus := runtime.NumCPU()
- cgroupPath, err := libcontainercgroups.FindCgroupMountpoint("", "cpu")
if err != nil {
return cpus
}
@@ -48,10 +47,11 @@ func NumCPU() int {
cpuPeriod := int64(-1)
if cgroupVersion == 1 {
+ cgroupPath, err := libcontainercgroups.FindCgroupMountpoint("", "cpu")
cpuQuota = readCgroupFileToInt64(cgroupPath, "cpu.cfs_quota_us")
cpuPeriod = readCgroupFileToInt64(cgroupPath, "cpu.cfs_period_us")
} else if cgroupVersion == 2 {
- cpuQuota, cpuPeriod = readCgroup2FileToInt64Tuple(cgroupPath, "cpu.max")
+ cpuQuota, cpuPeriod = readCgroup2FileToInt64Tuple("cpu.max")
}
if cpuQuota == -1 || cpuPeriod == -1 {
@@ -71,7 +71,7 @@ func getCgroupVersion() int64 {
}
func readCgroup2FileToInt64Tuple(cgroupPath, cgroupFile string) (int64, int64) {
- contents, err := os.ReadFile(filepath.Join(cgroupPath, cgroupFile))
+ contents, err := os.ReadFile(filepath.Join("/sys/fs/cgroup/", cgroupFile))
if err != nil {
return -1, -1
From aa9a87621742343c8188cc7f89be234e9f956e8f Mon Sep 17 00:00:00 2001
From: Nicholas Orlowsky
Date: Mon, 24 Apr 2023 11:34:21 -0500
Subject: [PATCH 011/283] typo
---
pkg/util/runtime/cpu_linux.go | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/pkg/util/runtime/cpu_linux.go b/pkg/util/runtime/cpu_linux.go
index 4d755f4c5..b4d6997b9 100644
--- a/pkg/util/runtime/cpu_linux.go
+++ b/pkg/util/runtime/cpu_linux.go
@@ -70,7 +70,7 @@ func getCgroupVersion() int64 {
}
}
-func readCgroup2FileToInt64Tuple(cgroupPath, cgroupFile string) (int64, int64) {
+func readCgroup2FileToInt64Tuple(cgroupFile string) (int64, int64) {
contents, err := os.ReadFile(filepath.Join("/sys/fs/cgroup/", cgroupFile))
if err != nil {
From 3714c2c426885e8b4730cefc6b04d3d997102bec Mon Sep 17 00:00:00 2001
From: Nicholas Orlowsky
Date: Tue, 25 Apr 2023 10:19:07 -0500
Subject: [PATCH 012/283] move error check
---
pkg/util/runtime/cpu_linux.go | 7 +++----
test/e2e/cgroups/cgroups.go | 19 +++++++++++++++----
2 files changed, 18 insertions(+), 8 deletions(-)
diff --git a/pkg/util/runtime/cpu_linux.go b/pkg/util/runtime/cpu_linux.go
index b4d6997b9..c72f47f01 100644
--- a/pkg/util/runtime/cpu_linux.go
+++ b/pkg/util/runtime/cpu_linux.go
@@ -38,16 +38,15 @@ import (
func NumCPU() int {
cpus := runtime.NumCPU()
- if err != nil {
- return cpus
- }
-
cgroupVersion := getCgroupVersion()
cpuQuota := int64(-1)
cpuPeriod := int64(-1)
if cgroupVersion == 1 {
cgroupPath, err := libcontainercgroups.FindCgroupMountpoint("", "cpu")
+ if err != nil {
+ return cpus
+ }
cpuQuota = readCgroupFileToInt64(cgroupPath, "cpu.cfs_quota_us")
cpuPeriod = readCgroupFileToInt64(cgroupPath, "cpu.cfs_period_us")
} else if cgroupVersion == 2 {
diff --git a/test/e2e/cgroups/cgroups.go b/test/e2e/cgroups/cgroups.go
index 34d6c037a..4ee6bf927 100644
--- a/test/e2e/cgroups/cgroups.go
+++ b/test/e2e/cgroups/cgroups.go
@@ -17,6 +17,9 @@ limitations under the License.
package cgroups
import (
+ "log"
+ "os"
+
"github.com/onsi/ginkgo/v2"
"github.com/stretchr/testify/assert"
@@ -33,15 +36,23 @@ var _ = framework.IngressNginxDescribeSerial("[CGroups] cgroups", func() {
f.NewSlowEchoDeployment()
})
+ ginkgo.It("detects cgroups version v1", func() {
+ assert.Equal(ginkgo.GinkgoT(), runtime.getCgroupVersion(), 1)
+ })
+
ginkgo.It("detects number of CPUs properly in cgroups v1", func() {
assert.Equal(ginkgo.GinkgoT(), runtime.NumCPU(), -1)
})
+ ginkgo.It("detects cgroups version v2", func() {
+ // create cgroups2 files
+ if err := os.MkdirAll("a/b/c/d", os.ModePerm); err != nil {
+ log.Fatal(err)
+ }
+
+ })
+
ginkgo.It("detects number of CPUs properly in cgroups v2", func() {
assert.Equal(ginkgo.GinkgoT(), runtime.NumCPU(), -1)
})
-
- ginkgo.It("detects cgroups version", func() {
-
- })
})
From 6d96e111c8e15081c36bf0448745cb3eb73b1cb4 Mon Sep 17 00:00:00 2001
From: Nicholas Orlowsky
Date: Tue, 25 Apr 2023 19:24:34 -0500
Subject: [PATCH 013/283] try to figure out testing flags
---
Makefile | 2 +-
pkg/util/runtime/cpu_linux.go | 4 +++
pkg/util/runtime/cpu_notlinux.go | 4 +++
test/e2e/cgroups/cgroups.go | 58 --------------------------------
4 files changed, 9 insertions(+), 59 deletions(-)
delete mode 100644 test/e2e/cgroups/cgroups.go
diff --git a/Makefile b/Makefile
index 6037ac39d..357ef9827 100644
--- a/Makefile
+++ b/Makefile
@@ -167,7 +167,7 @@ kind-e2e-chart-tests: ## Run helm chart e2e tests
e2e-test-binary: ## Build binary for e2e tests.
@build/run-in-docker.sh \
MAC_OS=$(MAC_OS) \
- ginkgo build ./test/e2e
+ ginkgo build ./test/e2e -tags linux
.PHONY: print-e2e-suite
print-e2e-suite: e2e-test-binary ## Prints information about the suite of e2e tests.
diff --git a/pkg/util/runtime/cpu_linux.go b/pkg/util/runtime/cpu_linux.go
index c72f47f01..e5e8db40a 100644
--- a/pkg/util/runtime/cpu_linux.go
+++ b/pkg/util/runtime/cpu_linux.go
@@ -60,6 +60,10 @@ func NumCPU() int {
return int(math.Ceil(float64(cpuQuota) / float64(cpuPeriod)))
}
+func IsCgroupAvaliable() bool {
+ return true
+}
+
func getCgroupVersion() int64 {
// /sys/fs/cgroup/cgroup.controllers will not exist with cgroupsv1
if _, err := os.Stat("/sys/fs/cgroup/cgroup.controllers"); err == nil {
diff --git a/pkg/util/runtime/cpu_notlinux.go b/pkg/util/runtime/cpu_notlinux.go
index 2a1b48252..3c4c6718b 100644
--- a/pkg/util/runtime/cpu_notlinux.go
+++ b/pkg/util/runtime/cpu_notlinux.go
@@ -27,3 +27,7 @@ import (
func NumCPU() int {
return runtime.NumCPU()
}
+
+func IsCgroupAvaliable() bool {
+ return false
+}
diff --git a/test/e2e/cgroups/cgroups.go b/test/e2e/cgroups/cgroups.go
deleted file mode 100644
index 4ee6bf927..000000000
--- a/test/e2e/cgroups/cgroups.go
+++ /dev/null
@@ -1,58 +0,0 @@
-/*
-Copyright 2020 The Kubernetes Authors.
-
-Licensed under the Apache License, Version 2.0 (the "License");
-you may not use this file except in compliance with the License.
-You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
-Unless required by applicable law or agreed to in writing, software
-distributed under the License is distributed on an "AS IS" BASIS,
-WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-See the License for the specific language governing permissions and
-limitations under the License.
-*/
-
-package cgroups
-
-import (
- "log"
- "os"
-
- "github.com/onsi/ginkgo/v2"
- "github.com/stretchr/testify/assert"
-
- "k8s.io/ingress-nginx/test/e2e/framework"
-
- "k8s.io/ingress-nginx/pkg/util/runtime"
-)
-
-var _ = framework.IngressNginxDescribeSerial("[CGroups] cgroups", func() {
- f := framework.NewDefaultFramework("cgroups")
-
- ginkgo.BeforeEach(func() {
- f.NewEchoDeployment()
- f.NewSlowEchoDeployment()
- })
-
- ginkgo.It("detects cgroups version v1", func() {
- assert.Equal(ginkgo.GinkgoT(), runtime.getCgroupVersion(), 1)
- })
-
- ginkgo.It("detects number of CPUs properly in cgroups v1", func() {
- assert.Equal(ginkgo.GinkgoT(), runtime.NumCPU(), -1)
- })
-
- ginkgo.It("detects cgroups version v2", func() {
- // create cgroups2 files
- if err := os.MkdirAll("a/b/c/d", os.ModePerm); err != nil {
- log.Fatal(err)
- }
-
- })
-
- ginkgo.It("detects number of CPUs properly in cgroups v2", func() {
- assert.Equal(ginkgo.GinkgoT(), runtime.NumCPU(), -1)
- })
-})
From 475adf734ad9f1d85ece1d344a2b2636de7b4fa4 Mon Sep 17 00:00:00 2001
From: Nicholas Orlowsky
Date: Tue, 25 Apr 2023 19:32:59 -0500
Subject: [PATCH 014/283] add files
---
test/e2e/cgroups/cgroups_linux.go | 65 ++++++++++++++++++++++++++++
test/e2e/cgroups/cgroups_notlinux.go | 42 ++++++++++++++++++
2 files changed, 107 insertions(+)
create mode 100644 test/e2e/cgroups/cgroups_linux.go
create mode 100644 test/e2e/cgroups/cgroups_notlinux.go
diff --git a/test/e2e/cgroups/cgroups_linux.go b/test/e2e/cgroups/cgroups_linux.go
new file mode 100644
index 000000000..18b3f837b
--- /dev/null
+++ b/test/e2e/cgroups/cgroups_linux.go
@@ -0,0 +1,65 @@
+//go:build linux
+// +build linux
+
+/*
+Copyright 2020 The Kubernetes Authors.
+
+Licensed under the Apache License, Version 2.0 (the "License");
+you may not use this file except in compliance with the License.
+You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law or agreed to in writing, software
+distributed under the License is distributed on an "AS IS" BASIS,
+WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+See the License for the specific language governing permissions and
+limitations under the License.
+*/
+
+package cgroups
+
+import (
+ "log"
+ "os"
+
+ "github.com/onsi/ginkgo/v2"
+ "github.com/stretchr/testify/assert"
+
+ "k8s.io/ingress-nginx/test/e2e/framework"
+
+ "k8s.io/ingress-nginx/pkg/util/runtime"
+)
+
+var _ = framework.IngressNginxDescribeSerial("[CGroups] cgroups", func() {
+ f := framework.NewDefaultFramework("cgroups")
+
+ ginkgo.BeforeEach(func() {
+ f.NewEchoDeployment()
+ f.NewSlowEchoDeployment()
+ })
+
+ ginkgo.It("detects if cgroups is avaliable", func() {
+ assert.Equal(ginkgo.GinkgoT(), runtime.IsCgroupAvaliable(), 1)
+ })
+
+ ginkgo.It("detects cgroups version v1", func() {
+ assert.Equal(ginkgo.GinkgoT(), runtime.readCgroupFileToInt64(), 1)
+ })
+
+ ginkgo.It("detects number of CPUs properly in cgroups v1", func() {
+ assert.Equal(ginkgo.GinkgoT(), runtime.NumCPU(), -1)
+ })
+
+ ginkgo.It("detects cgroups version v2", func() {
+ // create cgroups2 files
+ if err := os.MkdirAll("a/b/c/d", os.ModePerm); err != nil {
+ log.Fatal(err)
+ }
+
+ })
+
+ ginkgo.It("detects number of CPUs properly in cgroups v2", func() {
+ assert.Equal(ginkgo.GinkgoT(), runtime.NumCPU(), -1)
+ })
+})
diff --git a/test/e2e/cgroups/cgroups_notlinux.go b/test/e2e/cgroups/cgroups_notlinux.go
new file mode 100644
index 000000000..483db52cc
--- /dev/null
+++ b/test/e2e/cgroups/cgroups_notlinux.go
@@ -0,0 +1,42 @@
+//go:build !linux
+// +build !linux
+
+/*
+Copyright 2020 The Kubernetes Authors.
+
+Licensed under the Apache License, Version 2.0 (the "License");
+you may not use this file except in compliance with the License.
+You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law or agreed to in writing, software
+distributed under the License is distributed on an "AS IS" BASIS,
+WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+See the License for the specific language governing permissions and
+limitations under the License.
+*/
+
+package cgroups
+
+import (
+ "github.com/onsi/ginkgo/v2"
+ "github.com/stretchr/testify/assert"
+
+ "k8s.io/ingress-nginx/test/e2e/framework"
+
+ "k8s.io/ingress-nginx/pkg/util/runtime"
+)
+
+var _ = framework.IngressNginxDescribeSerial("[CGroups] cgroups", func() {
+ f := framework.NewDefaultFramework("cgroups")
+
+ ginkgo.BeforeEach(func() {
+ f.NewEchoDeployment()
+ f.NewSlowEchoDeployment()
+ })
+
+ ginkgo.It("detects cgroups is not avaliable", func() {
+ assert.True(ginkgo.GinkgoT(), !runtime.IsCgroupAvaliable())
+ })
+})
From c5dad5e46116382ef8ec02a648e9c48d0ef1ea19 Mon Sep 17 00:00:00 2001
From: Nicholas Orlowsky
Date: Thu, 11 May 2023 21:03:12 -0400
Subject: [PATCH 015/283] removed e2e tests for cgroups2 and associated
functions
---
pkg/util/runtime/cpu_linux.go | 4 --
pkg/util/runtime/cpu_notlinux.go | 6 +--
test/e2e/cgroups/cgroups_linux.go | 65 ----------------------------
test/e2e/cgroups/cgroups_notlinux.go | 42 ------------------
test/e2e/e2e.go | 41 +++++++++---------
5 files changed, 21 insertions(+), 137 deletions(-)
delete mode 100644 test/e2e/cgroups/cgroups_linux.go
delete mode 100644 test/e2e/cgroups/cgroups_notlinux.go
diff --git a/pkg/util/runtime/cpu_linux.go b/pkg/util/runtime/cpu_linux.go
index e5e8db40a..c72f47f01 100644
--- a/pkg/util/runtime/cpu_linux.go
+++ b/pkg/util/runtime/cpu_linux.go
@@ -60,10 +60,6 @@ func NumCPU() int {
return int(math.Ceil(float64(cpuQuota) / float64(cpuPeriod)))
}
-func IsCgroupAvaliable() bool {
- return true
-}
-
func getCgroupVersion() int64 {
// /sys/fs/cgroup/cgroup.controllers will not exist with cgroupsv1
if _, err := os.Stat("/sys/fs/cgroup/cgroup.controllers"); err == nil {
diff --git a/pkg/util/runtime/cpu_notlinux.go b/pkg/util/runtime/cpu_notlinux.go
index 3c4c6718b..0441af957 100644
--- a/pkg/util/runtime/cpu_notlinux.go
+++ b/pkg/util/runtime/cpu_notlinux.go
@@ -26,8 +26,4 @@ import (
// NumCPU ...
func NumCPU() int {
return runtime.NumCPU()
-}
-
-func IsCgroupAvaliable() bool {
- return false
-}
+}
\ No newline at end of file
diff --git a/test/e2e/cgroups/cgroups_linux.go b/test/e2e/cgroups/cgroups_linux.go
deleted file mode 100644
index 18b3f837b..000000000
--- a/test/e2e/cgroups/cgroups_linux.go
+++ /dev/null
@@ -1,65 +0,0 @@
-//go:build linux
-// +build linux
-
-/*
-Copyright 2020 The Kubernetes Authors.
-
-Licensed under the Apache License, Version 2.0 (the "License");
-you may not use this file except in compliance with the License.
-You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
-Unless required by applicable law or agreed to in writing, software
-distributed under the License is distributed on an "AS IS" BASIS,
-WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-See the License for the specific language governing permissions and
-limitations under the License.
-*/
-
-package cgroups
-
-import (
- "log"
- "os"
-
- "github.com/onsi/ginkgo/v2"
- "github.com/stretchr/testify/assert"
-
- "k8s.io/ingress-nginx/test/e2e/framework"
-
- "k8s.io/ingress-nginx/pkg/util/runtime"
-)
-
-var _ = framework.IngressNginxDescribeSerial("[CGroups] cgroups", func() {
- f := framework.NewDefaultFramework("cgroups")
-
- ginkgo.BeforeEach(func() {
- f.NewEchoDeployment()
- f.NewSlowEchoDeployment()
- })
-
- ginkgo.It("detects if cgroups is avaliable", func() {
- assert.Equal(ginkgo.GinkgoT(), runtime.IsCgroupAvaliable(), 1)
- })
-
- ginkgo.It("detects cgroups version v1", func() {
- assert.Equal(ginkgo.GinkgoT(), runtime.readCgroupFileToInt64(), 1)
- })
-
- ginkgo.It("detects number of CPUs properly in cgroups v1", func() {
- assert.Equal(ginkgo.GinkgoT(), runtime.NumCPU(), -1)
- })
-
- ginkgo.It("detects cgroups version v2", func() {
- // create cgroups2 files
- if err := os.MkdirAll("a/b/c/d", os.ModePerm); err != nil {
- log.Fatal(err)
- }
-
- })
-
- ginkgo.It("detects number of CPUs properly in cgroups v2", func() {
- assert.Equal(ginkgo.GinkgoT(), runtime.NumCPU(), -1)
- })
-})
diff --git a/test/e2e/cgroups/cgroups_notlinux.go b/test/e2e/cgroups/cgroups_notlinux.go
deleted file mode 100644
index 483db52cc..000000000
--- a/test/e2e/cgroups/cgroups_notlinux.go
+++ /dev/null
@@ -1,42 +0,0 @@
-//go:build !linux
-// +build !linux
-
-/*
-Copyright 2020 The Kubernetes Authors.
-
-Licensed under the Apache License, Version 2.0 (the "License");
-you may not use this file except in compliance with the License.
-You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
-Unless required by applicable law or agreed to in writing, software
-distributed under the License is distributed on an "AS IS" BASIS,
-WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-See the License for the specific language governing permissions and
-limitations under the License.
-*/
-
-package cgroups
-
-import (
- "github.com/onsi/ginkgo/v2"
- "github.com/stretchr/testify/assert"
-
- "k8s.io/ingress-nginx/test/e2e/framework"
-
- "k8s.io/ingress-nginx/pkg/util/runtime"
-)
-
-var _ = framework.IngressNginxDescribeSerial("[CGroups] cgroups", func() {
- f := framework.NewDefaultFramework("cgroups")
-
- ginkgo.BeforeEach(func() {
- f.NewEchoDeployment()
- f.NewSlowEchoDeployment()
- })
-
- ginkgo.It("detects cgroups is not avaliable", func() {
- assert.True(ginkgo.GinkgoT(), !runtime.IsCgroupAvaliable())
- })
-})
diff --git a/test/e2e/e2e.go b/test/e2e/e2e.go
index a671e8793..57b047230 100644
--- a/test/e2e/e2e.go
+++ b/test/e2e/e2e.go
@@ -29,27 +29,26 @@ import (
"k8s.io/ingress-nginx/test/e2e/framework"
// tests to run
- // _ "k8s.io/ingress-nginx/test/e2e/admission"
- // _ "k8s.io/ingress-nginx/test/e2e/annotations"
- // _ "k8s.io/ingress-nginx/test/e2e/annotations/modsecurity"
- _ "k8s.io/ingress-nginx/test/e2e/cgroups"
- // _ "k8s.io/ingress-nginx/test/e2e/dbg"
- // _ "k8s.io/ingress-nginx/test/e2e/defaultbackend"
- // _ "k8s.io/ingress-nginx/test/e2e/endpointslices"
- // _ "k8s.io/ingress-nginx/test/e2e/gracefulshutdown"
- // _ "k8s.io/ingress-nginx/test/e2e/ingress"
- // _ "k8s.io/ingress-nginx/test/e2e/leaks"
- // _ "k8s.io/ingress-nginx/test/e2e/loadbalance"
- // _ "k8s.io/ingress-nginx/test/e2e/lua"
- // _ "k8s.io/ingress-nginx/test/e2e/nginx"
- // _ "k8s.io/ingress-nginx/test/e2e/security"
- // _ "k8s.io/ingress-nginx/test/e2e/servicebackend"
- // _ "k8s.io/ingress-nginx/test/e2e/settings"
- // _ "k8s.io/ingress-nginx/test/e2e/settings/modsecurity"
- // _ "k8s.io/ingress-nginx/test/e2e/settings/ocsp"
- // _ "k8s.io/ingress-nginx/test/e2e/ssl"
- // _ "k8s.io/ingress-nginx/test/e2e/status"
- // _ "k8s.io/ingress-nginx/test/e2e/tcpudp"
+ _ "k8s.io/ingress-nginx/test/e2e/admission"
+ _ "k8s.io/ingress-nginx/test/e2e/annotations"
+ _ "k8s.io/ingress-nginx/test/e2e/annotations/modsecurity"
+ _ "k8s.io/ingress-nginx/test/e2e/dbg"
+ _ "k8s.io/ingress-nginx/test/e2e/defaultbackend"
+ _ "k8s.io/ingress-nginx/test/e2e/endpointslices"
+ _ "k8s.io/ingress-nginx/test/e2e/gracefulshutdown"
+ _ "k8s.io/ingress-nginx/test/e2e/ingress"
+ _ "k8s.io/ingress-nginx/test/e2e/leaks"
+ _ "k8s.io/ingress-nginx/test/e2e/loadbalance"
+ _ "k8s.io/ingress-nginx/test/e2e/lua"
+ _ "k8s.io/ingress-nginx/test/e2e/nginx"
+ _ "k8s.io/ingress-nginx/test/e2e/security"
+ _ "k8s.io/ingress-nginx/test/e2e/servicebackend"
+ _ "k8s.io/ingress-nginx/test/e2e/settings"
+ _ "k8s.io/ingress-nginx/test/e2e/settings/modsecurity"
+ _ "k8s.io/ingress-nginx/test/e2e/settings/ocsp"
+ _ "k8s.io/ingress-nginx/test/e2e/ssl"
+ _ "k8s.io/ingress-nginx/test/e2e/status"
+ _ "k8s.io/ingress-nginx/test/e2e/tcpudp"
)
// RunE2ETests checks configuration parameters (specified through flags) and then runs
From a8028a576f3174e9063f55ccc96c5345bf0357b1 Mon Sep 17 00:00:00 2001
From: Nicholas Orlowsky
Date: Thu, 11 May 2023 21:04:21 -0400
Subject: [PATCH 016/283] remove test report
---
test/junitreports/report-e2e-test-suite.xml | 1311 -------------------
1 file changed, 1311 deletions(-)
delete mode 100644 test/junitreports/report-e2e-test-suite.xml
diff --git a/test/junitreports/report-e2e-test-suite.xml b/test/junitreports/report-e2e-test-suite.xml
deleted file mode 100644
index fc919bad2..000000000
--- a/test/junitreports/report-e2e-test-suite.xml
+++ /dev/null
@@ -1,1311 +0,0 @@
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:19.256
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:40.576 (2m21.32s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:06:40.576
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:06:44.629 (4.053s)
> Enter [It] should set cors methods to only allow POST, GET - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:62 @ 04/04/23 18:06:44.629
< Exit [It] should set cors methods to only allow POST, GET - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:62 @ 04/04/23 18:06:54.768 (10.139s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:54.768
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:54.976 (208ms)
-
-
- > Enter [BeforeEach] [Setting] [Load Balancer] round-robin - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:54.976
< Exit [BeforeEach] [Setting] [Load Balancer] round-robin - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:01.906 (6.93s)
> Enter [BeforeEach] [Setting] [Load Balancer] round-robin - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/round_robin.go:34 @ 04/04/23 18:07:01.906
< Exit [BeforeEach] [Setting] [Load Balancer] round-robin - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/round_robin.go:34 @ 04/04/23 18:07:12.967 (11.06s)
> Enter [It] should evenly distribute requests with round-robin (default algorithm) - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/round_robin.go:39 @ 04/04/23 18:07:12.967
< Exit [It] should evenly distribute requests with round-robin (default algorithm) - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/round_robin.go:39 @ 04/04/23 18:09:21.17 (2m8.203s)
> Enter [AfterEach] [Setting] [Load Balancer] round-robin - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:21.17
< Exit [AfterEach] [Setting] [Load Balancer] round-robin - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:21.399 (229ms)
-
-
- > Enter [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:21.4
< Exit [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:28.324 (6.924s)
> Enter [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:35 @ 04/04/23 18:09:28.324
< Exit [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:35 @ 04/04/23 18:09:39.376 (11.052s)
> Enter [It] should trust X-Forwarded headers when setting is true - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:40 @ 04/04/23 18:09:39.376
STEP: ensuring single values are parsed correctly - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:54 @ 04/04/23 18:09:56.563
STEP: ensuring that first entry in X-Forwarded-Host is used as the best host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:75 @ 04/04/23 18:09:56.572
< Exit [It] should trust X-Forwarded headers when setting is true - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:40 @ 04/04/23 18:09:56.578 (17.202s)
> Enter [AfterEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:56.578
< Exit [AfterEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:56.789 (211ms)
-
-
- > Enter [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:56.79
< Exit [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:03.662 (6.873s)
> Enter [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:34 @ 04/04/23 18:10:03.662
< Exit [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:34 @ 04/04/23 18:10:07.688 (4.026s)
> Enter [It] should redirect from www HTTPS to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:64 @ 04/04/23 18:10:07.688
STEP: setting up server for redirect from www - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:65 @ 04/04/23 18:10:07.688
STEP: sending request to www should redirect to domain - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:91 @ 04/04/23 18:10:22.913
STEP: sending request to domain should not redirect to www - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:103 @ 04/04/23 18:10:22.941
< Exit [It] should redirect from www HTTPS to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:64 @ 04/04/23 18:10:22.969 (15.281s)
> Enter [AfterEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:22.969
< Exit [AfterEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:23.209 (240ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:23.21
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:31.083 (7.874s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:10:31.083
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:10:35.101 (4.018s)
> Enter [It] should set secure in cookie with provided true annotation on http - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:412 @ 04/04/23 18:10:35.101
< Exit [It] should set secure in cookie with provided true annotation on http - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:412 @ 04/04/23 18:10:45.308 (10.206s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:45.308
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:45.524 (217ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:45.525
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:52.399 (6.874s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:10:52.399
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:10:56.446 (4.048s)
> Enter [It] should not set cookie without domain annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:248 @ 04/04/23 18:10:56.446
< Exit [It] should not set cookie without domain annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:248 @ 04/04/23 18:11:06.571 (10.124s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:06.571
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:06.765 (195ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:06.765
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:13.684 (6.918s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:11:13.684
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:11:17.714 (4.03s)
> Enter [It] should set sticky cookie without host - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:352 @ 04/04/23 18:11:17.714
< Exit [It] should set sticky cookie without host - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:352 @ 04/04/23 18:11:27.946 (10.232s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:27.946
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:28.167 (220ms)
-
-
- > Enter [BeforeEach] [Security] request smuggling - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:28.167
< Exit [BeforeEach] [Security] request smuggling - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:36.071 (7.904s)
> Enter [BeforeEach] [Security] request smuggling - /go/src/k8s.io/ingress-nginx/test/e2e/security/request_smuggling.go:35 @ 04/04/23 18:11:36.071
< Exit [BeforeEach] [Security] request smuggling - /go/src/k8s.io/ingress-nginx/test/e2e/security/request_smuggling.go:35 @ 04/04/23 18:11:38.106 (2.035s)
> Enter [It] should not return body content from error_page - /go/src/k8s.io/ingress-nginx/test/e2e/security/request_smuggling.go:39 @ 04/04/23 18:11:38.106
< Exit [It] should not return body content from error_page - /go/src/k8s.io/ingress-nginx/test/e2e/security/request_smuggling.go:39 @ 04/04/23 18:12:00.307 (22.201s)
> Enter [AfterEach] [Security] request smuggling - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:00.307
< Exit [AfterEach] [Security] request smuggling - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:00.53 (223ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:00.531
< Exit [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:07.492 (6.961s)
> Enter [It] should use grpc_pass in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:43 @ 04/04/23 18:12:07.492
< Exit [It] should use grpc_pass in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:43 @ 04/04/23 18:12:24.818 (17.326s)
> Enter [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:24.818
< Exit [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:25.032 (214ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:25.033
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:32.425 (7.392s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:12:32.425
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:12:36.448 (4.023s)
> Enter [It] should return status code 401 when authentication is configured with invalid content and Authorization header is sent - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:227 @ 04/04/23 18:12:36.448
< Exit [It] should return status code 401 when authentication is configured with invalid content and Authorization header is sent - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:227 @ 04/04/23 18:12:46.572 (10.124s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:46.572
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:46.787 (215ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:46.788
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:54.215 (7.427s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:12:54.215
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:13:02.279 (8.064s)
> Enter [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:490 @ 04/04/23 18:13:02.279
STEP: routing requests to the canary upstream when header pattern is matched - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:514 @ 04/04/23 18:13:19.503
STEP: routing requests to the mainline upstream when header failed to match header value - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:523 @ 04/04/23 18:13:19.508
< Exit [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:490 @ 04/04/23 18:13:19.51 (17.231s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:19.51
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:19.813 (303ms)
-
-
- > Enter [BeforeEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:19.813
< Exit [BeforeEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:26.704 (6.89s)
> Enter [It] should be enabled by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/multi_accept.go:31 @ 04/04/23 18:13:26.704
< Exit [It] should be enabled by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/multi_accept.go:31 @ 04/04/23 18:13:29.872 (3.169s)
> Enter [AfterEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:29.872
< Exit [AfterEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:30.073 (201ms)
-
-
- > Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:30.073
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:37.948 (7.874s)
> Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 04/04/23 18:13:37.948
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 04/04/23 18:13:41.967 (4.019s)
> Enter [It] [BAD_ANNOTATIONS] should drop an ingress if there is a custom blocklist config in place and allow others to pass - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:133 @ 04/04/23 18:13:41.967
< Exit [It] [BAD_ANNOTATIONS] should drop an ingress if there is a custom blocklist config in place and allow others to pass - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:133 @ 04/04/23 18:14:07.32 (25.353s)
> Enter [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:07.32
< Exit [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:07.487 (167ms)
-
-
-
- > Enter [BeforeEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:07.487
< Exit [BeforeEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:14.369 (6.882s)
> Enter [It] disables access logging for default backend - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:105 @ 04/04/23 18:14:14.369
[SKIPPED] enable-access-log-for-default-backend
In [It] at: /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:107 @ 04/04/23 18:14:14.37
< Exit [It] disables access logging for default backend - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:105 @ 04/04/23 18:14:14.37 (1ms)
> Enter [AfterEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:14.37
< Exit [AfterEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:14.561 (191ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:14.561
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:21.468 (6.907s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:14:21.468
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:14:29.526 (8.058s)
> Enter [It] respects always and never values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:643 @ 04/04/23 18:14:29.526
STEP: routing requests to the canary upstream when cookie is set to 'always' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:667 @ 04/04/23 18:14:46.664
STEP: routing requests to the mainline upstream when cookie is set to 'never' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:678 @ 04/04/23 18:14:54.864
STEP: routing requests to the mainline upstream when cookie is set to anything else - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:689 @ 04/04/23 18:15:04.858
< Exit [It] respects always and never values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:643 @ 04/04/23 18:15:14.862 (45.336s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:14.862
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:15.079 (218ms)
-
-
- > Enter [BeforeEach] [Annotations] default-backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:15.08
< Exit [BeforeEach] [Annotations] default-backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:22.972 (7.892s)
> Enter [BeforeEach] [Annotations] default-backend - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/default_backend.go:32 @ 04/04/23 18:15:22.972
< Exit [BeforeEach] [Annotations] default-backend - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/default_backend.go:32 @ 04/04/23 18:15:26.998 (4.026s)
> Enter [It] should use a custom default backend as upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/default_backend.go:37 @ 04/04/23 18:15:26.998
< Exit [It] should use a custom default backend as upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/default_backend.go:37 @ 04/04/23 18:15:37.18 (10.182s)
> Enter [AfterEach] [Annotations] default-backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:37.18
< Exit [AfterEach] [Annotations] default-backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:37.392 (212ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:37.392
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:44.321 (6.929s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:15:44.321
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:15:50.372 (6.051s)
> Enter [It] always routes traffic to canary if first request was affinitized to canary (explicit sticky behavior) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:1000 @ 04/04/23 18:15:50.372
< Exit [It] always routes traffic to canary if first request was affinitized to canary (explicit sticky behavior) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:1000 @ 04/04/23 18:16:15.956 (25.584s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:15.956
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:16.151 (195ms)
-
-
- > Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:16.152
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:25.575 (9.424s)
> Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 04/04/23 18:16:25.576
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 04/04/23 18:16:29.621 (4.045s)
> Enter [It] should write rewrite logs - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:37 @ 04/04/23 18:16:29.621
STEP: setting enable-rewrite-log annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:38 @ 04/04/23 18:16:29.621
< Exit [It] should write rewrite logs - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:37 @ 04/04/23 18:16:42.864 (13.243s)
> Enter [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:42.864
< Exit [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:43.089 (224ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:43.089
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:50.483 (7.394s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:16:50.483
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:16:54.502 (4.019s)
> Enter [It] should set sslClientCertificate, sslVerifyClient and sslVerifyDepth with auth-tls-secret - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:36 @ 04/04/23 18:16:54.502
< Exit [It] should set sslClientCertificate, sslVerifyClient and sslVerifyDepth with auth-tls-secret - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:36 @ 04/04/23 18:17:09.564 (15.063s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:09.564
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:09.781 (217ms)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:09.782
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:16.68 (6.899s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:17:16.68
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:17:20.71 (4.03s)
> Enter [It] should propagate the w3c header when configured with jaeger - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:197 @ 04/04/23 18:17:20.71
< Exit [It] should propagate the w3c header when configured with jaeger - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:197 @ 04/04/23 18:17:50.976 (30.266s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:50.976
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:51.176 (200ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:17:51.176
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:17:51.176 (0s)
-
-
- > Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:51.177
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:59.072 (7.895s)
> Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 04/04/23 18:17:59.072
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 04/04/23 18:18:13.271 (14.199s)
> Enter [It] handles endpoints only changes - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:62 @ 04/04/23 18:18:13.271
< Exit [It] handles endpoints only changes - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:62 @ 04/04/23 18:18:23.585 (10.314s)
> Enter [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:23.585
< Exit [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:23.805 (219ms)
-
-
- > Enter [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:23.805
< Exit [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:30.696 (6.891s)
> Enter [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:36 @ 04/04/23 18:18:30.696
< Exit [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:36 @ 04/04/23 18:18:34.717 (4.021s)
> Enter [It] should not appear references to secret updates not used in ingress rules - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:40 @ 04/04/23 18:18:34.717
< Exit [It] should not appear references to secret updates not used in ingress rules - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:40 @ 04/04/23 18:18:57.987 (23.27s)
> Enter [AfterEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:57.987
< Exit [AfterEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:58.194 (208ms)
-
-
- > Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:58.195
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:08.072 (9.877s)
> Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 04/04/23 18:19:08.072
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 04/04/23 18:19:12.096 (4.024s)
> Enter [It] should include opentelemetry_trust_incoming_spans on directive when enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:74 @ 04/04/23 18:19:12.096
< Exit [It] should include opentelemetry_trust_incoming_spans on directive when enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:74 @ 04/04/23 18:19:29.486 (17.39s)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:29.486
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:30 (514ms)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 04/04/23 18:19:30
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 04/04/23 18:19:30 (0s)
-
-
- > Enter [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:30.007
< Exit [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:37.929 (7.922s)
> Enter [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:34 @ 04/04/23 18:19:37.929
< Exit [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:34 @ 04/04/23 18:19:41.957 (4.027s)
> Enter [It] should redirect from www HTTP to HTTP - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:38 @ 04/04/23 18:19:41.957
STEP: setting up server for redirect from www - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:39 @ 04/04/23 18:19:41.957
STEP: sending request to www.fromtowwwredirect.bar.com - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:55 @ 04/04/23 18:19:52.111
< Exit [It] should redirect from www HTTP to HTTP - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:38 @ 04/04/23 18:19:52.114 (10.157s)
> Enter [AfterEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:52.114
< Exit [AfterEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:52.309 (195ms)
-
-
- > Enter [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:52.309
< Exit [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:59.222 (6.912s)
> Enter [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:33 @ 04/04/23 18:19:59.222
< Exit [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:33 @ 04/04/23 18:20:03.271 (4.049s)
> Enter [It] should produce valid JSON for /dbg general - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:85 @ 04/04/23 18:20:03.271
< Exit [It] should produce valid JSON for /dbg general - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:85 @ 04/04/23 18:20:10.739 (7.468s)
> Enter [AfterEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:10.739
< Exit [AfterEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:11.546 (807ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:11.548
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:20.355 (8.808s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:20:20.355
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:20:28.54 (8.185s)
> Enter [It] should route requests split between mainline and canary if canary weight is 50 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:808 @ 04/04/23 18:20:28.54
< Exit [It] should route requests split between mainline and canary if canary weight is 50 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:808 @ 04/04/23 18:21:23.965 (55.425s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:23.965
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:24.188 (223ms)
-
-
- > Enter [BeforeEach] [Annotations] custom-http-errors - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:24.188
< Exit [BeforeEach] [Annotations] custom-http-errors - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:32.093 (7.904s)
> Enter [BeforeEach] [Annotations] custom-http-errors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:37 @ 04/04/23 18:21:32.093
< Exit [BeforeEach] [Annotations] custom-http-errors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:37 @ 04/04/23 18:21:36.116 (4.023s)
> Enter [It] configures Nginx correctly - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:41 @ 04/04/23 18:21:36.116
STEP: turning on proxy_intercept_errors directive - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:59 @ 04/04/23 18:21:46.348
STEP: configuring error_page directive - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:62 @ 04/04/23 18:21:46.348
STEP: creating error locations - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:67 @ 04/04/23 18:21:46.348
STEP: updating configuration when only custom-http-error value changes - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:72 @ 04/04/23 18:21:46.349
STEP: ignoring duplicate values (503 in this case) per server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:90 @ 04/04/23 18:21:50.55
STEP: using the custom default-backend from annotation for upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:102 @ 04/04/23 18:22:00.715
< Exit [It] configures Nginx correctly - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:41 @ 04/04/23 18:22:08.9 (32.784s)
> Enter [AfterEach] [Annotations] custom-http-errors - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:08.9
< Exit [AfterEach] [Annotations] custom-http-errors - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:09.112 (212ms)
-
-
- > Enter [BeforeEach] [Annotations] connection-proxy-header - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:09.112
< Exit [BeforeEach] [Annotations] connection-proxy-header - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:17.003 (7.891s)
> Enter [BeforeEach] [Annotations] connection-proxy-header - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/connection.go:32 @ 04/04/23 18:22:17.003
< Exit [BeforeEach] [Annotations] connection-proxy-header - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/connection.go:32 @ 04/04/23 18:22:21.032 (4.029s)
> Enter [It] set connection header to keep-alive - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/connection.go:36 @ 04/04/23 18:22:21.032
< Exit [It] set connection header to keep-alive - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/connection.go:36 @ 04/04/23 18:22:31.159 (10.126s)
> Enter [AfterEach] [Annotations] connection-proxy-header - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:31.159
< Exit [AfterEach] [Annotations] connection-proxy-header - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:31.365 (206ms)
-
-
- > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:31.366
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:38.253 (6.887s)
> Enter [It] should return 200 for service type=ExternalName using FQDN with trailing dot - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:217 @ 04/04/23 18:22:38.253
< Exit [It] should return 200 for service type=ExternalName using FQDN with trailing dot - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:217 @ 04/04/23 18:22:48.533 (10.28s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:48.533
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:48.75 (218ms)
-
-
- > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:48.751
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:55.631 (6.88s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:22:55.631
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:22:59.653 (4.022s)
> Enter [BeforeEach] should configure TLS protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:47 @ 04/04/23 18:22:59.653
< Exit [BeforeEach] should configure TLS protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:47 @ 04/04/23 18:23:08.743 (9.09s)
> Enter [It] setting cipher suite - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:65 @ 04/04/23 18:23:08.743
< Exit [It] setting cipher suite - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:65 @ 04/04/23 18:23:18.9 (10.157s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:18.9
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:19.087 (187ms)
-
-
- > Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:19.087
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:27.019 (7.931s)
> Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:23:27.019
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:23:31.042 (4.023s)
> Enter [It] should not set client_body_buffer_size to invalid 1b - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:145 @ 04/04/23 18:23:31.042
< Exit [It] should not set client_body_buffer_size to invalid 1b - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:145 @ 04/04/23 18:23:41.252 (10.21s)
> Enter [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:41.252
< Exit [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:41.433 (181ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:41.433
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:48.317 (6.884s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:23:48.317
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:23:52.34 (4.023s)
> Enter [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:383 @ 04/04/23 18:23:52.34
< Exit [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:383 @ 04/04/23 18:24:11.665 (19.325s)
> Enter [It] user with annotated ingress retains cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:433 @ 04/04/23 18:24:11.665
< Exit [It] user with annotated ingress retains cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:433 @ 04/04/23 18:24:16.916 (5.251s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:16.916
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:17.295 (379ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:17.296
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:24.725 (7.429s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:24:24.725
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:24:28.761 (4.036s)
> Enter [It] should accept both Ingresses with default IngressClassName and IngressClass annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:132 @ 04/04/23 18:24:28.761
< Exit [It] should accept both Ingresses with default IngressClassName and IngressClass annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:132 @ 04/04/23 18:24:45.952 (17.19s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:45.952
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:46.145 (194ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:46.146
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:54.048 (7.903s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:24:54.048
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:24:58.076 (4.028s)
> Enter [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 04/04/23 18:24:58.076
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 04/04/23 18:25:03.11
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 04/04/23 18:25:13.321
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 04/04/23 18:25:23.483
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 04/04/23 18:25:33.694
< Exit [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 04/04/23 18:25:48.897 (50.821s)
> Enter [It] should redirect to signin url when not signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:849 @ 04/04/23 18:25:48.897
< Exit [It] should redirect to signin url when not signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:849 @ 04/04/23 18:25:48.908 (11ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:48.908
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:49.135 (227ms)
-
-
- > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:49.135
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:56.988 (7.853s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:25:56.988
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:26:08.04 (11.052s)
> Enter [It] should enable the log-format-escape-none - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:63 @ 04/04/23 18:26:08.04
< Exit [It] should enable the log-format-escape-none - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:63 @ 04/04/23 18:26:18.223 (10.184s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:18.223
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:18.414 (191ms)
-
-
- > Enter [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:18.415
< Exit [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:25.316 (6.901s)
> Enter [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:31 @ 04/04/23 18:26:25.316
< Exit [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:31 @ 04/04/23 18:26:29.352 (4.036s)
> Enter [It] disable-access-log set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:35 @ 04/04/23 18:26:29.352
< Exit [It] disable-access-log set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:35 @ 04/04/23 18:26:46.584 (17.231s)
> Enter [AfterEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:46.584
< Exit [AfterEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:46.805 (221ms)
-
-
- > Enter [BeforeEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:46.805
< Exit [BeforeEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:53.714 (6.909s)
> Enter [It] should return 503 when backend service does not exist - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_backend.go:36 @ 04/04/23 18:26:53.714
< Exit [It] should return 503 when backend service does not exist - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_backend.go:36 @ 04/04/23 18:27:03.859 (10.145s)
> Enter [AfterEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:03.859
< Exit [AfterEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:04.058 (199ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:04.058
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:22.496 (2m18.438s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:29:22.496
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:29:26.527 (4.032s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:29:26.527
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:29:40.697 (14.169s)
> Enter [It] should not create additional upstream block when host part of auth-url contains a variable - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:570 @ 04/04/23 18:29:40.697
< Exit [It] should not create additional upstream block when host part of auth-url contains a variable - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:570 @ 04/04/23 18:30:03.916 (23.219s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:03.916
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:04.131 (215ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:04.131
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:12.003 (7.871s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:30:12.003
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:30:16.028 (4.025s)
> Enter [It] should return 403 using auth-tls-match-cn with no matching CN from client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:266 @ 04/04/23 18:30:16.028
< Exit [It] should return 403 using auth-tls-match-cn with no matching CN from client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:266 @ 04/04/23 18:30:26.487 (10.459s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:26.487
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:26.704 (217ms)
-
-
- > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:26.704
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:33.592 (6.888s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:30:33.592
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:30:44.636 (11.044s)
> Enter [It] should set variables-hash-max-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:88 @ 04/04/23 18:30:44.636
< Exit [It] should set variables-hash-max-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:88 @ 04/04/23 18:30:54.792 (10.156s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:54.792
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:54.971 (179ms)
-
-
- > Enter [BeforeEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:98 @ 04/04/23 18:30:54.971
< Exit [BeforeEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:98 @ 04/04/23 18:30:56.98 (2.008s)
> Enter [It] fails when using alias directive - /go/src/k8s.io/ingress-nginx/test/e2e/nginx/nginx.go:115 @ 04/04/23 18:30:56.98
< Exit [It] fails when using alias directive - /go/src/k8s.io/ingress-nginx/test/e2e/nginx/nginx.go:115 @ 04/04/23 18:31:57.006 (1m0.027s)
> Enter [AfterEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:99 @ 04/04/23 18:31:57.006
< Exit [AfterEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:99 @ 04/04/23 18:31:57.009 (3ms)
-
-
- > Enter [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:57.009
< Exit [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:03.889 (6.88s)
> Enter [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:37 @ 04/04/23 18:32:03.889
< Exit [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:37 @ 04/04/23 18:32:07.917 (4.028s)
> Enter [It] should add value of stream-snippet to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:41 @ 04/04/23 18:32:07.917
< Exit [It] should add value of stream-snippet to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:41 @ 04/04/23 18:32:23.139 (15.222s)
> Enter [AfterEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:23.139
< Exit [AfterEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:23.334 (195ms)
-
-
- > Enter [BeforeEach] [Annotations] force-ssl-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:23.334
< Exit [BeforeEach] [Annotations] force-ssl-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:30.222 (6.888s)
> Enter [BeforeEach] [Annotations] force-ssl-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/forcesslredirect.go:30 @ 04/04/23 18:32:30.222
< Exit [BeforeEach] [Annotations] force-ssl-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/forcesslredirect.go:30 @ 04/04/23 18:32:34.249 (4.027s)
> Enter [It] should redirect to https - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/forcesslredirect.go:34 @ 04/04/23 18:32:34.249
< Exit [It] should redirect to https - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/forcesslredirect.go:34 @ 04/04/23 18:32:41.274 (7.025s)
> Enter [AfterEach] [Annotations] force-ssl-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:41.274
< Exit [AfterEach] [Annotations] force-ssl-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:41.496 (222ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:41.497
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:48.376 (6.879s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:32:48.376
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:32:52.403 (4.027s)
> Enter [BeforeEach] With specific ingress-class flags - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:392 @ 04/04/23 18:32:52.403
< Exit [BeforeEach] With specific ingress-class flags - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:392 @ 04/04/23 18:33:00.451 (8.048s)
> Enter [It] should ignore Ingress with no class and accept the correctly configured Ingresses - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:413 @ 04/04/23 18:33:00.451
< Exit [It] should ignore Ingress with no class and accept the correctly configured Ingresses - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:413 @ 04/04/23 18:33:24.697 (24.246s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:24.697
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:24.873 (176ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:24.873
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:32.238 (7.364s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:33:32.238
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:33:42.291 (10.053s)
> Enter [It] should route requests only to canary if canary weight is 100 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:743 @ 04/04/23 18:33:42.291
< Exit [It] should route requests only to canary if canary weight is 100 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:743 @ 04/04/23 18:33:59.526 (17.235s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:59.526
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:59.709 (183ms)
-
-
- > Enter [BeforeEach] plugins - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:59.71
< Exit [BeforeEach] plugins - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:06.602 (6.893s)
> Enter [BeforeEach] plugins - /go/src/k8s.io/ingress-nginx/test/e2e/settings/plugins.go:31 @ 04/04/23 18:34:06.602
< Exit [BeforeEach] plugins - /go/src/k8s.io/ingress-nginx/test/e2e/settings/plugins.go:31 @ 04/04/23 18:34:10.627 (4.025s)
> Enter [It] should exist a x-hello-world header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/plugins.go:35 @ 04/04/23 18:34:10.627
< Exit [It] should exist a x-hello-world header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/plugins.go:35 @ 04/04/23 18:34:27.807 (17.179s)
> Enter [AfterEach] plugins - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:27.807
< Exit [AfterEach] plugins - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:28.007 (200ms)
-
-
- > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:28.007
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:35.896 (7.889s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:34:35.896
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:34:39.916 (4.02s)
> Enter [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 04/04/23 18:34:39.916
STEP: configuring certificate_by_lua and skipping Nginx configuration of the new certificate - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:128 @ 04/04/23 18:34:57.039
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:136 @ 04/04/23 18:35:05.187
< Exit [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 04/04/23 18:35:05.197 (25.281s)
> Enter [It] falls back to using default certificate when secret gets deleted without reloading - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:185 @ 04/04/23 18:35:05.197
STEP: serving the default certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:204 @ 04/04/23 18:35:10.227
STEP: skipping Nginx reload - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:214 @ 04/04/23 18:35:10.293
< Exit [It] falls back to using default certificate when secret gets deleted without reloading - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:185 @ 04/04/23 18:35:10.293 (5.095s)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:10.293
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:10.501 (209ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:10.502
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:17.387 (6.885s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:35:17.387
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:35:21.413 (4.026s)
> Enter [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:383 @ 04/04/23 18:35:21.413
< Exit [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:383 @ 04/04/23 18:35:42.607 (21.195s)
> Enter [It] user retains cookie by default - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:411 @ 04/04/23 18:35:42.607
< Exit [It] user retains cookie by default - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:411 @ 04/04/23 18:35:42.616 (9ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:42.616
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:42.832 (216ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:42.832
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:49.737 (6.905s)
> Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 04/04/23 18:35:49.737
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 04/04/23 18:35:54.76 (5.023s)
> Enter [It] should use fastcgi_pass in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:37 @ 04/04/23 18:35:54.76
< Exit [It] should use fastcgi_pass in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:37 @ 04/04/23 18:36:04.978 (10.218s)
> Enter [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:04.978
< Exit [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:05.161 (183ms)
-
-
- > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:05.162
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:13.068 (7.906s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:36:13.068
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:36:17.096 (4.027s)
> Enter [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 04/04/23 18:36:17.096
STEP: configuring certificate_by_lua and skipping Nginx configuration of the new certificate - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:128 @ 04/04/23 18:36:34.288
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:136 @ 04/04/23 18:36:42.473
< Exit [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 04/04/23 18:36:42.5 (25.405s)
> Enter [It] picks up the updated certificate without reloading - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:149 @ 04/04/23 18:36:42.5
STEP: configuring certificate_by_lua and skipping Nginx configuration of the new certificate - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:163 @ 04/04/23 18:36:47.607
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:169 @ 04/04/23 18:36:50.731
STEP: skipping Nginx reload - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:180 @ 04/04/23 18:36:53.763
< Exit [It] picks up the updated certificate without reloading - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:149 @ 04/04/23 18:36:53.763 (11.263s)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:53.763
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:53.98 (217ms)
-
-
- > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:53.981
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:00.852 (6.872s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:37:00.852
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:37:13.899 (13.046s)
> Enter [It] log-format default escape - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:105 @ 04/04/23 18:37:13.899
< Exit [It] log-format default escape - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:105 @ 04/04/23 18:37:27.067 (13.169s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:27.067
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:27.254 (186ms)
-
-
- > Enter [BeforeEach] brotli - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:27.254
< Exit [BeforeEach] brotli - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:35.134 (7.88s)
> Enter [BeforeEach] brotli - /go/src/k8s.io/ingress-nginx/test/e2e/settings/brotli.go:35 @ 04/04/23 18:37:35.134
< Exit [BeforeEach] brotli - /go/src/k8s.io/ingress-nginx/test/e2e/settings/brotli.go:35 @ 04/04/23 18:37:39.153 (4.019s)
> Enter [It] should only compress responses that meet the `brotli-min-length` condition - /go/src/k8s.io/ingress-nginx/test/e2e/settings/brotli.go:39 @ 04/04/23 18:37:39.153
< Exit [It] should only compress responses that meet the `brotli-min-length` condition - /go/src/k8s.io/ingress-nginx/test/e2e/settings/brotli.go:39 @ 04/04/23 18:38:10.344 (31.191s)
> Enter [AfterEach] brotli - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:10.344
< Exit [AfterEach] brotli - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:10.535 (191ms)
-
-
- > Enter [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:10.535
< Exit [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:17.414 (6.879s)
> Enter [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:31 @ 04/04/23 18:38:17.414
< Exit [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:31 @ 04/04/23 18:38:21.437 (4.023s)
> Enter [It] disable-http-access-log set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:53 @ 04/04/23 18:38:21.437
< Exit [It] disable-http-access-log set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:53 @ 04/04/23 18:38:38.614 (17.177s)
> Enter [AfterEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:38.614
< Exit [AfterEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:38.835 (221ms)
-
-
- > Enter [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:38.836
< Exit [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:45.698 (6.862s)
> Enter [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:30 @ 04/04/23 18:38:45.698
< Exit [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:30 @ 04/04/23 18:38:49.734 (4.036s)
> Enter [It] set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:34 @ 04/04/23 18:38:49.734
< Exit [It] set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:34 @ 04/04/23 18:38:59.959 (10.225s)
> Enter [AfterEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:59.959
< Exit [AfterEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:00.179 (220ms)
-
-
-
- > Enter [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:00.179
< Exit [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:08.619 (8.44s)
> Enter [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:42 @ 04/04/23 18:39:08.619
< Exit [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:42 @ 04/04/23 18:39:12.644 (4.025s)
> Enter [It] should only allow requests from specific countries - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:70 @ 04/04/23 18:39:12.644
[SKIPPED] GeoIP test are temporarily disabled
In [It] at: /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:71 @ 04/04/23 18:39:12.645
< Exit [It] should only allow requests from specific countries - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:70 @ 04/04/23 18:39:12.645 (1ms)
> Enter [AfterEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:12.645
< Exit [AfterEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:12.862 (217ms)
-
-
- > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:12.863
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:19.76 (6.897s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:39:19.76
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:39:23.829 (4.069s)
> Enter [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 04/04/23 18:39:23.829
< Exit [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 04/04/23 18:39:33.03 (9.2s)
> Enter [It] setting includeSubDomains parameter - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:127 @ 04/04/23 18:39:33.03
< Exit [It] setting includeSubDomains parameter - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:127 @ 04/04/23 18:39:43.259 (10.229s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:43.259
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:43.444 (186ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:43.445
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:50.328 (6.883s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:39:50.328
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:39:58.361 (8.034s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:39:58.361
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 04/04/23 18:39:58.361
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 04/04/23 18:40:08.534
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 04/04/23 18:40:18.725
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:40:28.928 (30.567s)
> Enter [It] should add auth headers when global-auth-response-headers is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:223 @ 04/04/23 18:40:28.928
STEP: Adding a global-auth-response-headers to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:228 @ 04/04/23 18:40:28.928
< Exit [It] should add auth headers when global-auth-response-headers is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:223 @ 04/04/23 18:40:39.119 (10.19s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:39.119
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:39.335 (216ms)
-
-
- > Enter [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:39.335
< Exit [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:46.231 (6.896s)
> Enter [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:32 @ 04/04/23 18:40:46.231
< Exit [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:32 @ 04/04/23 18:40:48.266 (2.035s)
> Enter [It] should not set invalid proxy read timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:52 @ 04/04/23 18:40:48.266
< Exit [It] should not set invalid proxy read timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:52 @ 04/04/23 18:41:05.463 (17.198s)
> Enter [AfterEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:41:05.463
< Exit [AfterEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:41:05.678 (215ms)
-
-
- > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:41:24.95
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:41:57.132 (32.182s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 18:41:57.132
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 18:42:05.196 (8.064s)
> Enter [It] should not return an error if the Ingress V1 definition is valid with IngressClass annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:180 @ 04/04/23 18:42:05.196
< Exit [It] should not return an error if the Ingress V1 definition is valid with IngressClass annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:180 @ 04/04/23 18:42:08.558 (3.362s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:42:08.558
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:42:08.881 (323ms)
-
-
- > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:42:08.881
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:42:27.269 (18.388s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 18:42:27.269
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 18:42:35.33 (8.061s)
> Enter [It] should return an error if the Ingress V1 definition contains invalid annotations - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:196 @ 04/04/23 18:42:35.33
< Exit [It] should return an error if the Ingress V1 definition contains invalid annotations - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:196 @ 04/04/23 18:42:35.482 (152ms)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:42:35.482
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:42:35.681 (199ms)
-
-
- > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:42:35.681
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:42:54.33 (18.649s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 18:42:54.33
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 21:18:55.121 (10.056s)
> Enter [It] should not allow overlaps of host and paths without canary annotations - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:70 @ 04/04/23 21:18:55.121
< Exit [It] should not allow overlaps of host and paths without canary annotations - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:70 @ 04/04/23 21:18:58.366 (3.245s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 21:18:58.367
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 21:18:58.612 (246ms)
-
-
- > Enter [BeforeEach] [TopologyHints] topology aware routing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 21:18:58.613
< Exit [BeforeEach] [TopologyHints] topology aware routing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 21:19:05.487 (6.875s)
> Enter [BeforeEach] [TopologyHints] topology aware routing - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/topology.go:39 @ 04/04/23 21:19:05.487
< Exit [BeforeEach] [TopologyHints] topology aware routing - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/topology.go:39 @ 04/04/23 21:19:09.523 (4.036s)
> Enter [It] should return 200 when service has topology hints - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/topology.go:43 @ 04/04/23 21:19:09.523
STEP: checking if the service is reached - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/topology.go:53 @ 04/04/23 21:19:19.701
< Exit [It] should return 200 when service has topology hints - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/topology.go:43 @ 04/04/23 21:19:19.839 (10.316s)
> Enter [AfterEach] [TopologyHints] topology aware routing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 21:19:19.839
< Exit [AfterEach] [TopologyHints] topology aware routing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 21:19:20.061 (222ms)
-
-
- > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 21:19:20.061
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:17:57.17 (30.737s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:17:57.17
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:18:05.234 (8.065s)
> Enter [It] should block ingress with invalid path - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:108 @ 04/04/23 22:18:05.234
< Exit [It] should block ingress with invalid path - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:108 @ 04/04/23 22:18:08.53 (3.296s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:18:08.53
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:18:08.765 (235ms)
-
-
- > Enter [BeforeEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:18:08.766
< Exit [BeforeEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:18:22.642 (13.877s)
> Enter [BeforeEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/settings/namespace_selector.go:51 @ 04/04/23 22:18:22.642
< Exit [BeforeEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/settings/namespace_selector.go:51 @ 04/04/23 22:18:48.76 (26.118s)
> Enter [It] should ingore Ingress of namespace without label foo=bar and accept those of namespace with label foo=bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/namespace_selector.go:63 @ 04/04/23 22:18:48.76
< Exit [It] should ingore Ingress of namespace without label foo=bar and accept those of namespace with label foo=bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/namespace_selector.go:63 @ 04/04/23 22:18:55.044 (6.284s)
> Enter [AfterEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:18:55.044
< Exit [AfterEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:18:55.29 (246ms)
> Enter [AfterEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/settings/namespace_selector.go:56 @ 04/04/23 22:18:55.29
< Exit [AfterEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/settings/namespace_selector.go:56 @ 04/04/23 22:18:55.293 (3ms)
-
-
- > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:18:55.294
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:19:12.977 (17.683s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:19:12.977
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:19:21.048 (8.072s)
> Enter [It] should not return an error for an invalid Ingress when it has unknown class - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:207 @ 04/04/23 22:19:21.048
< Exit [It] should not return an error for an invalid Ingress when it has unknown class - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:207 @ 04/04/23 22:19:21.18 (132ms)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:19:21.18
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:19:21.377 (197ms)
-
-
- > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:19:21.377
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:19:52.511 (31.134s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:19:52.511
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:20:00.575 (8.064s)
> Enter [It] reject ingress with global-rate-limit annotations when memcached is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:43 @ 04/04/23 22:20:00.575
STEP: rejects ingress when memcached is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:52 @ 04/04/23 22:20:00.575
STEP: accepts ingress when memcached is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:57 @ 04/04/23 22:20:00.587
< Exit [It] reject ingress with global-rate-limit annotations when memcached is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:43 @ 04/04/23 22:20:10.885 (10.31s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:20:10.885
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:20:11.143 (257ms)
-
-
- > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:20:11.143
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:20:29.584 (18.441s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:20:29.584
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:20:37.66 (8.076s)
> Enter [It] should return an error if there is an invalid value in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:136 @ 04/04/23 22:20:37.66
< Exit [It] should return an error if there is an invalid value in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:136 @ 04/04/23 22:20:44.7 (7.04s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:20:44.7
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:20:44.899 (199ms)
-
-
- > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:20:44.899
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:21:03.976 (19.078s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:21:03.976
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:21:12.046 (8.07s)
> Enter [It] should return an error if there is a forbidden value in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:150 @ 04/04/23 22:21:12.046
< Exit [It] should return an error if there is a forbidden value in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:150 @ 04/04/23 22:21:19.079 (7.033s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:21:19.079
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:21:19.337 (258ms)
-
-
- > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:21:19.337
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:21:37.731 (18.394s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:21:37.731
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:21:45.791 (8.06s)
> Enter [It] should return an error if there is an error validating the ingress definition - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:125 @ 04/04/23 22:21:45.791
< Exit [It] should return an error if there is an error validating the ingress definition - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:125 @ 04/04/23 22:21:45.852 (61ms)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:21:45.852
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:21:46.057 (205ms)
-
-
- > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:21:46.057
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:22:04.907 (18.85s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:22:04.907
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:22:12.968 (8.061s)
> Enter [It] should not return an error if the Ingress V1 definition is valid with Ingress Class - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:164 @ 04/04/23 22:22:12.968
< Exit [It] should not return an error if the Ingress V1 definition is valid with Ingress Class - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:164 @ 04/04/23 22:22:18.358 (5.39s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:22:18.358
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:22:18.592 (234ms)
-
-
- > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:22:18.592
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:22:47.015 (28.422s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:22:47.015
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:22:55.073 (8.059s)
> Enter [It] should allow overlaps of host and paths with canary annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:87 @ 04/04/23 22:22:55.073
< Exit [It] should allow overlaps of host and paths with canary annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:87 @ 04/04/23 22:22:58.439 (3.366s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:22:58.439
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:22:58.64 (201ms)
-
-
- > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:19.251
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:26.76 (7.509s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:04:26.76
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:04:38.808 (12.048s)
> Enter [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 04/04/23 18:04:38.808
STEP: configuring certificate_by_lua and skipping Nginx configuration of the new certificate - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:128 @ 04/04/23 18:04:55.931
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:136 @ 04/04/23 18:05:04.12
< Exit [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 04/04/23 18:05:04.15 (25.342s)
> Enter [It] supports requests with domain with trailing dot - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:145 @ 04/04/23 18:05:04.15
< Exit [It] supports requests with domain with trailing dot - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:145 @ 04/04/23 18:05:04.174 (24ms)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:04.174
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:04.407 (234ms)
-
-
- > Enter [BeforeEach] [Annotations] preserve-trailing-slash - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:04.408
< Exit [BeforeEach] [Annotations] preserve-trailing-slash - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:11.385 (6.978s)
> Enter [BeforeEach] [Annotations] preserve-trailing-slash - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/preservetrailingslash.go:30 @ 04/04/23 18:05:11.385
< Exit [BeforeEach] [Annotations] preserve-trailing-slash - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/preservetrailingslash.go:30 @ 04/04/23 18:05:15.42 (4.034s)
> Enter [It] should allow preservation of trailing slashes - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/preservetrailingslash.go:34 @ 04/04/23 18:05:15.42
< Exit [It] should allow preservation of trailing slashes - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/preservetrailingslash.go:34 @ 04/04/23 18:05:22.428 (7.008s)
> Enter [AfterEach] [Annotations] preserve-trailing-slash - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:22.428
< Exit [AfterEach] [Annotations] preserve-trailing-slash - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:22.626 (198ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:22.626
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:29.568 (6.942s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:05:29.568
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:05:33.606 (4.037s)
> Enter [It] should set valid proxy timeouts - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:115 @ 04/04/23 18:05:33.606
< Exit [It] should set valid proxy timeouts - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:115 @ 04/04/23 18:05:43.732 (10.127s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:43.732
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:43.917 (184ms)
-
-
- > Enter [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:43.917
< Exit [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:51.802 (7.885s)
> Enter [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:32 @ 04/04/23 18:05:51.802
< Exit [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:32 @ 04/04/23 18:05:55.831 (4.029s)
> Enter [It] should exist a proxy_host using the upstream-vhost annotation value - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:57 @ 04/04/23 18:05:55.831
< Exit [It] should exist a proxy_host using the upstream-vhost annotation value - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:57 @ 04/04/23 18:06:05.978 (10.147s)
> Enter [AfterEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:05.978
< Exit [AfterEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:06.188 (210ms)
-
-
- > Enter [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:06.189
< Exit [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:14.133 (7.945s)
> Enter [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:34 @ 04/04/23 18:06:14.133
< Exit [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:34 @ 04/04/23 18:06:18.165 (4.031s)
> Enter [It] should not exists Server header in the response - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:38 @ 04/04/23 18:06:18.165
< Exit [It] should not exists Server header in the response - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:38 @ 04/04/23 18:06:35.378 (17.213s)
> Enter [AfterEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:35.378
< Exit [AfterEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:35.637 (259ms)
-
-
- > Enter [BeforeEach] [Setting] Configmap - limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:35.637
< Exit [BeforeEach] [Setting] Configmap - limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:42.521 (6.884s)
> Enter [BeforeEach] [Setting] Configmap - limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/settings/limit_rate.go:32 @ 04/04/23 18:06:42.521
< Exit [BeforeEach] [Setting] Configmap - limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/settings/limit_rate.go:32 @ 04/04/23 18:06:46.54 (4.019s)
> Enter [It] Check limit-rate config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/limit_rate.go:36 @ 04/04/23 18:06:46.54
< Exit [It] Check limit-rate config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/limit_rate.go:36 @ 04/04/23 18:07:17.039 (30.499s)
> Enter [AfterEach] [Setting] Configmap - limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:17.039
< Exit [AfterEach] [Setting] Configmap - limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:17.22 (180ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:17.22
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:24.225 (7.005s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:07:24.225
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:07:26.256 (2.031s)
> Enter [It] does not set the path to / on the generated cookie if there's more than one rule referring to the same backend - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:121 @ 04/04/23 18:07:26.256
< Exit [It] does not set the path to / on the generated cookie if there's more than one rule referring to the same backend - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:121 @ 04/04/23 18:07:36.45 (10.194s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:36.45
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:36.633 (183ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:36.633
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:43.537 (6.903s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:07:43.537
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:07:51.596 (8.059s)
> Enter [It] should response with a 200 status from the mainline upstream when requests are made to the mainline ingress - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:48 @ 04/04/23 18:07:51.596
< Exit [It] should response with a 200 status from the mainline upstream when requests are made to the mainline ingress - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:48 @ 04/04/23 18:08:08.813 (17.217s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:08.813
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:09.063 (249ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:09.063
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:16.959 (7.896s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:08:16.959
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:08:25.017 (8.058s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:08:25.017
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 04/04/23 18:08:25.017
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 04/04/23 18:08:35.191
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 04/04/23 18:08:45.372
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:08:55.507 (30.491s)
> Enter [It] should still return status code 200 after auth backend is deleted using cache - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:155 @ 04/04/23 18:08:55.507
STEP: Adding a global-auth-cache-key to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:163 @ 04/04/23 18:08:55.507
< Exit [It] should still return status code 200 after auth backend is deleted using cache - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:155 @ 04/04/23 18:09:12.69 (17.183s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:12.69
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:12.914 (224ms)
-
-
- > Enter [BeforeEach] [Ingress] DeepInspection - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:12.915
< Exit [BeforeEach] [Ingress] DeepInspection - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:19.799 (6.884s)
> Enter [BeforeEach] [Ingress] DeepInspection - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/deep_inspection.go:30 @ 04/04/23 18:09:19.799
< Exit [BeforeEach] [Ingress] DeepInspection - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/deep_inspection.go:30 @ 04/04/23 18:09:23.825 (4.026s)
> Enter [It] should drop whole ingress if one path matches invalid regex - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/deep_inspection.go:34 @ 04/04/23 18:09:23.825
< Exit [It] should drop whole ingress if one path matches invalid regex - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/deep_inspection.go:34 @ 04/04/23 18:09:41.065 (17.24s)
> Enter [AfterEach] [Ingress] DeepInspection - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:41.065
< Exit [AfterEach] [Ingress] DeepInspection - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:41.299 (233ms)
-
-
- > Enter [BeforeEach] [Setting] [Lua] lua-shared-dicts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:41.299
< Exit [BeforeEach] [Setting] [Lua] lua-shared-dicts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:49.196 (7.896s)
> Enter [It] configures lua shared dicts - /go/src/k8s.io/ingress-nginx/test/e2e/settings/lua_shared_dicts.go:29 @ 04/04/23 18:09:49.196
< Exit [It] configures lua shared dicts - /go/src/k8s.io/ingress-nginx/test/e2e/settings/lua_shared_dicts.go:29 @ 04/04/23 18:10:01.416 (12.22s)
> Enter [AfterEach] [Setting] [Lua] lua-shared-dicts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:01.416
< Exit [AfterEach] [Setting] [Lua] lua-shared-dicts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:01.602 (187ms)
-
-
- > Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:01.603
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:08.48 (6.877s)
> Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 04/04/23 18:10:08.48
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 04/04/23 18:10:12.502 (4.022s)
> Enter [It] should use correct longest path match - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:66 @ 04/04/23 18:10:12.502
STEP: creating a regular ingress definition - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:69 @ 04/04/23 18:10:12.502
STEP: making a request to the non-rewritten location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:78 @ 04/04/23 18:10:22.752
STEP: creating an ingress definition with the rewrite-target annotation set on the "/" location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:88 @ 04/04/23 18:10:22.759
STEP: making a second request to the non-rewritten location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:102 @ 04/04/23 18:10:32.852
< Exit [It] should use correct longest path match - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:66 @ 04/04/23 18:10:32.86 (20.358s)
> Enter [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:32.86
< Exit [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:33.04 (180ms)
-
-
- > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:33.04
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:40.925 (7.885s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:10:40.925
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:10:44.945 (4.02s)
> Enter [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 04/04/23 18:10:44.945
Apr 4 18:10:54.109: INFO: Unexpected TLS error: tls: failed to verify certificate: x509: certificate is valid for ingress.local, not settings-tls
< Exit [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 04/04/23 18:10:56.109 (11.164s)
> Enter [It] setting max-age parameter - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:111 @ 04/04/23 18:10:56.109
< Exit [It] setting max-age parameter - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:111 @ 04/04/23 18:11:06.315 (10.206s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:06.315
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:06.527 (212ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:06.528
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:13.431 (6.904s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:11:13.431
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:11:21.479 (8.048s)
> Enter [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:301 @ 04/04/23 18:11:21.479
< Exit [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:301 @ 04/04/23 18:11:49.732 (28.253s)
> Enter [It] user with global-auth-always-set-cookie key in configmap retains cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:348 @ 04/04/23 18:11:49.732
< Exit [It] user with global-auth-always-set-cookie key in configmap retains cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:348 @ 04/04/23 18:11:56.743 (7.011s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:56.743
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:56.926 (183ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:56.926
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:03.815 (6.889s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:12:03.815
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:12:11.862 (8.047s)
> Enter [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:301 @ 04/04/23 18:12:11.862
< Exit [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:301 @ 04/04/23 18:12:40.103 (28.241s)
> Enter [It] user retains cookie by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:326 @ 04/04/23 18:12:40.103
< Exit [It] user retains cookie by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:326 @ 04/04/23 18:12:40.112 (9ms)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:40.112
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:40.334 (222ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:40.335
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:47.184 (6.849s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:12:47.184
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:12:51.214 (4.031s)
> Enter [It] should not allow - portless origin with wildcard origin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:515 @ 04/04/23 18:12:51.214
< Exit [It] should not allow - portless origin with wildcard origin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:515 @ 04/04/23 18:12:58.232 (7.018s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:58.232
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:58.436 (203ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:58.436
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:05.332 (6.896s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:13:05.332
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:13:09.361 (4.029s)
> Enter [It] should return status code 200 when authentication is configured with a map and Authorization header is sent - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:199 @ 04/04/23 18:13:09.361
< Exit [It] should return status code 200 when authentication is configured with a map and Authorization header is sent - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:199 @ 04/04/23 18:13:21.468 (12.107s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:21.468
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:21.639 (171ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:21.639
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:29.514 (7.875s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:13:29.514
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:13:33.537 (4.023s)
> Enter [It] should pass URL-encoded certificate to upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:161 @ 04/04/23 18:13:33.537
< Exit [It] should pass URL-encoded certificate to upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:161 @ 04/04/23 18:13:47.331 (13.794s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:47.331
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:47.532 (202ms)
-
-
- > Enter [BeforeEach] [Default Backend] custom service - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:47.533
< Exit [BeforeEach] [Default Backend] custom service - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:54.43 (6.897s)
> Enter [It] uses custom default backend that returns 200 as status code - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/custom_default_backend.go:36 @ 04/04/23 18:13:54.43
< Exit [It] uses custom default backend that returns 200 as status code - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/custom_default_backend.go:36 @ 04/04/23 18:14:10.603 (16.173s)
> Enter [AfterEach] [Default Backend] custom service - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:10.603
< Exit [AfterEach] [Default Backend] custom service - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:10.797 (195ms)
-
-
- > Enter [BeforeEach] [Annotations] whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:10.798
< Exit [BeforeEach] [Annotations] whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:17.742 (6.944s)
> Enter [BeforeEach] [Annotations] whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipwhitelist.go:30 @ 04/04/23 18:14:17.742
< Exit [BeforeEach] [Annotations] whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipwhitelist.go:30 @ 04/04/23 18:14:21.766 (4.024s)
> Enter [It] should set valid ip whitelist range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipwhitelist.go:34 @ 04/04/23 18:14:21.766
< Exit [It] should set valid ip whitelist range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipwhitelist.go:34 @ 04/04/23 18:14:31.914 (10.148s)
> Enter [AfterEach] [Annotations] whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:31.914
< Exit [AfterEach] [Annotations] whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:32.125 (211ms)
-
-
- > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:32.125
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:40.045 (7.92s)
> Enter [It] should return 200 for service type=ExternalName using a port name - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:184 @ 04/04/23 18:14:40.045
< Exit [It] should return 200 for service type=ExternalName using a port name - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:184 @ 04/04/23 18:14:50.345 (10.299s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:50.345
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:50.661 (317ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:50.662
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:57.86 (7.198s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:14:57.86
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:15:01.901 (4.041s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:15:01.901
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:15:16.075 (14.174s)
> Enter [It] should not create additional upstream block when auth-keepalive is not set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:552 @ 04/04/23 18:15:16.075
< Exit [It] should not create additional upstream block when auth-keepalive is not set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:552 @ 04/04/23 18:15:39.289 (23.214s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:39.289
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:39.523 (234ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:39.523
< Exit [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:46.413 (6.89s)
> Enter [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:43 @ 04/04/23 18:15:46.413
< Exit [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:43 @ 04/04/23 18:16:05.358 (18.945s)
> Enter [It] should return status code 401 when accessing '/' unauthentication - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:54 @ 04/04/23 18:16:05.358
< Exit [It] should return status code 401 when accessing '/' unauthentication - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:54 @ 04/04/23 18:16:08.518 (3.16s)
> Enter [AfterEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:08.518
< Exit [AfterEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:08.699 (180ms)
-
-
- > Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:08.699
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:15.641 (6.942s)
> Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 04/04/23 18:16:15.641
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 04/04/23 18:16:26.725 (11.084s)
> Enter [It] should enable PROXY Protocol for HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:112 @ 04/04/23 18:16:26.725
< Exit [It] should enable PROXY Protocol for HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:112 @ 04/04/23 18:17:59.041 (1m32.316s)
> Enter [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:59.041
< Exit [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:59.27 (229ms)
-
-
- > Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:59.27
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:07.156 (7.885s)
> Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 04/04/23 18:18:07.156
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 04/04/23 18:18:19.212 (12.057s)
> Enter [It] should ignore catch all Ingress with backend - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:50 @ 04/04/23 18:18:19.212
< Exit [It] should ignore catch all Ingress with backend - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:50 @ 04/04/23 18:18:39.618 (20.406s)
> Enter [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:39.618
< Exit [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:39.83 (212ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:39.831
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:46.716 (6.885s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:18:46.716
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:18:50.744 (4.028s)
> Enter [It] should allow headers for cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:137 @ 04/04/23 18:18:50.744
< Exit [It] should allow headers for cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:137 @ 04/04/23 18:19:00.902 (10.159s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:00.902
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:01.091 (189ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:01.092
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:09.007 (7.915s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:19:09.007
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:19:17.081 (8.074s)
> Enter [It] should return 404 status for requests to the canary if no matching ingress is found - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:80 @ 04/04/23 18:19:17.081
< Exit [It] should return 404 status for requests to the canary if no matching ingress is found - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:80 @ 04/04/23 18:19:24.105 (7.024s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:24.105
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:24.388 (283ms)
-
-
- > Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:24.389
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:43.748 (2m19.359s)
> Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 04/04/23 18:21:43.748
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 04/04/23 18:21:57.954 (14.206s)
> Enter [It] handles endpoints only changes (down scaling of replicas) - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:87 @ 04/04/23 18:21:57.954
< Exit [It] handles endpoints only changes (down scaling of replicas) - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:87 @ 04/04/23 18:22:20.304 (22.351s)
> Enter [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:20.304
< Exit [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:20.502 (198ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:20.503
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:27.369 (6.866s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:22:27.369
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:22:31.399 (4.03s)
> Enter [It] should not set proxy client-max-body-size to incorrect value - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:100 @ 04/04/23 18:22:31.399
< Exit [It] should not set proxy client-max-body-size to incorrect value - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:100 @ 04/04/23 18:22:41.545 (10.146s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:41.545
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:41.748 (203ms)
-
-
- > Enter [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:41.748
< Exit [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:58.304 (2m16.556s)
> Enter [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:32 @ 04/04/23 18:24:58.304
< Exit [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:32 @ 04/04/23 18:25:07.351 (9.047s)
> Enter [It] reuse port should be disabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:44 @ 04/04/23 18:25:07.351
< Exit [It] reuse port should be disabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:44 @ 04/04/23 18:25:17.463 (10.112s)
> Enter [AfterEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:17.463
< Exit [AfterEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:17.721 (257ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:17.721
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:36 (2m18.279s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:27:36
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:27:40.022 (4.023s)
> Enter [It] should set snippet "proxy_set_header My-Custom-Header 42;" when external auth is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:266 @ 04/04/23 18:27:40.022
< Exit [It] should set snippet "proxy_set_header My-Custom-Header 42;" when external auth is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:266 @ 04/04/23 18:27:50.223 (10.201s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:50.224
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:50.413 (190ms)
-
-
- > Enter [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:50.414
< Exit [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:04.312 (13.898s)
> Enter [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:38 @ 04/04/23 18:28:04.312
< Exit [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:38 @ 04/04/23 18:28:11.43 (7.118s)
> Enter [It] should set the X-Forwarded-Port header to 443 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:100 @ 04/04/23 18:28:11.43
Apr 4 18:28:24.664: INFO: Unexpected TLS error: tls: failed to verify certificate: x509: certificate is valid for ingress.local, not forwarded-headers
< Exit [It] should set the X-Forwarded-Port header to 443 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:100 @ 04/04/23 18:28:29.799 (18.368s)
> Enter [AfterEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:29.799
< Exit [AfterEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:30.029 (230ms)
-
-
- > Enter [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:30.03
< Exit [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:36.888 (6.859s)
> Enter [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:31 @ 04/04/23 18:28:36.888
< Exit [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:31 @ 04/04/23 18:28:40.919 (4.03s)
> Enter [It] set snippet "more_set_headers "Foo1: Bar1";" in all locations" - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:35 @ 04/04/23 18:28:40.919
< Exit [It] set snippet "more_set_headers "Foo1: Bar1";" in all locations" - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:35 @ 04/04/23 18:28:51.095 (10.176s)
> Enter [AfterEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:51.095
< Exit [AfterEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:51.273 (178ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:51.273
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:59.672 (8.399s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:28:59.672
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:29:07.713 (8.041s)
> Enter [It] should route requests to the correct upstream if the canary ingress is modified - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:307 @ 04/04/23 18:29:07.713
STEP: routing requests destined for the mainline ingress to the mainline upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:351 @ 04/04/23 18:29:32.166
STEP: routing requests destined for the canary ingress to the canary upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:360 @ 04/04/23 18:29:32.169
< Exit [It] should route requests to the correct upstream if the canary ingress is modified - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:307 @ 04/04/23 18:29:32.172 (24.459s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:32.172
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:32.356 (184ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:32.356
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:39.249 (6.892s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:29:39.249
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:29:43.271 (4.022s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:29:43.271
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:29:57.423 (14.152s)
> Enter [It] should not create additional upstream block when auth-keepalive is negative - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:590 @ 04/04/23 18:29:57.423
< Exit [It] should not create additional upstream block when auth-keepalive is negative - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:590 @ 04/04/23 18:30:20.684 (23.26s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:20.684
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:20.873 (189ms)
-
-
- > Enter [BeforeEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:20.873
< Exit [BeforeEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:27.823 (6.95s)
> Enter [It] should create sync events - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_sync_events.go:53 @ 04/04/23 18:30:27.823
< Exit [It] should create sync events - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_sync_events.go:53 @ 04/04/23 18:30:49.071 (21.248s)
> Enter [AfterEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:49.071
< Exit [AfterEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:49.267 (196ms)
-
-
- > Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:49.267
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:56.179 (6.912s)
> Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:30:56.179
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:31:00.207 (4.028s)
> Enter [It] should set client_body_buffer_size to 1K - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:57 @ 04/04/23 18:31:00.207
< Exit [It] should set client_body_buffer_size to 1K - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:57 @ 04/04/23 18:31:10.334 (10.127s)
> Enter [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:10.334
< Exit [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:10.562 (228ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:10.562
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:17.468 (6.905s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:31:17.468
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:31:21.488 (4.02s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:31:21.488
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:31:35.745 (14.257s)
> Enter [It] keeps processing new ingresses even if one of the existing ingresses is misconfigured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:505 @ 04/04/23 18:31:35.745
< Exit [It] keeps processing new ingresses even if one of the existing ingresses is misconfigured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:505 @ 04/04/23 18:31:46.949 (11.204s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:46.949
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:47.158 (209ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:47.158
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:55.054 (7.895s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:31:55.054
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:31:59.086 (4.032s)
> Enter [It] should allow origin for cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:110 @ 04/04/23 18:31:59.086
< Exit [It] should allow origin for cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:110 @ 04/04/23 18:32:06.117 (7.031s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:06.117
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:06.335 (217ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:06.335
< Exit [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:13.216 (6.881s)
> Enter [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:43 @ 04/04/23 18:32:13.216
< Exit [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:43 @ 04/04/23 18:32:30.126 (16.91s)
> Enter [It] should return status code 200 when accessing '/' authentication - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:68 @ 04/04/23 18:32:30.126
< Exit [It] should return status code 200 when accessing '/' authentication - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:68 @ 04/04/23 18:32:34.111 (3.985s)
> Enter [AfterEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:34.111
< Exit [AfterEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:34.285 (174ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:34.285
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:42.164 (7.878s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:32:42.164
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:32:46.19 (4.026s)
> Enter [It] should not allow - single origin without port and origin with required port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:405 @ 04/04/23 18:32:46.19
< Exit [It] should not allow - single origin without port and origin with required port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:405 @ 04/04/23 18:32:53.221 (7.031s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:53.221
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:53.428 (207ms)
-
-
- > Enter [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:53.428
< Exit [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:00.295 (6.867s)
> Enter [It] should set gzip_min_length to 100 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:78 @ 04/04/23 18:33:00.295
< Exit [It] should set gzip_min_length to 100 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:78 @ 04/04/23 18:33:17.519 (17.224s)
> Enter [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:17.519
< Exit [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:17.698 (178ms)
-
-
- > Enter [BeforeEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:17.698
< Exit [BeforeEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:24.578 (6.881s)
> Enter [It] should have worker_rlimit_nofile option and be independent on amount of worker processes - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_options.go:38 @ 04/04/23 18:33:24.578
< Exit [It] should have worker_rlimit_nofile option and be independent on amount of worker processes - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_options.go:38 @ 04/04/23 18:33:34.73 (10.152s)
> Enter [AfterEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:34.73
< Exit [AfterEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:34.905 (175ms)
-
-
- > Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:34.906
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:44.808 (9.902s)
> Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:33:44.808
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:33:55.842 (11.034s)
> Enter [It] should set keepalive time to upstream server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:77 @ 04/04/23 18:33:55.842
< Exit [It] should set keepalive time to upstream server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:77 @ 04/04/23 18:34:05.994 (10.152s)
> Enter [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:05.994
< Exit [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:06.258 (264ms)
-
-
-
-
-
- > Enter [BeforeEach] [Shutdown] ingress controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:06.259
< Exit [BeforeEach] [Shutdown] ingress controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:14.168 (7.909s)
> Enter [BeforeEach] [Shutdown] ingress controller - /go/src/k8s.io/ingress-nginx/test/e2e/gracefulshutdown/shutdown.go:35 @ 04/04/23 18:34:14.168
< Exit [BeforeEach] [Shutdown] ingress controller - /go/src/k8s.io/ingress-nginx/test/e2e/gracefulshutdown/shutdown.go:35 @ 04/04/23 18:34:25.207 (11.04s)
> Enter [It] should shutdown in less than 60 secons without pending connections - /go/src/k8s.io/ingress-nginx/test/e2e/gracefulshutdown/shutdown.go:40 @ 04/04/23 18:34:25.207
< Exit [It] should shutdown in less than 60 secons without pending connections - /go/src/k8s.io/ingress-nginx/test/e2e/gracefulshutdown/shutdown.go:40 @ 04/04/23 18:34:36.4 (11.193s)
> Enter [AfterEach] [Shutdown] ingress controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:36.4
< Exit [AfterEach] [Shutdown] ingress controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:36.599 (199ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:36.6
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:44.48 (7.88s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:34:44.48
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:34:48.503 (4.024s)
> Enter [BeforeEach] when external authentication is configured with a custom redirect param - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:651 @ 04/04/23 18:34:48.503
< Exit [BeforeEach] when external authentication is configured with a custom redirect param - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:651 @ 04/04/23 18:35:02.728 (14.224s)
> Enter [It] should return status code 200 when signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:678 @ 04/04/23 18:35:02.728
< Exit [It] should return status code 200 when signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:678 @ 04/04/23 18:35:02.742 (15ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:02.742
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:02.951 (209ms)
-
-
- > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:02.951
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:09.829 (6.877s)
> Enter [It] should sync ingress on external name service addition/deletion - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:311 @ 04/04/23 18:35:09.829
< Exit [It] should sync ingress on external name service addition/deletion - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:311 @ 04/04/23 18:35:30.35 (20.521s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:30.35
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:30.552 (202ms)
-
-
- > Enter [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:30.552
< Exit [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:37.481 (6.929s)
> Enter [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:39 @ 04/04/23 18:35:37.481
< Exit [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:39 @ 04/04/23 18:35:48.587 (11.106s)
> Enter [It] should pass unknown traffic to default backend and handle known traffic - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:79 @ 04/04/23 18:35:48.587
< Exit [It] should pass unknown traffic to default backend and handle known traffic - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:79 @ 04/04/23 18:36:17.402 (28.814s)
> Enter [AfterEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:17.402
< Exit [AfterEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:17.602 (201ms)
-
-
- > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:17.603
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:24.47 (6.867s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:36:24.47
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:36:35.523 (11.052s)
> Enter [It] should enable the log-format-escape-json - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:47 @ 04/04/23 18:36:35.523
< Exit [It] should enable the log-format-escape-json - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:47 @ 04/04/23 18:36:45.69 (10.167s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:45.69
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:45.908 (218ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:45.908
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:52.807 (6.899s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:36:52.807
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:36:56.83 (4.024s)
> Enter [It] should 302 redirect to error page instead of 400 when auth-tls-error-page is set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:114 @ 04/04/23 18:36:56.83
< Exit [It] should 302 redirect to error page instead of 400 when auth-tls-error-page is set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:114 @ 04/04/23 18:37:10.803 (13.972s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:10.803
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:10.971 (169ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:10.972
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:17.855 (6.884s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:37:17.855
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:37:21.879 (4.023s)
> Enter [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:383 @ 04/04/23 18:37:21.879
< Exit [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:383 @ 04/04/23 18:37:43.087 (21.209s)
> Enter [It] user does not retain cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:422 @ 04/04/23 18:37:43.087
< Exit [It] user does not retain cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:422 @ 04/04/23 18:37:43.095 (8ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:43.095
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:43.321 (225ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:43.321
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:50.242 (6.92s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:37:50.242
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:37:58.297 (8.055s)
> Enter [It] should not use canary as a catch-all server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:863 @ 04/04/23 18:37:58.297
< Exit [It] should not use canary as a catch-all server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:863 @ 04/04/23 18:38:15.503 (17.206s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:15.503
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:15.723 (220ms)
-
-
- > Enter [BeforeEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:15.724
< Exit [BeforeEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:22.643 (6.92s)
> Enter [It] should return 404 sending requests when only a default backend is running - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:33 @ 04/04/23 18:38:22.643
STEP: basic HTTP GET request without host to path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:27.644
STEP: basic HTTP GET request without host to path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:27.657
STEP: basic HTTPS GET request without host to path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:27.667
STEP: basic HTTPS GET request without host to path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:27.695
STEP: basic HTTP POST request without host to path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:27.708
STEP: basic HTTP POST request without host to path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:27.712
STEP: basic HTTPS POST request without host to path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:28.052
STEP: basic HTTPS POST request without host to path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:28.468
STEP: basic HTTP GET request to host foo.bar.com and path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:28.852
STEP: basic HTTP GET request to host foo.bar.com and path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:29.25
STEP: basic HTTPS GET request to host foo.bar.com and path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:29.647
STEP: basic HTTPS GET request to host foo.bar.com and path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:30.07
STEP: basic HTTP POST request to host foo.bar.com and path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:30.469
STEP: basic HTTP POST request to host foo.bar.com and path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:30.847
STEP: basic HTTPS POST request to host foo.bar.com and path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:31.252
STEP: basic HTTPS POST request to host foo.bar.com and path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:31.65
< Exit [It] should return 404 sending requests when only a default backend is running - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:33 @ 04/04/23 18:38:32.067 (9.424s)
> Enter [AfterEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:32.067
< Exit [AfterEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:32.276 (208ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:32.276
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:40.184 (7.908s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:38:40.184
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:38:48.25 (8.066s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:38:48.25
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 04/04/23 18:38:48.25
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 04/04/23 18:38:58.421
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 04/04/23 18:39:08.584
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:39:18.813 (30.563s)
> Enter [It] should return status code 200 when request whitelisted (via no-auth-locations) service and 401 when request protected service - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:102 @ 04/04/23 18:39:18.813
STEP: Adding a no-auth-locations for /bar to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:104 @ 04/04/23 18:39:18.813
STEP: Sending a request to protected service /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:111 @ 04/04/23 18:39:29.026
STEP: Sending a request to whitelisted service /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:118 @ 04/04/23 18:39:29.042
< Exit [It] should return status code 200 when request whitelisted (via no-auth-locations) service and 401 when request protected service - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:102 @ 04/04/23 18:39:29.049 (10.236s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:29.049
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:29.257 (208ms)
-
-
- > Enter [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:29.257
< Exit [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:37.143 (7.885s)
> Enter [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:32 @ 04/04/23 18:39:37.143
< Exit [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:32 @ 04/04/23 18:39:39.168 (2.025s)
> Enter [It] should return status code 200 for hosts defined in two ingresses, different path with one alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:87 @ 04/04/23 18:39:39.168
< Exit [It] should return status code 200 for hosts defined in two ingresses, different path with one alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:87 @ 04/04/23 18:39:56.292 (17.124s)
> Enter [AfterEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:56.292
< Exit [AfterEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:56.478 (186ms)
-
-
- > Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:56.478
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:03.36 (6.881s)
> Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:40:03.36
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:40:14.407 (11.047s)
> Enter [It] should set keepalive_timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:40 @ 04/04/23 18:40:14.407
< Exit [It] should set keepalive_timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:40 @ 04/04/23 18:40:24.598 (10.191s)
> Enter [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:24.598
< Exit [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:24.819 (221ms)
-
-
- > Enter [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:24.819
< Exit [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:39.201 (14.382s)
> Enter [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:38 @ 04/04/23 18:40:39.201
< Exit [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:38 @ 04/04/23 18:40:46.467 (7.266s)
> Enter [It] should set X-Forwarded-Port headers accordingly when listening on a non-default HTTP port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:48 @ 04/04/23 18:40:46.467
< Exit [It] should set X-Forwarded-Port headers accordingly when listening on a non-default HTTP port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:48 @ 04/04/23 18:40:56.662 (10.195s)
> Enter [AfterEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:56.662
< Exit [AfterEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:56.852 (191ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:19.258
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:27.76 (8.502s)
> Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:04:27.76
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:04:39.782 (12.022s)
> Enter [It] should set backend protocol to grpc:// and use grpc_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:64 @ 04/04/23 18:04:39.782
< Exit [It] should set backend protocol to grpc:// and use grpc_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:64 @ 04/04/23 18:04:49.993 (10.211s)
> Enter [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:04:49.993
< Exit [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:04:50.223 (229ms)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:50.223
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:58.145 (7.922s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:04:58.145
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:05:02.17 (4.025s)
> Enter [It] should enable modsecurity without using 'modsecurity on;' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:110 @ 04/04/23 18:05:02.17
< Exit [It] should enable modsecurity without using 'modsecurity on;' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:110 @ 04/04/23 18:05:19.394 (17.225s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:19.394
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:19.624 (230ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:19.625
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:26.544 (6.92s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:05:26.544
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:05:30.589 (4.045s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:05:30.589
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:05:58.841 (28.251s)
> Enter [It] should create additional upstream block when auth-keepalive is set with HTTP/1.x - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:623 @ 04/04/23 18:05:58.841
< Exit [It] should create additional upstream block when auth-keepalive is set with HTTP/1.x - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:623 @ 04/04/23 18:06:22.065 (23.224s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:22.065
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:22.266 (201ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:22.267
< Exit [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:29.196 (6.929s)
> Enter [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:33 @ 04/04/23 18:06:29.196
< Exit [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:33 @ 04/04/23 18:06:40.24 (11.044s)
> Enter [It] should block User-Agents defined in the ConfigMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:55 @ 04/04/23 18:06:40.24
< Exit [It] should block User-Agents defined in the ConfigMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:55 @ 04/04/23 18:06:50.425 (10.185s)
> Enter [AfterEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:50.425
< Exit [AfterEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:50.601 (177ms)
-
-
- > Enter [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:50.602
< Exit [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:57.545 (6.943s)
> Enter [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:31 @ 04/04/23 18:06:57.545
< Exit [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:31 @ 04/04/23 18:07:01.588 (4.043s)
> Enter [It] should set the X-Forwarded-Prefix to the annotation value - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:35 @ 04/04/23 18:07:01.588
< Exit [It] should set the X-Forwarded-Prefix to the annotation value - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:35 @ 04/04/23 18:07:11.685 (10.097s)
> Enter [AfterEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:11.685
< Exit [AfterEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:11.883 (198ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:11.883
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:18.774 (6.89s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:07:18.774
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:07:22.815 (4.041s)
> Enter [It] should allow correct origins - missing subdomain + origin with wildcard origin and correct origin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:535 @ 04/04/23 18:07:22.815
< Exit [It] should allow correct origins - missing subdomain + origin with wildcard origin and correct origin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:535 @ 04/04/23 18:07:29.864 (7.049s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:29.864
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:30.072 (208ms)
-
-
- > Enter [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:30.072
< Exit [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:48.992 (2m18.92s)
> Enter [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:32 @ 04/04/23 18:09:48.992
< Exit [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:32 @ 04/04/23 18:09:53.047 (4.055s)
> Enter [It] should set mirror-target to http://localhost/mirror - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:36 @ 04/04/23 18:09:53.047
< Exit [It] should set mirror-target to http://localhost/mirror - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:36 @ 04/04/23 18:10:03.229 (10.182s)
> Enter [AfterEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:03.229
< Exit [AfterEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:03.446 (217ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:03.446
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:10.362 (6.916s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:10:10.362
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:10:14.4 (4.038s)
> Enter [It] should return status code 200 when no authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:46 @ 04/04/23 18:10:14.4
< Exit [It] should return status code 200 when no authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:46 @ 04/04/23 18:10:24.616 (10.216s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:24.616
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:24.82 (204ms)
-
-
- > Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:24.821
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:31.7 (6.879s)
> Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 04/04/23 18:10:31.7
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 04/04/23 18:10:42.759 (11.059s)
> Enter [It] should respect port passed by the PROXY Protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:46 @ 04/04/23 18:10:42.759
< Exit [It] should respect port passed by the PROXY Protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:46 @ 04/04/23 18:12:14.993 (1m32.235s)
> Enter [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:14.993
< Exit [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:15.384 (390ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:15.384
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:22.265 (6.881s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:12:22.265
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:12:24.285 (2.02s)
> Enter [It] should return status code 503 when authentication is configured with an invalid secret - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:65 @ 04/04/23 18:12:24.285
< Exit [It] should return status code 503 when authentication is configured with an invalid secret - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:65 @ 04/04/23 18:12:34.441 (10.156s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:34.441
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:34.624 (183ms)
-
-
- > Enter [BeforeEach] [Setting] Add no tls redirect locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:34.624
< Exit [BeforeEach] [Setting] Add no tls redirect locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:41.556 (6.931s)
> Enter [It] Check no tls redirect locations config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_tls_redirect_locations.go:31 @ 04/04/23 18:12:41.556
< Exit [It] Check no tls redirect locations config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_tls_redirect_locations.go:31 @ 04/04/23 18:13:01.842 (20.286s)
> Enter [AfterEach] [Setting] Add no tls redirect locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:01.842
< Exit [AfterEach] [Setting] Add no tls redirect locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:02.025 (183ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:02.025
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:09.923 (7.898s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:13:09.923
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:13:13.962 (4.038s)
> Enter [It] should not allow - single origin with port and origin without port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:386 @ 04/04/23 18:13:13.962
< Exit [It] should not allow - single origin with port and origin without port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:386 @ 04/04/23 18:13:20.977 (7.016s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:20.977
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:21.159 (181ms)
-
-
- > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:21.159
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:29.044 (7.885s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:13:29.044
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:13:40.088 (11.044s)
> Enter [It] should disable the log-format-escape-json - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:55 @ 04/04/23 18:13:40.088
< Exit [It] should disable the log-format-escape-json - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:55 @ 04/04/23 18:13:50.23 (10.141s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:50.23
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:50.426 (197ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:50.427
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:57.36 (6.933s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:13:57.36
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:14:01.385 (4.026s)
> Enter [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 04/04/23 18:14:01.385
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 04/04/23 18:14:06.428
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 04/04/23 18:14:16.618
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 04/04/23 18:14:26.768
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 04/04/23 18:14:36.897
< Exit [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 04/04/23 18:14:52.087 (50.702s)
> Enter [It] should deny login for different servers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:820 @ 04/04/23 18:14:52.087
STEP: logging into server thisHost /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:821 @ 04/04/23 18:14:52.087
STEP: receiving an internal server error without cache on thisHost location /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:833 @ 04/04/23 18:14:59.113
< Exit [It] should deny login for different servers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:820 @ 04/04/23 18:15:59.128 (1m7.041s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:59.128
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:59.362 (234ms)
-
-
- > Enter [BeforeEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:59.363
< Exit [BeforeEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:06.334 (6.971s)
> Enter [It] should set ingress details variables for ingresses with host without IngressRuleValue, only Backend - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/without_host.go:55 @ 04/04/23 18:16:06.334
< Exit [It] should set ingress details variables for ingresses with host without IngressRuleValue, only Backend - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/without_host.go:55 @ 04/04/23 18:16:20.803 (14.469s)
> Enter [AfterEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:20.803
< Exit [AfterEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:21.76 (957ms)
-
-
- > Enter [BeforeEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:21.77
< Exit [BeforeEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:31.035 (9.266s)
> Enter [It] should respond with a standard redirect code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:33 @ 04/04/23 18:16:31.035
STEP: setting permanent-redirect annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:34 @ 04/04/23 18:16:31.036
STEP: sending request to redirected URL path - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:52 @ 04/04/23 18:16:41.175
< Exit [It] should respond with a standard redirect code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:33 @ 04/04/23 18:16:41.182 (10.147s)
> Enter [AfterEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:41.182
< Exit [AfterEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:41.409 (227ms)
-
-
- > Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:41.409
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:57.856 (2m16.447s)
> Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 04/04/23 18:18:57.856
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 04/04/23 18:19:09.919 (12.063s)
> Enter [It] should allow Ingress with rules - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:123 @ 04/04/23 18:19:09.919
< Exit [It] should allow Ingress with rules - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:123 @ 04/04/23 18:19:20.272 (10.353s)
> Enter [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:20.272
< Exit [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:20.675 (403ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:20.677
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:28.892 (8.215s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:19:28.892
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:19:32.924 (4.032s)
> Enter [It] should return 200 using auth-tls-match-cn where atleast one of the regex options matches CN from client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:324 @ 04/04/23 18:19:32.924
< Exit [It] should return 200 using auth-tls-match-cn where atleast one of the regex options matches CN from client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:324 @ 04/04/23 18:19:43.863 (10.939s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:43.863
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:44.064 (200ms)
-
-
- > Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:44.064
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:53.434 (9.37s)
> Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 04/04/23 18:19:53.434
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 04/04/23 18:19:55.451 (2.017s)
> Enter [It] should exists opentelemetry directive when is enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:60 @ 04/04/23 18:19:55.451
< Exit [It] should exists opentelemetry directive when is enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:60 @ 04/04/23 18:20:12.863 (17.412s)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:12.863
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:13.699 (836ms)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 04/04/23 18:20:13.699
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 04/04/23 18:20:13.699 (0s)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:13.7
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:22.723 (9.023s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:20:22.723
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:20:26.762 (4.038s)
> Enter [It] should not set invalid proxy timeouts - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:136 @ 04/04/23 18:20:26.762
< Exit [It] should not set invalid proxy timeouts - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:136 @ 04/04/23 18:20:36.907 (10.146s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:36.907
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:37.137 (230ms)
-
-
- > Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:37.137
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:45.044 (7.907s)
> Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 04/04/23 18:20:45.044
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 04/04/23 18:20:49.07 (4.026s)
> Enter [It] should not exists opentelemetry directive - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:47 @ 04/04/23 18:20:49.07
< Exit [It] should not exists opentelemetry directive - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:47 @ 04/04/23 18:21:06.287 (17.217s)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:06.287
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:06.513 (226ms)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 04/04/23 18:21:06.513
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 04/04/23 18:21:06.513 (0s)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:06.513
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:13.397 (6.884s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:21:13.397
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:21:15.42 (2.023s)
> Enter [It] should return status code 401 and cors headers when authentication and cors is configured but Authorization header is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:144 @ 04/04/23 18:21:15.42
< Exit [It] should return status code 401 and cors headers when authentication and cors is configured but Authorization header is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:144 @ 04/04/23 18:21:26.454 (11.034s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:26.454
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:26.651 (198ms)
-
-
- > Enter [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:26.652
< Exit [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:33.515 (6.863s)
> Enter [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:80 @ 04/04/23 18:21:33.515
< Exit [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:80 @ 04/04/23 18:21:43.707 (10.192s)
> Enter [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:43.707
< Exit [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:43.924 (216ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:43.924
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:50.816 (6.892s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:21:50.816
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:21:54.851 (4.035s)
> Enter [It] should allow - single origin for multiple cors values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:169 @ 04/04/23 18:21:54.851
< Exit [It] should allow - single origin for multiple cors values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:169 @ 04/04/23 18:22:01.873 (7.022s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:01.873
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:02.061 (188ms)
-
-
- > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:02.061
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:09.943 (7.882s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:22:09.943
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:22:20.994 (11.051s)
> Enter [It] log-format-escape-json enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:82 @ 04/04/23 18:22:20.994
< Exit [It] log-format-escape-json enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:82 @ 04/04/23 18:22:34.191 (13.197s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:34.191
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:34.407 (216ms)
-
-
- > Enter [BeforeEach] [Ingress] [PathType] mix Exact and Prefix paths - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:34.407
< Exit [BeforeEach] [Ingress] [PathType] mix Exact and Prefix paths - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:41.334 (6.927s)
> Enter [BeforeEach] [Ingress] [PathType] mix Exact and Prefix paths - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:33 @ 04/04/23 18:22:41.334
< Exit [BeforeEach] [Ingress] [PathType] mix Exact and Prefix paths - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:33 @ 04/04/23 18:22:45.355 (4.021s)
> Enter [It] should choose the correct location - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:39 @ 04/04/23 18:22:45.355
STEP: Checking exact request to / - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:63 @ 04/04/23 18:23:02.535
STEP: Checking prefix request to /bar - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:76 @ 04/04/23 18:23:02.543
STEP: Checking exact request to /foo - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:109 @ 04/04/23 18:23:19.72
STEP: Checking prefix request to /foo/bar - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:122 @ 04/04/23 18:23:19.723
STEP: Checking prefix request to /foobar - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:134 @ 04/04/23 18:23:19.724
< Exit [It] should choose the correct location - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:39 @ 04/04/23 18:23:19.726 (34.371s)
> Enter [AfterEach] [Ingress] [PathType] mix Exact and Prefix paths - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:19.726
< Exit [AfterEach] [Ingress] [PathType] mix Exact and Prefix paths - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:19.917 (190ms)
-
-
- > Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:19.917
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:27.858 (7.94s)
> Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:23:27.858
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:23:31.884 (4.027s)
> Enter [It] should set client_body_buffer_size to 1m - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:101 @ 04/04/23 18:23:31.884
< Exit [It] should set client_body_buffer_size to 1m - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:101 @ 04/04/23 18:23:42.035 (10.15s)
> Enter [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:42.035
< Exit [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:42.253 (218ms)
-
-
- > Enter [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:42.254
< Exit [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:50.152 (7.898s)
> Enter [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:35 @ 04/04/23 18:23:50.152
< Exit [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:35 @ 04/04/23 18:23:59.193 (9.041s)
> Enter [It] should not trust X-Forwarded headers when setting is false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:92 @ 04/04/23 18:23:59.193
< Exit [It] should not trust X-Forwarded headers when setting is false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:92 @ 04/04/23 18:24:16.594 (17.4s)
> Enter [AfterEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:16.594
< Exit [AfterEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:16.994 (401ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:16.995
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:25.428 (8.433s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:24:25.428
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:24:33.475 (8.047s)
> Enter [It] should route requests split between mainline and canary if canary weight is 100 and weight total is 200 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:834 @ 04/04/23 18:24:33.475
< Exit [It] should route requests split between mainline and canary if canary weight is 100 and weight total is 200 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:834 @ 04/04/23 18:25:28.827 (55.352s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:28.827
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:29.073 (245ms)
-
-
- > Enter [BeforeEach] [Annotations] http2-push-preload - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:29.073
< Exit [BeforeEach] [Annotations] http2-push-preload - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:35.955 (6.882s)
> Enter [BeforeEach] [Annotations] http2-push-preload - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/http2pushpreload.go:30 @ 04/04/23 18:25:35.955
< Exit [BeforeEach] [Annotations] http2-push-preload - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/http2pushpreload.go:30 @ 04/04/23 18:25:39.976 (4.021s)
> Enter [It] enable the http2-push-preload directive - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/http2pushpreload.go:34 @ 04/04/23 18:25:39.976
< Exit [It] enable the http2-push-preload directive - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/http2pushpreload.go:34 @ 04/04/23 18:25:50.116 (10.14s)
> Enter [AfterEach] [Annotations] http2-push-preload - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:50.116
< Exit [AfterEach] [Annotations] http2-push-preload - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:50.35 (233ms)
-
-
- > Enter [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:50.35
< Exit [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:57.262 (6.911s)
> Enter [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:35 @ 04/04/23 18:25:57.262
< Exit [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:35 @ 04/04/23 18:26:08.325 (11.063s)
> Enter [It] trusts X-Forwarded-For header only when setting is true - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:40 @ 04/04/23 18:26:08.325
STEP: ensuring single values are parsed correctly - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:54 @ 04/04/23 18:26:25.541
< Exit [It] trusts X-Forwarded-For header only when setting is true - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:40 @ 04/04/23 18:26:25.551 (17.226s)
> Enter [AfterEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:25.551
< Exit [AfterEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:25.758 (207ms)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:25.758
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:32.641 (6.883s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:26:32.641
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:26:36.668 (4.026s)
> Enter [It] should disable modsecurity - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:74 @ 04/04/23 18:26:36.668
< Exit [It] should disable modsecurity - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:74 @ 04/04/23 18:26:46.879 (10.212s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:46.879
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:47.059 (180ms)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:47.06
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:53.958 (6.898s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:26:53.958
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:26:57.986 (4.028s)
> Enter [It] should enable modsecurity through the config map but ignore snippet as disabled by admin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:305 @ 04/04/23 18:26:57.986
< Exit [It] should enable modsecurity through the config map but ignore snippet as disabled by admin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:305 @ 04/04/23 18:27:27.257 (29.271s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:27.257
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:27.443 (186ms)
-
-
- > Enter [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:27.443
< Exit [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:34.37 (6.927s)
> Enter [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:31 @ 04/04/23 18:27:34.37
< Exit [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:31 @ 04/04/23 18:27:38.399 (4.029s)
> Enter [It] only allow explicitly allowed IPs, deny all others - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:86 @ 04/04/23 18:27:38.399
STEP: sending request from an explicitly denied IP range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:115 @ 04/04/23 18:27:55.604
STEP: sending request from an implicitly denied IP - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:123 @ 04/04/23 18:27:55.61
STEP: sending request from an explicitly allowed IP range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:131 @ 04/04/23 18:27:55.616
STEP: sending request from an explicitly allowed IP range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:139 @ 04/04/23 18:27:55.623
< Exit [It] only allow explicitly allowed IPs, deny all others - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:86 @ 04/04/23 18:28:02.653 (24.254s)
> Enter [AfterEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:02.653
< Exit [AfterEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:02.902 (249ms)
-
-
- > Enter [BeforeEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:02.903
< Exit [BeforeEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:09.803 (6.9s)
> Enter [It] should be disabled when set to false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/multi_accept.go:49 @ 04/04/23 18:28:09.803
< Exit [It] should be disabled when set to false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/multi_accept.go:49 @ 04/04/23 18:28:20.04 (10.238s)
> Enter [AfterEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:20.041
< Exit [AfterEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:20.276 (236ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:20.277
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:28.169 (7.892s)
> Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:28:28.169
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:28:30.185 (2.016s)
> Enter [It] should set backend protocol to grpcs:// and use grpc_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:79 @ 04/04/23 18:28:30.185
< Exit [It] should set backend protocol to grpcs:// and use grpc_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:79 @ 04/04/23 18:28:40.334 (10.15s)
> Enter [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:40.334
< Exit [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:40.52 (185ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:40.52
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:47.397 (6.877s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:28:47.397
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:28:51.425 (4.028s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:28:51.425
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:29:05.527 (14.103s)
> Enter [It] should redirect to signin url when not signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:494 @ 04/04/23 18:29:05.527
< Exit [It] should redirect to signin url when not signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:494 @ 04/04/23 18:29:05.539 (12ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:05.539
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:05.766 (227ms)
-
-
- > Enter [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:05.767
< Exit [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:12.664 (6.897s)
> Enter [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:32 @ 04/04/23 18:29:12.664
< Exit [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:32 @ 04/04/23 18:29:16.693 (4.029s)
> Enter [It] should set valid proxy timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:36 @ 04/04/23 18:29:16.693
< Exit [It] should set valid proxy timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:36 @ 04/04/23 18:29:33.899 (17.207s)
> Enter [AfterEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:33.899
< Exit [AfterEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:34.123 (224ms)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:34.124
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:42.012 (7.888s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:29:42.012
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:29:46.039 (4.027s)
> Enter [It] should enable modsecurity with transaction ID and OWASP rules - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:53 @ 04/04/23 18:29:46.039
< Exit [It] should enable modsecurity with transaction ID and OWASP rules - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:53 @ 04/04/23 18:29:56.186 (10.147s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:56.186
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:56.375 (189ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:56.375
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:03.267 (6.892s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:30:03.267
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:30:07.298 (4.031s)
> Enter [It] should change the default proxy HTTP version - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:233 @ 04/04/23 18:30:07.298
< Exit [It] should change the default proxy HTTP version - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:233 @ 04/04/23 18:30:17.47 (10.172s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:17.47
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:17.686 (215ms)
-
-
- > Enter [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:17.686
< Exit [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:35.008 (2m17.322s)
> Enter [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:36 @ 04/04/23 18:32:35.008
< Exit [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:36 @ 04/04/23 18:32:39.033 (4.025s)
> Enter [It] should return the fake SSL certificate if the secret is invalid - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:82 @ 04/04/23 18:32:39.033
< Exit [It] should return the fake SSL certificate if the secret is invalid - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:82 @ 04/04/23 18:32:52.207 (13.174s)
> Enter [AfterEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:52.207
< Exit [AfterEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:52.41 (203ms)
-
-
- > Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:52.41
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:59.312 (6.902s)
> Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:32:59.312
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:33:03.343 (4.031s)
> Enter [It] should set client_body_buffer_size to 1000 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:35 @ 04/04/23 18:33:03.343
< Exit [It] should set client_body_buffer_size to 1000 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:35 @ 04/04/23 18:33:13.571 (10.227s)
> Enter [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:13.571
< Exit [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:13.79 (220ms)
-
-
- > Enter [BeforeEach] [Setting] OCSP - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:13.791
< Exit [BeforeEach] [Setting] OCSP - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:20.666 (6.876s)
> Enter [BeforeEach] [Setting] OCSP - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:45 @ 04/04/23 18:33:20.666
< Exit [BeforeEach] [Setting] OCSP - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:45 @ 04/04/23 18:33:24.686 (4.02s)
> Enter [It] should enable OCSP and contain stapling information in the connection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:49 @ 04/04/23 18:33:24.686
STEP: running cfssl gencert -initca ca_csr.json | cfssljson -bare ca - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:216 @ 04/04/23 18:33:31.697
STEP: running cfssl gencert -ca ca.pem -ca-key ca-key.pem -config=cfssl_config.json -profile=intermediate intermediate_ca_csr.json | cfssljson -bare intermediate_ca - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:216 @ 04/04/23 18:33:32.042
STEP: running cfssl gencert -ca intermediate_ca.pem -ca-key intermediate_ca-key.pem -config=cfssl_config.json -profile=ocsp ocsp_csr.json | cfssljson -bare ocsp - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:216 @ 04/04/23 18:33:32.211
STEP: running cfssl serve -db-config=db-config.json -ca-key=intermediate_ca-key.pem -ca=intermediate_ca.pem -config=cfssl_config.json -responder=ocsp.pem -responder-key=ocsp-key.pem - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:228 @ 04/04/23 18:33:32.385
STEP: running cfssl gencert -remote=localhost -profile=server leaf_csr.json | cfssljson -bare leaf - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:238 @ 04/04/23 18:33:37.385
STEP: running cfssl ocsprefresh -ca intermediate_ca.pem -responder=ocsp.pem -responder-key=ocsp-key.pem -db-config=db-config.json - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:252 @ 04/04/23 18:33:37.548
< Exit [It] should enable OCSP and contain stapling information in the connection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:49 @ 04/04/23 18:34:06.016 (41.33s)
> Enter [AfterEach] [Setting] OCSP - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:06.016
< Exit [AfterEach] [Setting] OCSP - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:06.329 (312ms)
-
-
- > Enter [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:06.329
< Exit [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:13.238 (6.909s)
> Enter [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:38 @ 04/04/23 18:34:13.238
< Exit [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:38 @ 04/04/23 18:34:17.265 (4.027s)
> Enter [It] should allow multiple auth with satisfy any - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:84 @ 04/04/23 18:34:17.265
< Exit [It] should allow multiple auth with satisfy any - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:84 @ 04/04/23 18:34:33.244 (15.979s)
> Enter [AfterEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:33.244
< Exit [AfterEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:33.413 (169ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:33.413
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:40.3 (6.887s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:34:40.3
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:34:44.318 (4.018s)
> Enter [It] should not set snippet "proxy_set_header My-Custom-Header 42;" when external auth is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:284 @ 04/04/23 18:34:44.318
< Exit [It] should not set snippet "proxy_set_header My-Custom-Header 42;" when external auth is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:284 @ 04/04/23 18:34:54.489 (10.171s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:54.489
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:54.674 (185ms)
-
-
- > Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:54.674
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:01.542 (6.868s)
> Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 04/04/23 18:35:01.542
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 04/04/23 18:35:15.829 (14.287s)
> Enter [It] handles endpoints only changes consistently (down scaling of replicas vs. empty service) - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:125 @ 04/04/23 18:35:15.829
< Exit [It] handles endpoints only changes consistently (down scaling of replicas vs. empty service) - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:125 @ 04/04/23 18:35:42.1 (26.271s)
> Enter [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:42.1
< Exit [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:42.298 (198ms)
-
-
- > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:42.298
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:50.176 (7.878s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:35:50.176
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:35:54.197 (4.021s)
> Enter [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 04/04/23 18:35:54.197
Apr 4 18:36:03.338: INFO: Unexpected TLS error: tls: failed to verify certificate: x509: certificate is valid for ingress.local, not settings-tls
< Exit [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 04/04/23 18:36:05.327 (11.13s)
> Enter [It] setting preload parameter - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:146 @ 04/04/23 18:36:05.327
< Exit [It] setting preload parameter - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:146 @ 04/04/23 18:36:15.512 (10.185s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:15.512
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:15.744 (233ms)
-
-
- > Enter [BeforeEach] [Endpointslices] long service name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:15.745
< Exit [BeforeEach] [Endpointslices] long service name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:23.617 (7.872s)
> Enter [BeforeEach] [Endpointslices] long service name - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/longname.go:34 @ 04/04/23 18:36:23.617
< Exit [BeforeEach] [Endpointslices] long service name - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/longname.go:34 @ 04/04/23 18:36:27.64 (4.023s)
> Enter [It] should return 200 when service name has max allowed number of characters 63 - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/longname.go:38 @ 04/04/23 18:36:27.64
STEP: checking if the service is reached - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/longname.go:48 @ 04/04/23 18:36:37.807
< Exit [It] should return 200 when service name has max allowed number of characters 63 - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/longname.go:38 @ 04/04/23 18:36:37.815 (10.175s)
> Enter [AfterEach] [Endpointslices] long service name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:37.815
< Exit [AfterEach] [Endpointslices] long service name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:38.05 (235ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:38.05
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:45.936 (7.886s)
> Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 04/04/23 18:36:45.936
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 04/04/23 18:36:47.961 (2.026s)
> Enter [It] should add fastcgi_index in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:54 @ 04/04/23 18:36:47.961
< Exit [It] should add fastcgi_index in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:54 @ 04/04/23 18:36:58.079 (10.118s)
> Enter [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:58.079
< Exit [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:58.306 (226ms)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:58.306
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:16.416 (2m18.11s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:39:16.416
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:39:20.463 (4.047s)
> Enter [It] should enable modsecurity globally and with modsecurity-snippet block requests - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:189 @ 04/04/23 18:39:20.463
< Exit [It] should enable modsecurity globally and with modsecurity-snippet block requests - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:189 @ 04/04/23 18:39:49.668 (29.205s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:49.668
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:49.888 (220ms)
-
-
- > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:49.888
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:57.8 (7.912s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:39:57.8
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:40:01.823 (4.023s)
> Enter [It] should not use ports during the HTTP to HTTPS redirection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:187 @ 04/04/23 18:40:01.823
Apr 4 18:40:10.971: INFO: Unexpected TLS error: tls: failed to verify certificate: x509: certificate is valid for ingress.local, not settings-tls
< Exit [It] should not use ports during the HTTP to HTTPS redirection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:187 @ 04/04/23 18:40:12.979 (11.155s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:12.979
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:13.188 (209ms)
-
-
- > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:13.188
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:21.087 (7.899s)
> Enter [It] should return 200 for service type=ExternalName with a port defined - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:129 @ 04/04/23 18:40:21.087
< Exit [It] should return 200 for service type=ExternalName with a port defined - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:129 @ 04/04/23 18:40:31.585 (10.498s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:31.585
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:31.773 (188ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:31.773
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:38.672 (6.898s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:40:38.672
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:40:42.706 (4.034s)
> Enter [BeforeEach] when external authentication is configured with a custom redirect param - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:651 @ 04/04/23 18:40:42.706
< Exit [BeforeEach] when external authentication is configured with a custom redirect param - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:651 @ 04/04/23 18:40:56.901 (14.195s)
> Enter [It] should redirect to signin url when not signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:687 @ 04/04/23 18:40:56.901
< Exit [It] should redirect to signin url when not signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:687 @ 04/04/23 18:40:56.912 (10ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:56.912
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:57.097 (186ms)
-
-
- I0404 18:04:54.427675 25 request.go:690] Waited for 1.19834838s due to client-side throttling, not priority and fairness, request: GET:https://10.96.0.1:443/api/v1/namespaces/e2e-tests-limit-connections-1680631459257336272-jn44f/services/nginx-ingress-controller
- > Enter [BeforeEach] [Annotations] Annotation - limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:19.256
< Exit [BeforeEach] [Annotations] Annotation - limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:26.817 (7.56s)
> Enter [BeforeEach] [Annotations] Annotation - limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitconnections.go:34 @ 04/04/23 18:04:26.817
< Exit [BeforeEach] [Annotations] Annotation - limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitconnections.go:34 @ 04/04/23 18:04:38.845 (12.028s)
> Enter [It] should limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitconnections.go:38 @ 04/04/23 18:04:38.845
< Exit [It] should limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitconnections.go:38 @ 04/04/23 18:05:03.259 (24.414s)
> Enter [AfterEach] [Annotations] Annotation - limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:03.259
< Exit [AfterEach] [Annotations] Annotation - limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:03.482 (224ms)
-
-
- > Enter [BeforeEach] [Ingress] [PathType] exact - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:03.483
< Exit [BeforeEach] [Ingress] [PathType] exact - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:10.366 (6.883s)
> Enter [BeforeEach] [Ingress] [PathType] exact - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_exact.go:33 @ 04/04/23 18:05:10.366
< Exit [BeforeEach] [Ingress] [PathType] exact - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_exact.go:33 @ 04/04/23 18:05:14.405 (4.039s)
> Enter [It] should choose exact location for /exact - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_exact.go:37 @ 04/04/23 18:05:14.405
< Exit [It] should choose exact location for /exact - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_exact.go:37 @ 04/04/23 18:05:41.807 (27.402s)
> Enter [AfterEach] [Ingress] [PathType] exact - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:41.807
< Exit [AfterEach] [Ingress] [PathType] exact - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:42.078 (271ms)
-
-
- > Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:42.079
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:50.08 (8.002s)
> Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 04/04/23 18:05:50.08
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 04/04/23 18:05:54.108 (4.028s)
> Enter [It] [BAD_ANNOTATIONS] should drop an ingress if there is an invalid character in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:36 @ 04/04/23 18:05:54.108
< Exit [It] [BAD_ANNOTATIONS] should drop an ingress if there is an invalid character in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:36 @ 04/04/23 18:06:21.53 (27.422s)
> Enter [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:21.53
< Exit [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:21.804 (274ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:21.804
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:28.705 (6.901s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:06:28.705
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:06:32.732 (4.027s)
> Enter [It] should not break functionality - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:267 @ 04/04/23 18:06:32.732
< Exit [It] should not break functionality - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:267 @ 04/04/23 18:06:39.756 (7.024s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:39.756
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:39.957 (201ms)
-
-
- > Enter [BeforeEach] [Annotations] app-root - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:39.958
< Exit [BeforeEach] [Annotations] app-root - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:47.864 (7.907s)
> Enter [BeforeEach] [Annotations] app-root - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/approot.go:31 @ 04/04/23 18:06:47.864
< Exit [BeforeEach] [Annotations] app-root - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/approot.go:31 @ 04/04/23 18:06:51.912 (4.047s)
> Enter [It] should redirect to /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/approot.go:35 @ 04/04/23 18:06:51.912
< Exit [It] should redirect to /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/approot.go:35 @ 04/04/23 18:07:02.086 (10.175s)
> Enter [AfterEach] [Annotations] app-root - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:02.086
< Exit [AfterEach] [Annotations] app-root - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:02.297 (211ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:02.297
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:10.188 (7.891s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:07:10.188
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:07:14.226 (4.037s)
> Enter [It] should return 200 using auth-tls-match-cn with matching CN from client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:295 @ 04/04/23 18:07:14.226
< Exit [It] should return 200 using auth-tls-match-cn with matching CN from client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:295 @ 04/04/23 18:07:25.018 (10.792s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:25.018
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:25.219 (201ms)
-
-
- > Enter [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:25.22
< Exit [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:33.104 (7.884s)
> Enter [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:31 @ 04/04/23 18:07:33.104
< Exit [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:31 @ 04/04/23 18:07:35.129 (2.025s)
> Enter [It] only deny explicitly denied IPs, allow all others - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:35 @ 04/04/23 18:07:35.129
STEP: sending request from an explicitly denied IP range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:61 @ 04/04/23 18:07:52.29
STEP: sending request from an explicitly denied IP address - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:69 @ 04/04/23 18:07:52.298
STEP: sending request from an implicitly allowed IP range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:77 @ 04/04/23 18:07:52.304
< Exit [It] only deny explicitly denied IPs, allow all others - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:35 @ 04/04/23 18:07:59.326 (24.197s)
> Enter [AfterEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:59.326
< Exit [AfterEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:59.52 (194ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:59.52
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:06.412 (6.892s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:08:06.412
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:08:14.461 (8.049s)
> Enter [It] should not use canary with domain as a server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:891 @ 04/04/23 18:08:14.461
< Exit [It] should not use canary with domain as a server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:891 @ 04/04/23 18:08:31.701 (17.24s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:31.701
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:31.909 (208ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:31.909
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:39.801 (7.892s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:08:39.801
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:08:43.836 (4.035s)
> Enter [It] should set "proxy_set_header 'My-Custom-Header' '42';" when auth-headers are set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:301 @ 04/04/23 18:08:43.836
< Exit [It] should set "proxy_set_header 'My-Custom-Header' '42';" when auth-headers are set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:301 @ 04/04/23 18:08:54.106 (10.269s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:54.106
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:54.318 (212ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:54.318
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:01.207 (6.889s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:09:01.207
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:09:09.264 (8.058s)
> Enter [It] should routes to mainline upstream when the given Regex causes error - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:566 @ 04/04/23 18:09:09.264
STEP: routing requests to the mainline upstream when the given Regex causes error - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:591 @ 04/04/23 18:09:26.43
< Exit [It] should routes to mainline upstream when the given Regex causes error - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:566 @ 04/04/23 18:09:26.434 (17.169s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:26.434
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:26.658 (224ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:26.658
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:33.593 (6.935s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:09:33.593
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:09:37.637 (4.044s)
> Enter [It] should delete Ingress when class is removed - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:192 @ 04/04/23 18:09:37.637
< Exit [It] should delete Ingress when class is removed - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:192 @ 04/04/23 18:10:02.989 (25.352s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:02.989
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:03.188 (199ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:03.189
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:11.089 (7.901s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:10:11.09
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:10:19.123 (8.033s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:10:19.123
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 04/04/23 18:10:19.123
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 04/04/23 18:10:29.295
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 04/04/23 18:10:39.491
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:10:49.631 (30.509s)
> Enter [It] should proxy_method method when global-auth-method is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:197 @ 04/04/23 18:10:49.631
STEP: Adding a global-auth-method to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:202 @ 04/04/23 18:10:49.631
< Exit [It] should proxy_method method when global-auth-method is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:197 @ 04/04/23 18:10:59.844 (10.213s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:59.844
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:00.053 (208ms)
-
-
- > Enter [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:00.053
< Exit [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:17.888 (2m17.835s)
> Enter [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:32 @ 04/04/23 18:13:17.888
< Exit [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:32 @ 04/04/23 18:13:21.926 (4.038s)
> Enter [It] should not set invalid proxy timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:52 @ 04/04/23 18:13:21.926
< Exit [It] should not set invalid proxy timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:52 @ 04/04/23 18:13:39.103 (17.177s)
> Enter [AfterEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:39.103
< Exit [AfterEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:39.316 (214ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:39.317
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:46.2 (6.883s)
> Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 04/04/23 18:13:46.2
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 04/04/23 18:13:51.228 (5.028s)
> Enter [It] should add fastcgi_param in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:71 @ 04/04/23 18:13:51.228
< Exit [It] should add fastcgi_param in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:71 @ 04/04/23 18:14:01.351 (10.123s)
> Enter [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:01.351
< Exit [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:01.572 (222ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:01.573
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:08.451 (6.878s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:14:08.451
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:14:12.484 (4.033s)
> Enter [It] should enable cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:35 @ 04/04/23 18:14:12.484
< Exit [It] should enable cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:35 @ 04/04/23 18:14:22.62 (10.136s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:22.62
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:22.8 (179ms)
-
-
- > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:22.8
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:29.697 (6.897s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:14:29.697
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:14:33.724 (4.026s)
> Enter [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 04/04/23 18:14:33.724
< Exit [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 04/04/23 18:14:43.071 (9.347s)
> Enter [It] overriding what's set from the upstream - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:166 @ 04/04/23 18:14:43.071
< Exit [It] overriding what's set from the upstream - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:166 @ 04/04/23 18:14:50.277 (7.207s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:50.277
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:50.564 (287ms)
-
-
- > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:50.566
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:57.791 (7.225s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:14:57.791
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:15:01.819 (4.028s)
> Enter [It] picks up the previously missing secret for a given ingress without reloading - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:70 @ 04/04/23 18:15:01.819
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:94 @ 04/04/23 18:15:18.959
STEP: skipping Nginx reload - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:101 @ 04/04/23 18:15:21.991
< Exit [It] picks up the previously missing secret for a given ingress without reloading - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:70 @ 04/04/23 18:15:22.003 (20.184s)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:22.003
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:22.173 (170ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:22.173
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:30.052 (7.879s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:15:30.052
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:15:32.076 (2.024s)
> Enter [It] should disable cors allow credentials - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:94 @ 04/04/23 18:15:32.076
< Exit [It] should disable cors allow credentials - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:94 @ 04/04/23 18:15:42.292 (10.217s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:42.292
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:42.533 (240ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:42.533
< Exit [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:49.463 (6.93s)
> Enter [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:43 @ 04/04/23 18:15:49.463
< Exit [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:43 @ 04/04/23 18:16:08.363 (18.9s)
> Enter [It] should return status code 200 when accessing '/noauth' unauthenticated - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:82 @ 04/04/23 18:16:08.363
< Exit [It] should return status code 200 when accessing '/noauth' unauthenticated - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:82 @ 04/04/23 18:16:11.514 (3.151s)
> Enter [AfterEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:11.514
< Exit [AfterEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:11.73 (216ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:11.73
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:18.612 (6.881s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:16:18.612
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:16:28.726 (10.115s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:16:28.726
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 04/04/23 18:16:28.726
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 04/04/23 18:16:38.887
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 04/04/23 18:16:49.114
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:16:59.322 (30.595s)
> Enter [It] should return status code 401 when request any protected service - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:85 @ 04/04/23 18:16:59.322
STEP: Sending a request to protected service /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:87 @ 04/04/23 18:16:59.322
STEP: Sending a request to protected service /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:94 @ 04/04/23 18:16:59.333
< Exit [It] should return status code 401 when request any protected service - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:85 @ 04/04/23 18:16:59.342 (20ms)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:59.342
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:59.57 (229ms)
-
-
- > Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:59.571
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:06.433 (6.862s)
> Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 04/04/23 18:17:06.433
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 04/04/23 18:17:18.505 (12.072s)
> Enter [It] should ignore catch all Ingress with backend and rules - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:69 @ 04/04/23 18:17:18.505
< Exit [It] should ignore catch all Ingress with backend and rules - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:69 @ 04/04/23 18:17:28.675 (10.171s)
> Enter [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:28.675
< Exit [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:28.85 (174ms)
-
-
- > Enter [BeforeEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:28.85
< Exit [BeforeEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:37.72 (8.87s)
> Enter [It] should have worker_rlimit_nofile option - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_options.go:31 @ 04/04/23 18:17:37.72
< Exit [It] should have worker_rlimit_nofile option - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_options.go:31 @ 04/04/23 18:17:40.919 (3.199s)
> Enter [AfterEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:40.919
< Exit [AfterEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:41.126 (207ms)
-
-
- > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:41.126
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:49.014 (7.887s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:17:49.014
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:17:53.032 (4.018s)
> Enter [It] should not use ports or X-Forwarded-Host during the HTTP to HTTPS redirection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:205 @ 04/04/23 18:17:53.032
Apr 4 18:18:09.269: INFO: Unexpected TLS error: tls: failed to verify certificate: x509: certificate is valid for ingress.local, not settings-tls
< Exit [It] should not use ports or X-Forwarded-Host during the HTTP to HTTPS redirection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:205 @ 04/04/23 18:18:11.272 (18.241s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:11.272
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:11.48 (208ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:11.48
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:18.335 (6.854s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:18:18.335
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:18:22.355 (4.02s)
> Enter [It] should build proxy next upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:194 @ 04/04/23 18:18:22.355
< Exit [It] should build proxy next upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:194 @ 04/04/23 18:18:32.501 (10.146s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:32.501
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:32.736 (236ms)
-
-
- > Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:32.737
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:39.632 (6.895s)
> Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 04/04/23 18:18:39.632
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 04/04/23 18:18:50.669 (11.037s)
> Enter [It] should respect proto passed by the PROXY Protocol server port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:79 @ 04/04/23 18:18:50.669
< Exit [It] should respect proto passed by the PROXY Protocol server port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:79 @ 04/04/23 18:20:22.888 (1m32.219s)
> Enter [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:22.888
< Exit [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:23.276 (388ms)
-
-
- > Enter [BeforeEach] [Annotations] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:23.277
< Exit [BeforeEach] [Annotations] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:31.164 (7.887s)
> Enter [BeforeEach] [Annotations] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/sslciphers.go:31 @ 04/04/23 18:20:31.164
< Exit [BeforeEach] [Annotations] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/sslciphers.go:31 @ 04/04/23 18:20:33.226 (2.062s)
> Enter [It] should change ssl ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/sslciphers.go:35 @ 04/04/23 18:20:33.226
< Exit [It] should change ssl ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/sslciphers.go:35 @ 04/04/23 18:20:43.402 (10.176s)
> Enter [AfterEach] [Annotations] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:43.402
< Exit [AfterEach] [Annotations] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:43.603 (201ms)
-
-
- > Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:43.603
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:50.486 (6.883s)
> Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:20:50.486
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:20:54.514 (4.028s)
> Enter [It] should set client_body_buffer_size to 1k - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:79 @ 04/04/23 18:20:54.514
< Exit [It] should set client_body_buffer_size to 1k - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:79 @ 04/04/23 18:21:04.738 (10.224s)
> Enter [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:04.738
< Exit [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:04.947 (209ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:04.947
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:11.835 (6.888s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:21:11.835
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:21:15.853 (4.017s)
> Enter [It] should turn off proxy-request-buffering - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:179 @ 04/04/23 18:21:15.853
< Exit [It] should turn off proxy-request-buffering - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:179 @ 04/04/23 18:21:26.03 (10.178s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:26.03
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:26.226 (196ms)
-
-
- > Enter [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:26.227
< Exit [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:34.123 (7.896s)
> Enter [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:33 @ 04/04/23 18:21:34.123
< Exit [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:33 @ 04/04/23 18:21:38.158 (4.035s)
> Enter [It] should get information for a specific backend server - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:56 @ 04/04/23 18:21:38.158
< Exit [It] should get information for a specific backend server - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:56 @ 04/04/23 18:21:48.595 (10.437s)
> Enter [AfterEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:48.595
< Exit [AfterEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:48.793 (198ms)
-
-
- > Enter [BeforeEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:98 @ 04/04/23 18:21:48.794
< Exit [BeforeEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:98 @ 04/04/23 18:21:50.797 (2.003s)
> Enter [It] start nginx with default configuration - /go/src/k8s.io/ingress-nginx/test/e2e/nginx/nginx.go:102 @ 04/04/23 18:21:50.797
< Exit [It] start nginx with default configuration - /go/src/k8s.io/ingress-nginx/test/e2e/nginx/nginx.go:102 @ 04/04/23 18:21:59.838 (9.042s)
> Enter [AfterEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:99 @ 04/04/23 18:21:59.839
< Exit [AfterEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:99 @ 04/04/23 18:21:59.841 (3ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:59.842
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:07.232 (7.39s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:22:07.232
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:22:11.252 (4.02s)
> Enter [It] should set cors max-age - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:78 @ 04/04/23 18:22:11.252
< Exit [It] should set cors max-age - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:78 @ 04/04/23 18:22:21.435 (10.182s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:21.435
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:21.724 (289ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:21.725
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:29.212 (7.488s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:22:29.212
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:22:33.245 (4.033s)
> Enter [It] should allow - matching origin+port with wildcard origin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:488 @ 04/04/23 18:22:33.245
< Exit [It] should allow - matching origin+port with wildcard origin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:488 @ 04/04/23 18:22:40.278 (7.032s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:40.278
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:40.502 (224ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:40.502
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:47.367 (6.865s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:22:47.368
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:22:51.389 (4.021s)
> Enter [It] should change cookie name on ingress definition change - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:64 @ 04/04/23 18:22:51.389
< Exit [It] should change cookie name on ingress definition change - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:64 @ 04/04/23 18:23:06.598 (15.209s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:06.598
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:06.803 (205ms)
-
-
- > Enter [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:06.804
< Exit [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:13.683 (6.879s)
> Enter [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:31 @ 04/04/23 18:23:13.683
< Exit [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:31 @ 04/04/23 18:23:17.702 (4.019s)
> Enter [It] should add value of server-snippet setting to all ingress config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:35 @ 04/04/23 18:23:17.702
< Exit [It] should add value of server-snippet setting to all ingress config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:35 @ 04/04/23 18:23:50.157 (32.455s)
> Enter [AfterEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:50.157
< Exit [AfterEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:50.365 (209ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:50.366
< Exit [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:57.248 (6.882s)
> Enter [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:33 @ 04/04/23 18:23:57.248
< Exit [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:33 @ 04/04/23 18:24:06.308 (9.06s)
> Enter [It] should block Referers defined in the ConfigMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:88 @ 04/04/23 18:24:06.308
< Exit [It] should block Referers defined in the ConfigMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:88 @ 04/04/23 18:24:16.602 (10.294s)
> Enter [AfterEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:16.602
< Exit [AfterEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:17.016 (414ms)
-
-
- > Enter [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:17.016
< Exit [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:25.558 (8.541s)
> Enter [It] should set gzip_types to application/javascript - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:89 @ 04/04/23 18:24:25.558
< Exit [It] should set gzip_types to application/javascript - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:89 @ 04/04/23 18:24:42.749 (17.191s)
> Enter [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:42.749
< Exit [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:42.994 (245ms)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:42.994
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:49.859 (6.865s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:24:49.859
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:24:55.885 (6.025s)
> Enter [It] should exists opentracing_operation_name directive when is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:115 @ 04/04/23 18:24:55.885
< Exit [It] should exists opentracing_operation_name directive when is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:115 @ 04/04/23 18:25:13.047 (17.162s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:13.047
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:13.223 (176ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:25:13.223
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:25:13.223 (0s)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:13.223
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:21.122 (7.899s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:25:21.122
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:25:27.151 (6.029s)
> Enter [It] should not allow - single origin for multiple cors values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:196 @ 04/04/23 18:25:27.151
< Exit [It] should not allow - single origin for multiple cors values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:196 @ 04/04/23 18:25:34.17 (7.019s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:34.17
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:34.371 (201ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:34.371
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:41.275 (6.904s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:25:41.275
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:25:49.318 (8.044s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:25:49.318
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 04/04/23 18:25:49.318
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 04/04/23 18:25:59.469
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 04/04/23 18:26:09.647
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:26:19.839 (30.521s)
> Enter [It] should set snippet when global external auth is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:250 @ 04/04/23 18:26:19.839
STEP: Adding a global-auth-snippet to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:254 @ 04/04/23 18:26:19.839
< Exit [It] should set snippet when global external auth is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:250 @ 04/04/23 18:26:29.995 (10.156s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:29.995
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:30.195 (200ms)
-
-
- > Enter [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:30.195
< Exit [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:37.066 (6.871s)
> Enter [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:31 @ 04/04/23 18:26:37.066
< Exit [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:31 @ 04/04/23 18:26:41.082 (4.015s)
> Enter [It] add valid directives to server via server snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:35 @ 04/04/23 18:26:41.082
< Exit [It] add valid directives to server via server snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:35 @ 04/04/23 18:26:51.227 (10.145s)
> Enter [AfterEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:51.227
< Exit [AfterEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:51.453 (226ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:51.453
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:58.324 (6.87s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:26:58.324
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:27:02.348 (4.024s)
> Enter [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 04/04/23 18:27:02.348
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 04/04/23 18:27:07.377
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 04/04/23 18:27:17.563
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 04/04/23 18:27:27.77
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 04/04/23 18:27:37.89
< Exit [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 04/04/23 18:27:53.085 (50.737s)
> Enter [It] should deny login for different location on same server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:792 @ 04/04/23 18:27:53.085
STEP: receiving an internal server error without cache on location /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:811 @ 04/04/23 18:28:00.105
< Exit [It] should deny login for different location on same server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:792 @ 04/04/23 18:29:00.109 (1m7.024s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:00.109
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:00.314 (205ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:00.314
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:08.193 (7.878s)
> Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 04/04/23 18:29:08.193
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 04/04/23 18:29:10.222 (2.029s)
> Enter [It] should return OK for service with backend protocol FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:102 @ 04/04/23 18:29:10.222
< Exit [It] should return OK for service with backend protocol FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:102 @ 04/04/23 18:29:20.442 (10.22s)
> Enter [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:20.442
< Exit [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:20.65 (208ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:20.651
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:27.592 (6.941s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:29:27.592
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:29:35.635 (8.044s)
> Enter [It] should route requests only to canary if canary weight is equal to canary weight total - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:775 @ 04/04/23 18:29:35.635
< Exit [It] should route requests only to canary if canary weight is equal to canary weight total - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:775 @ 04/04/23 18:29:52.866 (17.23s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:52.866
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:53.101 (235ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] modsecurity-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:53.101
< Exit [BeforeEach] [Setting] [Security] modsecurity-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:00.998 (7.896s)
> Enter [It] should add value of modsecurity-snippet setting to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/modsecurity/modsecurity_snippet.go:30 @ 04/04/23 18:30:00.998
< Exit [It] should add value of modsecurity-snippet setting to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/modsecurity/modsecurity_snippet.go:30 @ 04/04/23 18:30:11.215 (10.217s)
> Enter [AfterEach] [Setting] [Security] modsecurity-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:11.215
< Exit [AfterEach] [Setting] [Security] modsecurity-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:11.436 (221ms)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:11.436
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:18.304 (6.868s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:30:18.304
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:30:22.331 (4.027s)
> Enter [It] should exists opentracing directive when is enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:71 @ 04/04/23 18:30:22.331
< Exit [It] should exists opentracing directive when is enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:71 @ 04/04/23 18:30:39.546 (17.216s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:39.546
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:39.763 (217ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:30:39.763
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:30:39.763 (0s)
-
-
- > Enter [BeforeEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:39.763
< Exit [BeforeEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:47.146 (7.383s)
> Enter [It] Check persistent affinity mode - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinitymode.go:67 @ 04/04/23 18:30:47.146
< Exit [It] Check persistent affinity mode - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinitymode.go:67 @ 04/04/23 18:32:47.648 (2m0.502s)
> Enter [AfterEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:47.648
< Exit [AfterEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:47.827 (179ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:47.827
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:04.512 (2m16.685s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:35:04.512
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:35:08.555 (4.042s)
> Enter [It] should ignore Ingress with a different class annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:68 @ 04/04/23 18:35:08.555
< Exit [It] should ignore Ingress with a different class annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:68 @ 04/04/23 18:35:25.764 (17.209s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:25.764
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:25.96 (196ms)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:25.96
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:33.883 (7.923s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:35:33.883
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:35:37.911 (4.028s)
> Enter [It] should enable opentracing using jaeger - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:172 @ 04/04/23 18:35:37.911
< Exit [It] should enable opentracing using jaeger - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:172 @ 04/04/23 18:35:57.93 (20.019s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:57.93
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:58.103 (173ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:35:58.103
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:35:58.103 (0s)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:58.104
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:05.96 (7.857s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:36:05.96
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:36:14.017 (8.056s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:36:14.017
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 04/04/23 18:36:14.017
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 04/04/23 18:36:24.203
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 04/04/23 18:36:34.361
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:36:44.521 (30.504s)
> Enter [It] should add custom error page when global-auth-signin url is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:210 @ 04/04/23 18:36:44.521
STEP: Adding a global-auth-signin to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:215 @ 04/04/23 18:36:44.521
< Exit [It] should add custom error page when global-auth-signin url is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:210 @ 04/04/23 18:36:54.694 (10.173s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:54.694
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:54.922 (228ms)
-
-
- > Enter [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:54.922
< Exit [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:02.365 (7.443s)
> Enter [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:31 @ 04/04/23 18:37:02.365
< Exit [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:31 @ 04/04/23 18:37:08.389 (6.023s)
> Enter [It] disable-stream-access-log set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:71 @ 04/04/23 18:37:08.389
< Exit [It] disable-stream-access-log set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:71 @ 04/04/23 18:37:25.61 (17.222s)
> Enter [AfterEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:25.611
< Exit [AfterEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:25.869 (258ms)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:25.869
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:32.759 (6.89s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:37:32.759
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:37:36.785 (4.026s)
> Enter [It] should enable opentracing using jaeger with sampler host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:184 @ 04/04/23 18:37:36.785
< Exit [It] should enable opentracing using jaeger with sampler host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:184 @ 04/04/23 18:37:56.815 (20.03s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:56.815
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:57.041 (227ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:37:57.041
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:37:57.041 (0s)
-
-
- > Enter [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:57.042
< Exit [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:04.9 (7.858s)
> Enter [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:34 @ 04/04/23 18:38:04.9
< Exit [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:34 @ 04/04/23 18:38:15.932 (11.032s)
> Enter [It] Add a custom header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:40 @ 04/04/23 18:38:15.932
< Exit [It] Add a custom header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:40 @ 04/04/23 18:38:26.137 (10.204s)
> Enter [AfterEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:26.137
< Exit [AfterEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:26.471 (334ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:26.471
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:33.322 (6.851s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:38:33.322
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:38:37.351 (4.029s)
> Enter [It] should serve Ingress when class is updated between annotation and ingressClassName - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:323 @ 04/04/23 18:38:37.351
< Exit [It] should serve Ingress when class is updated between annotation and ingressClassName - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:323 @ 04/04/23 18:39:02.787 (25.436s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:02.787
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:03.018 (231ms)
-
-
- > Enter [BeforeEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:03.025
< Exit [BeforeEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:11.02 (7.995s)
> Enter [It] should return 503 when all backend service endpoints are unavailable - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_backend.go:54 @ 04/04/23 18:39:11.02
< Exit [It] should return 503 when all backend service endpoints are unavailable - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_backend.go:54 @ 04/04/23 18:39:21.316 (10.296s)
> Enter [AfterEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:21.316
< Exit [AfterEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:21.504 (188ms)
-
-
- > Enter [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:21.504
< Exit [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:29.492 (7.988s)
> Enter [It] should set gzip_disable to msie6 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:67 @ 04/04/23 18:39:29.492
< Exit [It] should set gzip_disable to msie6 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:67 @ 04/04/23 18:39:46.643 (17.151s)
> Enter [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:46.643
< Exit [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:46.835 (192ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:46.835
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:53.72 (6.885s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:39:53.72
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:40:01.768 (8.048s)
> Enter [It] routes traffic to either mainline or canary backend (legacy behavior) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:1058 @ 04/04/23 18:40:01.768
< Exit [It] routes traffic to either mainline or canary backend (legacy behavior) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:1058 @ 04/04/23 18:40:57.335 (55.567s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:57.335
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:57.533 (198ms)
-
-
- > Enter [BeforeEach] [Status] status update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:19.249
< Exit [BeforeEach] [Status] status update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:26.794 (7.545s)
> Enter [It] should update status field after client-go reconnection - /go/src/k8s.io/ingress-nginx/test/e2e/status/update.go:43 @ 04/04/23 18:04:26.794
Apr 4 18:04:26.794: INFO: Asynchronously running '/bin/bash -c /usr/local/bin/kubectl proxy --accept-hosts=.* --address=0.0.0.0 --port=0'
Apr 4 18:04:49.019: INFO: waiting for leader election and initial status update
Apr 4 18:05:29.033: INFO: Asynchronously running '/bin/bash -c /usr/local/bin/kubectl proxy --accept-hosts=.* --address=0.0.0.0 --port=42431'
< Exit [It] should update status field after client-go reconnection - /go/src/k8s.io/ingress-nginx/test/e2e/status/update.go:43 @ 04/04/23 18:05:39.069 (1m12.275s)
> Enter [AfterEach] [Status] status update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:39.069
< Exit [AfterEach] [Status] status update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:39.293 (225ms)
-
-
- > Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:39.294
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:46.218 (6.925s)
> Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:05:46.218
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:05:50.239 (4.02s)
> Enter [It] should set client_body_buffer_size to 1M - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:123 @ 04/04/23 18:05:50.239
< Exit [It] should set client_body_buffer_size to 1M - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:123 @ 04/04/23 18:06:00.422 (10.184s)
> Enter [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:00.422
< Exit [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:00.649 (227ms)
-
-
- > Enter [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:00.649
< Exit [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:07.542 (6.893s)
> Enter [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:32 @ 04/04/23 18:06:07.542
< Exit [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:32 @ 04/04/23 18:06:11.569 (4.027s)
> Enter [It] should exist a proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:36 @ 04/04/23 18:06:11.569
< Exit [It] should exist a proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:36 @ 04/04/23 18:06:21.772 (10.203s)
> Enter [AfterEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:21.772
< Exit [AfterEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:21.963 (191ms)
-
-
- > Enter [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:21.964
< Exit [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:28.888 (6.924s)
> Enter [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:34 @ 04/04/23 18:06:28.888
< Exit [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:34 @ 04/04/23 18:06:39.938 (11.05s)
> Enter [It] Add multiple custom headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:65 @ 04/04/23 18:06:39.938
< Exit [It] Add multiple custom headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:65 @ 04/04/23 18:06:50.151 (10.213s)
> Enter [AfterEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:50.151
< Exit [AfterEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:50.374 (223ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:50.375
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:57.307 (6.932s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:06:57.307
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:07:05.355 (8.048s)
> Enter [It] should route requests to the correct upstream if mainline ingress is created before the canary ingress - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:161 @ 04/04/23 18:07:05.355
STEP: routing requests destined for the mainline ingress to the maineline upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:185 @ 04/04/23 18:07:22.519
STEP: routing requests destined for the canary ingress to the canary upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:195 @ 04/04/23 18:07:22.526
< Exit [It] should route requests to the correct upstream if mainline ingress is created before the canary ingress - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:161 @ 04/04/23 18:07:22.534 (17.179s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:22.534
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:22.759 (225ms)
-
-
- > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:22.759
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:29.671 (6.912s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:07:29.671
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:07:40.702 (11.031s)
> Enter [It] should set proxy-headers-hash-max-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:68 @ 04/04/23 18:07:40.702
< Exit [It] should set proxy-headers-hash-max-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:68 @ 04/04/23 18:07:50.922 (10.22s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:50.922
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:51.164 (242ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:51.164
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:59.041 (7.877s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:07:59.041
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:08:03.067 (4.025s)
> Enter [It] should ignore Ingress with different controller class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:104 @ 04/04/23 18:08:03.067
< Exit [It] should ignore Ingress with different controller class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:104 @ 04/04/23 18:08:20.253 (17.187s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:20.253
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:20.455 (201ms)
-
-
- > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:20.455
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:27.83 (7.375s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:08:27.83
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:08:38.87 (11.04s)
> Enter [It] log-format-escape-none enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:128 @ 04/04/23 18:08:38.87
< Exit [It] log-format-escape-none enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:128 @ 04/04/23 18:08:52.098 (13.228s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:52.098
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:52.323 (225ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:52.323
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:59.233 (6.909s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:08:59.233
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:09:03.258 (4.025s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:09:03.258
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:09:17.471 (14.213s)
> Enter [It] should return status code 200 when signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:485 @ 04/04/23 18:09:17.471
< Exit [It] should return status code 200 when signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:485 @ 04/04/23 18:09:17.477 (6ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:17.477
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:17.663 (186ms)
-
-
- > Enter [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:17.664
< Exit [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:24.618 (6.955s)
> Enter [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:40 @ 04/04/23 18:09:24.618
< Exit [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:40 @ 04/04/23 18:09:37.752 (13.134s)
> Enter [It] uses default ssl certificate for host based ingress when configured certificate does not match host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:80 @ 04/04/23 18:09:37.752
STEP: making sure new ingress is deployed - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:90 @ 04/04/23 18:09:44.916
STEP: making sure the configured default ssl certificate is being used - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:96 @ 04/04/23 18:09:48.094
< Exit [It] uses default ssl certificate for host based ingress when configured certificate does not match host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:80 @ 04/04/23 18:09:50.119 (12.367s)
> Enter [AfterEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:50.119
< Exit [AfterEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:50.349 (230ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:50.349
< Exit [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:57.22 (6.871s)
> Enter [It] should return OK for service with backend protocol GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:68 @ 04/04/23 18:09:57.22
< Exit [It] should return OK for service with backend protocol GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:68 @ 04/04/23 18:10:11.466 (14.247s)
> Enter [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:11.466
< Exit [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:11.655 (189ms)
-
-
- > Enter [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:11.655
< Exit [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:18.528 (6.872s)
> Enter [It] should be enabled with default settings - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:39 @ 04/04/23 18:10:18.528
< Exit [It] should be enabled with default settings - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:39 @ 04/04/23 18:10:28.683 (10.155s)
> Enter [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:28.683
< Exit [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:28.876 (193ms)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:28.876
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:35.756 (6.88s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:10:35.756
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:10:39.781 (4.025s)
> Enter [It] should include opentracing_trust_incoming_span off directive when disabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:85 @ 04/04/23 18:10:39.781
< Exit [It] should include opentracing_trust_incoming_span off directive when disabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:85 @ 04/04/23 18:10:56.965 (17.184s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:56.965
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:57.186 (221ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:10:57.186
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:10:57.186 (0s)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:57.186
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:05.078 (7.892s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:11:05.078
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:11:09.104 (4.027s)
> Enter [It] should warn user when use-regex is true and session-cookie-path is not set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:294 @ 04/04/23 18:11:09.104
< Exit [It] should warn user when use-regex is true and session-cookie-path is not set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:294 @ 04/04/23 18:11:22.32 (13.216s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:22.32
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:22.585 (265ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:22.585
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:29.564 (6.979s)
> Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:11:29.564
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:11:33.585 (4.021s)
> Enter [It] should set backend protocol to '' and use ajp_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:109 @ 04/04/23 18:11:33.585
< Exit [It] should set backend protocol to '' and use ajp_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:109 @ 04/04/23 18:11:43.812 (10.227s)
> Enter [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:43.812
< Exit [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:44.056 (244ms)
-
-
- > Enter [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:44.057
< Exit [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:52.078 (8.021s)
> Enter [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:37 @ 04/04/23 18:11:52.078
< Exit [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:37 @ 04/04/23 18:11:54.141 (2.063s)
> Enter [It] should add stream-snippet and drop annotations per admin config - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:85 @ 04/04/23 18:11:54.141
< Exit [It] should add stream-snippet and drop annotations per admin config - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:85 @ 04/04/23 18:12:23.359 (29.218s)
> Enter [AfterEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:23.359
< Exit [AfterEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:23.53 (171ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:23.53
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:30.423 (6.893s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:12:30.423
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:12:34.455 (4.032s)
> Enter [It] should not set secure in cookie with provided false annotation on http - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:435 @ 04/04/23 18:12:34.455
< Exit [It] should not set secure in cookie with provided false annotation on http - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:435 @ 04/04/23 18:12:44.621 (10.166s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:44.621
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:44.832 (211ms)
-
-
- > Enter [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:44.833
< Exit [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:52.267 (7.434s)
> Enter [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:42 @ 04/04/23 18:12:52.267
< Exit [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:42 @ 04/04/23 18:12:52.272 (5ms)
> Enter [It] should expose an ExternalName TCP service - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:80 @ 04/04/23 18:12:52.272
< Exit [It] should expose an ExternalName TCP service - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:80 @ 04/04/23 18:12:55.617 (3.345s)
> Enter [AfterEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:55.617
< Exit [AfterEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:55.87 (253ms)
-
-
- > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:55.871
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:02.782 (6.911s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:13:02.782
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:13:06.807 (4.025s)
> Enter [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 04/04/23 18:13:06.807
STEP: configuring certificate_by_lua and skipping Nginx configuration of the new certificate - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:128 @ 04/04/23 18:13:23.944
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:136 @ 04/04/23 18:13:32.097
< Exit [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 04/04/23 18:13:32.106 (25.299s)
> Enter [It] removes HTTPS configuration when we delete TLS spec - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:233 @ 04/04/23 18:13:32.106
< Exit [It] removes HTTPS configuration when we delete TLS spec - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:233 @ 04/04/23 18:13:37.112 (5.005s)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:37.112
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:37.281 (169ms)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:37.281
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:45.19 (7.908s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:13:45.19
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:13:49.209 (4.019s)
> Enter [It] should not exists opentracing_location_operation_name directive when is empty - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:130 @ 04/04/23 18:13:49.209
< Exit [It] should not exists opentracing_location_operation_name directive when is empty - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:130 @ 04/04/23 18:14:06.443 (17.233s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:06.443
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:06.621 (178ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:14:06.621
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:14:06.621 (0s)
-
-
- > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:06.621
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:13.543 (6.921s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:14:13.543
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:14:17.569 (4.026s)
> Enter [It] picks up the certificate when we add TLS spec to existing ingress - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:45 @ 04/04/23 18:14:17.569
< Exit [It] picks up the certificate when we add TLS spec to existing ingress - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:45 @ 04/04/23 18:14:33.037 (15.469s)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:33.037
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:33.234 (196ms)
-
-
- > Enter [BeforeEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:98 @ 04/04/23 18:14:33.234
< Exit [BeforeEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:98 @ 04/04/23 18:14:35.237 (2.003s)
> Enter [It] fails when using root directive - /go/src/k8s.io/ingress-nginx/test/e2e/nginx/nginx.go:124 @ 04/04/23 18:14:35.237
< Exit [It] fails when using root directive - /go/src/k8s.io/ingress-nginx/test/e2e/nginx/nginx.go:124 @ 04/04/23 18:15:35.27 (1m0.034s)
> Enter [AfterEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:99 @ 04/04/23 18:15:35.27
< Exit [AfterEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:99 @ 04/04/23 18:15:35.272 (2ms)
-
-
- > Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:35.273
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:43.177 (7.905s)
> Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 04/04/23 18:15:43.177
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 04/04/23 18:15:45.196 (2.019s)
> Enter [It] should fail to use longest match for documented warning - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:158 @ 04/04/23 18:15:45.196
STEP: creating a regular ingress definition - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:161 @ 04/04/23 18:15:45.196
STEP: creating an ingress definition with the use-regex annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:165 @ 04/04/23 18:15:52.212
STEP: check that '/foo/bar/bar' does not match the longest exact path - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:179 @ 04/04/23 18:16:02.371
< Exit [It] should fail to use longest match for documented warning - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:158 @ 04/04/23 18:16:02.374 (17.178s)
> Enter [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:02.374
< Exit [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:02.58 (206ms)
-
-
- > Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:02.581
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:12.465 (9.885s)
> Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 04/04/23 18:16:12.465
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 04/04/23 18:16:16.495 (4.03s)
> Enter [It] should not exists opentelemetry_operation_name directive when is empty - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:89 @ 04/04/23 18:16:16.495
< Exit [It] should not exists opentelemetry_operation_name directive when is empty - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:89 @ 04/04/23 18:16:33.975 (17.48s)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:33.975
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:34.598 (623ms)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 04/04/23 18:16:34.598
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 04/04/23 18:16:34.598 (0s)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:34.603
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:41.474 (6.871s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:16:41.474
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:16:43.493 (2.019s)
> Enter [It] should disable modsecurity using 'modsecurity off;' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:132 @ 04/04/23 18:16:43.493
< Exit [It] should disable modsecurity using 'modsecurity off;' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:132 @ 04/04/23 18:17:00.623 (17.13s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:00.623
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:00.822 (199ms)
-
-
- > Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:00.823
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:07.712 (6.89s)
> Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:17:07.712
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:17:18.751 (11.038s)
> Enter [It] should set the request count to upstream server through one keep alive connection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:86 @ 04/04/23 18:17:18.751
< Exit [It] should set the request count to upstream server through one keep alive connection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:86 @ 04/04/23 18:17:28.957 (10.206s)
> Enter [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:28.957
< Exit [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:29.194 (237ms)
-
-
- > Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:29.195
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:39.14 (9.946s)
> Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:17:39.14
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:17:50.186 (11.045s)
> Enter [It] should set keepalive_requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:48 @ 04/04/23 18:17:50.186
< Exit [It] should set keepalive_requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:48 @ 04/04/23 18:18:00.312 (10.127s)
> Enter [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:00.312
< Exit [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:00.496 (184ms)
-
-
- > Enter [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:00.496
< Exit [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:07.399 (6.903s)
> Enter [It] should set gzip_comp_level to 4 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:56 @ 04/04/23 18:18:07.399
< Exit [It] should set gzip_comp_level to 4 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:56 @ 04/04/23 18:18:24.593 (17.194s)
> Enter [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:24.593
< Exit [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:24.792 (199ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:24.793
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:31.73 (6.937s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:18:31.73
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:18:35.753 (4.023s)
> Enter [It] should set sticky cookie SERVERID - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:42 @ 04/04/23 18:18:35.753
< Exit [It] should set sticky cookie SERVERID - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:42 @ 04/04/23 18:18:45.94 (10.187s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:45.94
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:46.161 (221ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:46.161
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:54.022 (7.861s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:18:54.022
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:18:58.047 (4.025s)
> Enter [It] should allow - missing origins (should allow all origins) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:571 @ 04/04/23 18:18:58.047
< Exit [It] should allow - missing origins (should allow all origins) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:571 @ 04/04/23 18:19:05.106 (7.059s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:05.106
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:05.287 (181ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:05.287
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:13.171 (7.884s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:19:13.171
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:19:17.198 (4.027s)
> Enter [It] should not set affinity across all server locations when using separate ingresses - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:320 @ 04/04/23 18:19:17.198
< Exit [It] should not set affinity across all server locations when using separate ingresses - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:320 @ 04/04/23 18:19:34.328 (17.129s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:34.328
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:34.564 (236ms)
-
-
- > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:34.564
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:42.455 (7.891s)
> Enter [It] should return 200 for service type=ExternalName without a port defined - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:95 @ 04/04/23 18:19:42.455
< Exit [It] should return 200 for service type=ExternalName without a port defined - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:95 @ 04/04/23 18:19:52.995 (10.54s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:52.995
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:53.197 (202ms)
-
-
-
- > Enter [BeforeEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:53.198
< Exit [BeforeEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:00.144 (6.946s)
> Enter [It] enables access logging for default backend - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:88 @ 04/04/23 18:20:00.144
[SKIPPED] enable-access-log-for-default-backend
In [It] at: /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:90 @ 04/04/23 18:20:00.144
< Exit [It] enables access logging for default backend - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:88 @ 04/04/23 18:20:00.144 (0s)
> Enter [AfterEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:00.144
< Exit [AfterEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:00.767 (622ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:00.767
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:09.884 (9.117s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:20:09.884
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:20:13.952 (4.068s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:20:13.952
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:20:28.231 (14.28s)
> Enter [It] should overwrite Foo header with auth response - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:529 @ 04/04/23 18:20:28.231
< Exit [It] should overwrite Foo header with auth response - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:529 @ 04/04/23 18:20:32.452 (4.22s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:32.452
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:32.657 (205ms)
-
-
- > Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:32.657
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:39.572 (6.914s)
> Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 04/04/23 18:20:39.572
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 04/04/23 18:20:43.594 (4.022s)
> Enter [It] should use ~* location modifier if regex annotation is present - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:111 @ 04/04/23 18:20:43.594
STEP: creating a regular ingress definition - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:114 @ 04/04/23 18:20:43.594
STEP: creating an ingress definition with the use-regex amd rewrite-target annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:123 @ 04/04/23 18:20:53.786
STEP: ensuring '/foo' matches '~* ^/foo' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:137 @ 04/04/23 18:21:03.945
STEP: ensuring '/foo/bar' matches '~* ^/foo.+' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:147 @ 04/04/23 18:21:03.953
< Exit [It] should use ~* location modifier if regex annotation is present - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:111 @ 04/04/23 18:21:03.959 (20.365s)
> Enter [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:03.959
< Exit [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:04.173 (214ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:04.173
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:12.085 (7.912s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:21:12.085
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:21:16.104 (4.019s)
> Enter [It] should return status code 401 when authentication is configured but Authorization header is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:89 @ 04/04/23 18:21:16.104
< Exit [It] should return status code 401 when authentication is configured but Authorization header is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:89 @ 04/04/23 18:21:27.134 (11.029s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:27.134
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:27.321 (187ms)
-
-
- > Enter [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:27.321
< Exit [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:34.238 (6.917s)
> Enter [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:32 @ 04/04/23 18:21:34.238
< Exit [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:32 @ 04/04/23 18:21:38.265 (4.026s)
> Enter [It] should disable mirror-request-body - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:67 @ 04/04/23 18:21:38.265
< Exit [It] should disable mirror-request-body - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:67 @ 04/04/23 18:21:48.462 (10.197s)
> Enter [AfterEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:48.462
< Exit [AfterEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:48.677 (215ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:48.677
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:55.595 (6.918s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:21:55.595
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:21:59.616 (4.02s)
> Enter [BeforeEach] with invalid auth-url should deny whole location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:866 @ 04/04/23 18:21:59.616
< Exit [BeforeEach] with invalid auth-url should deny whole location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:866 @ 04/04/23 18:22:09.78 (10.165s)
> Enter [It] should return 503 (location was denied) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:879 @ 04/04/23 18:22:09.78
< Exit [It] should return 503 (location was denied) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:879 @ 04/04/23 18:22:09.787 (6ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:09.787
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:10.018 (231ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:10.018
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:17.91 (7.892s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:22:17.91
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:22:21.937 (4.027s)
> Enter [It] should setup proxy cookies - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:215 @ 04/04/23 18:22:21.937
< Exit [It] should setup proxy cookies - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:215 @ 04/04/23 18:22:32.141 (10.205s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:32.141
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:32.312 (170ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:32.312
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:39.246 (6.934s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:22:39.246
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:22:43.274 (4.028s)
> Enter [BeforeEach] Without IngressClass Cluster scoped Permission - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:587 @ 04/04/23 18:22:43.274
< Exit [BeforeEach] Without IngressClass Cluster scoped Permission - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:587 @ 04/04/23 18:22:50.32 (7.047s)
> Enter [It] should ignore Ingress with only IngressClassName - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:652 @ 04/04/23 18:22:50.32
< Exit [It] should ignore Ingress with only IngressClassName - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:652 @ 04/04/23 18:23:00.536 (10.216s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:00.536
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:00.771 (235ms)
-
-
- > Enter [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:00.772
< Exit [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:07.648 (6.876s)
> Enter [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:39 @ 04/04/23 18:23:07.648
< Exit [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:39 @ 04/04/23 18:23:18.858 (11.21s)
> Enter [It] should enable ssl-passthrough-proxy-port on a different port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:56 @ 04/04/23 18:23:18.858
< Exit [It] should enable ssl-passthrough-proxy-port on a different port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:56 @ 04/04/23 18:23:30.073 (11.215s)
> Enter [AfterEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:30.073
< Exit [AfterEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:30.267 (194ms)
-
-
- > Enter [BeforeEach] [Default Backend] change default settings - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:30.267
< Exit [BeforeEach] [Default Backend] change default settings - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:37.168 (6.901s)
> Enter [BeforeEach] [Default Backend] change default settings - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/with_hosts.go:34 @ 04/04/23 18:23:37.168
< Exit [BeforeEach] [Default Backend] change default settings - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/with_hosts.go:34 @ 04/04/23 18:23:41.193 (4.024s)
> Enter [It] should apply the annotation to the default backend - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/with_hosts.go:38 @ 04/04/23 18:23:41.193
< Exit [It] should apply the annotation to the default backend - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/with_hosts.go:38 @ 04/04/23 18:23:51.36 (10.167s)
> Enter [AfterEach] [Default Backend] change default settings - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:51.36
< Exit [AfterEach] [Default Backend] change default settings - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:51.551 (192ms)
-
-
- > Enter [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:51.552
< Exit [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:58.412 (6.86s)
> Enter [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:42 @ 04/04/23 18:23:58.412
< Exit [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:42 @ 04/04/23 18:24:02.44 (4.027s)
> Enter [It] should include geoip2 line in config when enabled and db file exists - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:46 @ 04/04/23 18:24:02.44
Apr 4 18:24:11.771: INFO: Connecting to github.com (140.82.113.4:443)
Connecting to github.com (140.82.113.4:443)
Connecting to raw.githubusercontent.com (185.199.108.133:443)
saving to '/etc/nginx/geoip/GeoLite2-Country.mmdb'
GeoLite2-Country.mmd 100%!|(MISSING)********************************| 17952 0:00:00 ETA
'/etc/nginx/geoip/GeoLite2-Country.mmdb' saved
< Exit [It] should include geoip2 line in config when enabled and db file exists - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:46 @ 04/04/23 18:24:22.088 (19.648s)
> Enter [AfterEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:22.088
< Exit [AfterEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:22.674 (586ms)
-
-
- > Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:22.675
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:30.572 (7.897s)
> Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 04/04/23 18:24:30.572
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 04/04/23 18:24:34.603 (4.031s)
> Enter [It] should allow for custom rewrite parameters - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:190 @ 04/04/23 18:24:34.603
STEP: creating an ingress definition with the use-regex annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:193 @ 04/04/23 18:24:34.603
STEP: check that '/foo/bar/bar' redirects to custom rewrite - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:206 @ 04/04/23 18:24:44.755
< Exit [It] should allow for custom rewrite parameters - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:190 @ 04/04/23 18:24:44.757 (10.154s)
> Enter [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:44.757
< Exit [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:44.959 (202ms)
-
-
- > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:44.96
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:53.864 (8.905s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:24:53.864
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:25:04.899 (11.035s)
> Enter [It] should set server_names_hash_bucket_size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:40 @ 04/04/23 18:25:04.899
< Exit [It] should set server_names_hash_bucket_size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:40 @ 04/04/23 18:25:15.061 (10.162s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:15.061
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:15.316 (255ms)
-
-
- > Enter [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:15.316
< Exit [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:39.846 (24.53s)
> Enter [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:38 @ 04/04/23 18:25:39.846
< Exit [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:38 @ 04/04/23 18:25:47.041 (7.195s)
> Enter [It] should set X-Forwarded-Port header to 443 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:70 @ 04/04/23 18:25:47.041
< Exit [It] should set X-Forwarded-Port header to 443 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:70 @ 04/04/23 18:25:59.374 (12.333s)
> Enter [AfterEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:59.374
< Exit [AfterEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:59.585 (211ms)
-
-
- > Enter [BeforeEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:59.585
< Exit [BeforeEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:06.445 (6.86s)
> Enter [It] should create sync events (default) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_sync_events.go:35 @ 04/04/23 18:26:06.445
< Exit [It] should create sync events (default) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_sync_events.go:35 @ 04/04/23 18:26:20.681 (14.236s)
> Enter [AfterEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:20.681
< Exit [AfterEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:20.877 (196ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:20.877
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:27.751 (6.874s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:26:27.751
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:26:31.787 (4.036s)
> Enter [It] should not allow - unmatching origin with wildcard origin (2 subdomains) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:468 @ 04/04/23 18:26:31.787
< Exit [It] should not allow - unmatching origin with wildcard origin (2 subdomains) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:468 @ 04/04/23 18:26:38.82 (7.032s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:38.82
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:39.022 (203ms)
-
-
- > Enter [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:39.023
< Exit [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:46.929 (7.906s)
> Enter [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:32 @ 04/04/23 18:26:46.929
< Exit [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:32 @ 04/04/23 18:26:50.949 (4.02s)
> Enter [It] should not set invalid proxy send timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:52 @ 04/04/23 18:26:50.949
< Exit [It] should not set invalid proxy send timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:52 @ 04/04/23 18:27:08.052 (17.103s)
> Enter [AfterEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:08.052
< Exit [AfterEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:08.24 (188ms)
-
-
- > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:08.24
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:16.131 (7.891s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:27:16.131
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:27:27.187 (11.056s)
> Enter [It] should set server_names_hash_max_size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:48 @ 04/04/23 18:27:27.187
< Exit [It] should set server_names_hash_max_size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:48 @ 04/04/23 18:27:37.411 (10.224s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:37.411
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:37.656 (245ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:37.657
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:44.535 (6.879s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:27:44.535
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:27:48.555 (4.02s)
> Enter [It] should set proxy client-max-body-size to 8m - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:85 @ 04/04/23 18:27:48.555
< Exit [It] should set proxy client-max-body-size to 8m - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:85 @ 04/04/23 18:27:58.71 (10.155s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:58.71
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:58.954 (244ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:58.955
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:06.864 (7.909s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:28:06.864
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:28:10.897 (4.033s)
> Enter [It] should not break functionality with extra domain - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:314 @ 04/04/23 18:28:10.897
< Exit [It] should not break functionality with extra domain - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:314 @ 04/04/23 18:28:17.933 (7.036s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:17.933
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:18.142 (209ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:18.142
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:26.105 (7.963s)
> Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 04/04/23 18:28:26.105
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 04/04/23 18:28:28.133 (2.028s)
> Enter [It] proxy-ssl-location-only flag should change the nginx config server part - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:150 @ 04/04/23 18:28:28.133
< Exit [It] proxy-ssl-location-only flag should change the nginx config server part - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:150 @ 04/04/23 18:29:01.214 (33.081s)
> Enter [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:01.214
< Exit [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:01.431 (217ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:01.431
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:19.232 (2m17.801s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:31:19.232
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:31:23.279 (4.047s)
> Enter [BeforeEach] with invalid auth-url should deny whole location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:866 @ 04/04/23 18:31:23.279
< Exit [BeforeEach] with invalid auth-url should deny whole location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:866 @ 04/04/23 18:31:33.459 (10.18s)
> Enter [It] should add error to the config - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:887 @ 04/04/23 18:31:33.459
< Exit [It] should add error to the config - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:887 @ 04/04/23 18:31:36.583 (3.124s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:36.583
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:36.807 (224ms)
-
-
- > Enter [BeforeEach] [Default Backend] SSL - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:36.808
< Exit [BeforeEach] [Default Backend] SSL - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:43.735 (6.927s)
> Enter [It] should return a self generated SSL certificate - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/ssl.go:29 @ 04/04/23 18:31:43.735
STEP: checking SSL Certificate using the NGINX IP address - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/ssl.go:30 @ 04/04/23 18:31:43.735
STEP: checking SSL Certificate using the NGINX catch all server - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/ssl.go:45 @ 04/04/23 18:31:48.771
< Exit [It] should return a self generated SSL certificate - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/ssl.go:29 @ 04/04/23 18:31:48.798 (5.063s)
> Enter [AfterEach] [Default Backend] SSL - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:48.798
< Exit [AfterEach] [Default Backend] SSL - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:49.002 (204ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:49.002
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:55.884 (6.881s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:31:55.884
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:31:59.898 (4.014s)
> Enter [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 04/04/23 18:31:59.898
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 04/04/23 18:32:04.919
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 04/04/23 18:32:15.067
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 04/04/23 18:32:25.279
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 04/04/23 18:32:35.453
< Exit [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 04/04/23 18:32:50.643 (50.746s)
> Enter [It] should return status code 200 when signed in after auth backend is deleted - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:772 @ 04/04/23 18:32:50.643
< Exit [It] should return status code 200 when signed in after auth backend is deleted - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:772 @ 04/04/23 18:32:57.666 (7.022s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:57.666
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:57.876 (210ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:57.876
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:04.793 (6.917s)
> Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 04/04/23 18:33:04.793
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 04/04/23 18:33:08.814 (4.021s)
> Enter [It] should set valid proxy-ssl-secret, proxy-ssl-protocols - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:122 @ 04/04/23 18:33:08.814
< Exit [It] should set valid proxy-ssl-secret, proxy-ssl-protocols - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:122 @ 04/04/23 18:33:19.338 (10.524s)
> Enter [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:19.338
< Exit [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:19.552 (213ms)
-
-
- > Enter [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:19.552
< Exit [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:26.442 (6.89s)
> Enter [It] should be disabled by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:32 @ 04/04/23 18:33:26.442
< Exit [It] should be disabled by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:32 @ 04/04/23 18:33:29.606 (3.164s)
> Enter [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:29.606
< Exit [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:29.78 (174ms)
-
-
- > Enter [BeforeEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:29.78
< Exit [BeforeEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:36.668 (6.887s)
> Enter [It] Balanced affinity mode should balance - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinitymode.go:34 @ 04/04/23 18:33:36.668
< Exit [It] Balanced affinity mode should balance - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinitymode.go:34 @ 04/04/23 18:33:54.927 (18.259s)
> Enter [AfterEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:54.927
< Exit [AfterEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:55.127 (200ms)
-
-
- > Enter [BeforeEach] [Setting] proxy-next-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:55.128
< Exit [BeforeEach] [Setting] proxy-next-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:03.016 (7.888s)
> Enter [BeforeEach] [Setting] proxy-next-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_next_upstream.go:32 @ 04/04/23 18:34:03.016
< Exit [BeforeEach] [Setting] proxy-next-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_next_upstream.go:32 @ 04/04/23 18:34:07.036 (4.021s)
> Enter [It] should build proxy next upstream using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_next_upstream.go:36 @ 04/04/23 18:34:07.036
< Exit [It] should build proxy next upstream using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_next_upstream.go:36 @ 04/04/23 18:34:24.255 (17.219s)
> Enter [AfterEach] [Setting] proxy-next-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:24.255
< Exit [AfterEach] [Setting] proxy-next-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:24.485 (230ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:24.485
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:31.385 (6.9s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:34:31.385
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:34:35.427 (4.042s)
> Enter [It] should set proxy_redirect to off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:36 @ 04/04/23 18:34:35.427
< Exit [It] should set proxy_redirect to off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:36 @ 04/04/23 18:34:45.603 (10.176s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:45.603
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:45.78 (178ms)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:45.781
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:52.66 (6.879s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:34:52.66
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:34:56.689 (4.029s)
> Enter [It] should not exists opentracing_operation_name directive when is empty - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:100 @ 04/04/23 18:34:56.689
< Exit [It] should not exists opentracing_operation_name directive when is empty - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:100 @ 04/04/23 18:35:13.844 (17.155s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:13.844
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:14.078 (234ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:35:14.078
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:35:14.078 (0s)
-
-
- > Enter [BeforeEach] [Annotations] influxdb-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:14.078
< Exit [BeforeEach] [Annotations] influxdb-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:22.011 (7.933s)
> Enter [BeforeEach] [Annotations] influxdb-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/influxdb.go:42 @ 04/04/23 18:35:22.011
< Exit [BeforeEach] [Annotations] influxdb-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/influxdb.go:42 @ 04/04/23 18:35:38.056 (16.045s)
> Enter [It] should send the request metric to the influxdb server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/influxdb.go:48 @ 04/04/23 18:35:38.056
< Exit [It] should send the request metric to the influxdb server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/influxdb.go:48 @ 04/04/23 18:35:59.417 (21.362s)
> Enter [AfterEach] [Annotations] influxdb-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:59.417
< Exit [AfterEach] [Annotations] influxdb-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:59.632 (215ms)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:59.632
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:06.509 (6.876s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:36:06.509
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:36:10.532 (4.023s)
> Enter [It] should enable opentracing using datadog - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:241 @ 04/04/23 18:36:10.532
< Exit [It] should enable opentracing using datadog - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:241 @ 04/04/23 18:36:30.574 (20.042s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:30.574
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:30.81 (237ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:36:30.81
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:36:30.81 (0s)
-
-
- > Enter [BeforeEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:30.811
< Exit [BeforeEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:37.689 (6.878s)
> Enter [It] should set ingress details variables for ingresses without a host - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/without_host.go:34 @ 04/04/23 18:36:37.689
< Exit [It] should set ingress details variables for ingresses without a host - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/without_host.go:34 @ 04/04/23 18:36:51.912 (14.223s)
> Enter [AfterEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:51.912
< Exit [AfterEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:52.088 (176ms)
-
-
- > Enter [BeforeEach] [Setting] main-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:52.088
< Exit [BeforeEach] [Setting] main-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:59.999 (7.911s)
> Enter [It] should add value of main-snippet setting to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/main_snippet.go:31 @ 04/04/23 18:36:59.999
< Exit [It] should add value of main-snippet setting to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/main_snippet.go:31 @ 04/04/23 18:37:10.187 (10.188s)
> Enter [AfterEach] [Setting] main-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:10.187
< Exit [AfterEach] [Setting] main-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:10.413 (225ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:10.413
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:17.279 (6.866s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:37:17.279
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:37:21.337 (4.058s)
> Enter [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:532 @ 04/04/23 18:37:21.337
STEP: routing requests to the mainline upstream when header is set to 'DoCananry' and header-value is 'DoCanary' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:557 @ 04/04/23 18:37:38.545
< Exit [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:532 @ 04/04/23 18:37:38.552 (17.215s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:38.552
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:38.772 (219ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:38.772
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:45.664 (6.892s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:37:45.664
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:37:49.681 (4.017s)
> Enter [It] should serve Ingress when class is added - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:257 @ 04/04/23 18:37:49.681
< Exit [It] should serve Ingress when class is added - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:257 @ 04/04/23 18:38:15.087 (25.406s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:15.087
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:15.266 (179ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:15.266
< Exit [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:23.144 (7.877s)
> Enter [It] should return OK for service with backend protocol GRPCS - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:199 @ 04/04/23 18:38:23.144
< Exit [It] should return OK for service with backend protocol GRPCS - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:199 @ 04/04/23 18:38:39.406 (16.262s)
> Enter [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:39.406
< Exit [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:39.613 (207ms)
-
-
- > Enter [BeforeEach] [Annotations] annotation-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:39.613
< Exit [BeforeEach] [Annotations] annotation-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:46.507 (6.894s)
> Enter [BeforeEach] [Annotations] annotation-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/globalratelimit.go:34 @ 04/04/23 18:38:46.507
< Exit [BeforeEach] [Annotations] annotation-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/globalratelimit.go:34 @ 04/04/23 18:38:50.531 (4.023s)
> Enter [It] generates correct configuration - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/globalratelimit.go:38 @ 04/04/23 18:38:50.531
STEP: regenerating the correct configuration after update - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/globalratelimit.go:65 @ 04/04/23 18:39:12.735
< Exit [It] generates correct configuration - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/globalratelimit.go:38 @ 04/04/23 18:39:23.972 (33.441s)
> Enter [AfterEach] [Annotations] annotation-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:23.972
< Exit [AfterEach] [Annotations] annotation-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:24.525 (553ms)
-
-
- > Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:24.526
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:32.928 (8.402s)
> Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 04/04/23 18:39:32.928
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 04/04/23 18:39:36.954 (4.026s)
> Enter [It] [BAD_ANNOTATIONS] should drop an ingress if there is a forbidden word in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:67 @ 04/04/23 18:39:36.954
< Exit [It] [BAD_ANNOTATIONS] should drop an ingress if there is a forbidden word in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:67 @ 04/04/23 18:40:09.289 (32.335s)
> Enter [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:09.289
< Exit [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:09.487 (198ms)
-
-
- > Enter [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:09.487
< Exit [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:16.38 (6.893s)
> Enter [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:31 @ 04/04/23 18:40:16.38
< Exit [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:31 @ 04/04/23 18:40:20.419 (4.039s)
> Enter [It] should not add X-Forwarded-Prefix if the annotation value is empty - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:57 @ 04/04/23 18:40:20.419
< Exit [It] should not add X-Forwarded-Prefix if the annotation value is empty - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:57 @ 04/04/23 18:40:30.626 (10.207s)
> Enter [AfterEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:30.626
< Exit [AfterEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:30.822 (196ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:30.822
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:37.735 (6.913s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:40:37.735
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:40:41.759 (4.024s)
> Enter [It] should ignore Ingress without IngressClass configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:164 @ 04/04/23 18:40:41.759
< Exit [It] should ignore Ingress without IngressClass configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:164 @ 04/04/23 18:40:58.984 (17.225s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:58.984
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:59.238 (254ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:19.257
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:26.759 (7.502s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:04:26.759
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:04:38.804 (12.045s)
> Enter [It] should set cookie with domain - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:225 @ 04/04/23 18:04:38.804
< Exit [It] should set cookie with domain - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:225 @ 04/04/23 18:04:49.017 (10.213s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:04:49.017
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:04:49.223 (207ms)
-
-
- > Enter [BeforeEach] [Service] Nil Service Backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:49.225
< Exit [BeforeEach] [Service] Nil Service Backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:57.104 (7.879s)
> Enter [BeforeEach] [Service] Nil Service Backend - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_nil_backend.go:34 @ 04/04/23 18:04:57.104
< Exit [BeforeEach] [Service] Nil Service Backend - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_nil_backend.go:34 @ 04/04/23 18:05:01.132 (4.029s)
> Enter [It] should return 404 when backend service is nil - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_nil_backend.go:38 @ 04/04/23 18:05:01.132
STEP: setting an ingress with a nil backend - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_nil_backend.go:39 @ 04/04/23 18:05:01.132
< Exit [It] should return 404 when backend service is nil - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_nil_backend.go:38 @ 04/04/23 18:05:18.375 (17.242s)
> Enter [AfterEach] [Service] Nil Service Backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:18.375
< Exit [AfterEach] [Service] Nil Service Backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:18.574 (200ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:18.575
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:25.47 (6.895s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:05:25.47
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:05:29.501 (4.031s)
> Enter [It] should set the path to /something on the generated cookie - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:99 @ 04/04/23 18:05:29.501
< Exit [It] should set the path to /something on the generated cookie - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:99 @ 04/04/23 18:05:39.685 (10.184s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:39.685
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:39.886 (201ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:39.886
< Exit [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:46.798 (6.912s)
> Enter [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:33 @ 04/04/23 18:05:46.798
< Exit [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:33 @ 04/04/23 18:05:57.853 (11.055s)
> Enter [It] should block CIDRs defined in the ConfigMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:38 @ 04/04/23 18:05:57.853
< Exit [It] should block CIDRs defined in the ConfigMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:38 @ 04/04/23 18:06:08.065 (10.213s)
> Enter [AfterEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:08.065
< Exit [AfterEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:08.304 (239ms)
-
-
- > Enter [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:08.304
< Exit [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:15.196 (6.891s)
> Enter [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:32 @ 04/04/23 18:06:15.196
< Exit [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:32 @ 04/04/23 18:06:19.22 (4.024s)
> Enter [It] should set valid proxy read timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:36 @ 04/04/23 18:06:19.22
< Exit [It] should set valid proxy read timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:36 @ 04/04/23 18:06:36.431 (17.211s)
> Enter [AfterEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:36.431
< Exit [AfterEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:36.678 (246ms)
-
-
- > Enter [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:36.678
< Exit [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:43.562 (6.884s)
> Enter [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:32 @ 04/04/23 18:06:43.562
< Exit [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:32 @ 04/04/23 18:06:47.588 (4.026s)
> Enter [It] should set valid proxy send timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:36 @ 04/04/23 18:06:47.588
< Exit [It] should set valid proxy send timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:36 @ 04/04/23 18:07:04.782 (17.194s)
> Enter [AfterEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:04.782
< Exit [AfterEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:04.961 (179ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:04.961
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:12.853 (7.892s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:07:12.853
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:07:20.912 (8.059s)
> Enter [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:426 @ 04/04/23 18:07:20.912
STEP: routing requests to the canary upstream when header is set to 'DoCanary' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:451 @ 04/04/23 18:07:38.088
STEP: routing requests to the mainline upstream when header is set to 'always' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:460 @ 04/04/23 18:07:38.092
STEP: routing requests to the mainline upstream when header is set to 'never' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:469 @ 04/04/23 18:07:38.097
STEP: routing requests to the mainline upstream when header is set to anything else - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:478 @ 04/04/23 18:07:38.101
< Exit [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:426 @ 04/04/23 18:07:38.105 (17.192s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:38.105
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:38.312 (208ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:38.313
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:45.57 (7.258s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:07:45.57
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:07:49.597 (4.027s)
> Enter [BeforeEach] when external authentication is configured with a custom redirect param - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:651 @ 04/04/23 18:07:49.597
< Exit [BeforeEach] when external authentication is configured with a custom redirect param - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:651 @ 04/04/23 18:08:17.835 (28.238s)
> Enter [It] keeps processing new ingresses even if one of the existing ingresses is misconfigured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:698 @ 04/04/23 18:08:17.835
< Exit [It] keeps processing new ingresses even if one of the existing ingresses is misconfigured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:698 @ 04/04/23 18:08:29.028 (11.193s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:29.028
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:29.254 (225ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:29.254
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:37.146 (7.892s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:08:37.146
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:08:45.193 (8.047s)
> Enter [It] should route requests to the correct upstream if mainline ingress is created after the canary ingress - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:206 @ 04/04/23 18:08:45.193
STEP: routing requests destined for the mainline ingress to the mainelin upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:231 @ 04/04/23 18:09:02.324
STEP: routing requests destined for the canary ingress to the canary upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:240 @ 04/04/23 18:09:02.332
< Exit [It] should route requests to the correct upstream if mainline ingress is created after the canary ingress - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:206 @ 04/04/23 18:09:02.337 (17.144s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:02.337
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:02.545 (208ms)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:02.545
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:09.432 (6.887s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:09:09.432
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:09:13.454 (4.022s)
> Enter [It] should enable modsecurity with snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:91 @ 04/04/23 18:09:13.454
< Exit [It] should enable modsecurity with snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:91 @ 04/04/23 18:09:23.682 (10.227s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:23.682
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:23.867 (185ms)
-
-
- > Enter [BeforeEach] [Setting] settings-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:23.867
< Exit [BeforeEach] [Setting] settings-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:41.632 (2m17.765s)
> Enter [BeforeEach] [Setting] settings-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/settings/globalratelimit.go:34 @ 04/04/23 18:11:41.632
< Exit [BeforeEach] [Setting] settings-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/settings/globalratelimit.go:34 @ 04/04/23 18:11:45.686 (4.054s)
> Enter [It] generates correct NGINX configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/globalratelimit.go:38 @ 04/04/23 18:11:45.686
STEP: generating correct defaults - /go/src/k8s.io/ingress-nginx/test/e2e/settings/globalratelimit.go:43 @ 04/04/23 18:11:52.711
STEP: applying customizations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/globalratelimit.go:61 @ 04/04/23 18:11:55.865
< Exit [It] generates correct NGINX configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/globalratelimit.go:38 @ 04/04/23 18:12:06.074 (20.388s)
> Enter [AfterEach] [Setting] settings-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:06.074
< Exit [AfterEach] [Setting] settings-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:06.248 (175ms)
-
-
- > Enter [BeforeEach] [Setting] [Load Balancer] EWMA - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:06.248
< Exit [BeforeEach] [Setting] [Load Balancer] EWMA - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:13.645 (7.397s)
> Enter [BeforeEach] [Setting] [Load Balancer] EWMA - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/ewma.go:34 @ 04/04/23 18:12:13.645
< Exit [BeforeEach] [Setting] [Load Balancer] EWMA - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/ewma.go:34 @ 04/04/23 18:12:24.689 (11.044s)
> Enter [It] does not fail requests - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/ewma.go:42 @ 04/04/23 18:12:24.689
Apr 4 18:12:39.085: INFO: Request distribution: map[echo-7b6bf466cc-4gqhv:16 echo-7b6bf466cc-kbjqx:9 echo-7b6bf466cc-scqj9:5]
< Exit [It] does not fail requests - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/ewma.go:42 @ 04/04/23 18:12:39.085 (14.396s)
> Enter [AfterEach] [Setting] [Load Balancer] EWMA - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:39.085
< Exit [AfterEach] [Setting] [Load Balancer] EWMA - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:39.295 (210ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:39.295
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:47.18 (7.884s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:12:47.18
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:12:51.204 (4.024s)
> Enter [It] should expose headers for cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:153 @ 04/04/23 18:12:51.204
< Exit [It] should expose headers for cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:153 @ 04/04/23 18:13:01.392 (10.189s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:01.392
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:01.572 (180ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:01.573
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:08.45 (6.878s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:13:08.45
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:13:16.493 (8.042s)
> Enter [It] always routes traffic to canary if first request was affinitized to canary (default behavior) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:943 @ 04/04/23 18:13:16.493
< Exit [It] always routes traffic to canary if first request was affinitized to canary (default behavior) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:943 @ 04/04/23 18:13:42.089 (25.596s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:42.089
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:42.311 (222ms)
-
-
- > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:42.312
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:49.227 (6.915s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:13:49.227
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:14:00.268 (11.041s)
> Enter [It] should disable the log-format-escape-none - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:71 @ 04/04/23 18:14:00.268
< Exit [It] should disable the log-format-escape-none - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:71 @ 04/04/23 18:14:10.406 (10.138s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:10.406
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:10.583 (177ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:10.584
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:17.985 (7.402s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:14:17.985
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:14:22.015 (4.03s)
> Enter [It] should set proxy_redirect to default - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:52 @ 04/04/23 18:14:22.015
< Exit [It] should set proxy_redirect to default - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:52 @ 04/04/23 18:14:32.238 (10.222s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:32.238
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:32.409 (172ms)
-
-
- > Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:32.41
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:40.329 (7.92s)
> Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:14:40.329
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:14:51.355 (11.026s)
> Enter [It] should set keepalive connection to upstream server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:59 @ 04/04/23 18:14:51.356
< Exit [It] should set keepalive connection to upstream server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:59 @ 04/04/23 18:15:01.513 (10.157s)
> Enter [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:01.513
< Exit [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:01.717 (204ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:01.717
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:08.628 (6.911s)
> Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:15:08.628
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:15:12.654 (4.026s)
> Enter [It] should set backend protocol to https:// and use proxy_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:34 @ 04/04/23 18:15:12.654
< Exit [It] should set backend protocol to https:// and use proxy_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:34 @ 04/04/23 18:15:22.863 (10.21s)
> Enter [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:22.863
< Exit [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:23.117 (253ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:23.117
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:31.017 (7.9s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:15:31.017
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:15:35.052 (4.035s)
> Enter [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:372 @ 04/04/23 18:15:35.052
STEP: routing requests to the canary upstream when header is set to 'always' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:395 @ 04/04/23 18:15:52.235
STEP: routing requests to the mainline upstream when header is set to 'never' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:404 @ 04/04/23 18:15:52.237
STEP: routing requests to the mainline upstream when header is set to anything else - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:414 @ 04/04/23 18:15:52.239
< Exit [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:372 @ 04/04/23 18:15:52.24 (17.188s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:52.24
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:52.427 (187ms)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:52.428
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:59.303 (6.876s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:15:59.303
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:16:03.326 (4.022s)
> Enter [It] should exists opentracing_location_operation_name directive when is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:145 @ 04/04/23 18:16:03.326
< Exit [It] should exists opentracing_location_operation_name directive when is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:145 @ 04/04/23 18:16:20.959 (17.634s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:20.959
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:22.171 (1.211s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:16:22.171
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:16:22.171 (0s)
-
-
- > Enter [BeforeEach] [Annotations] limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:22.172
< Exit [BeforeEach] [Annotations] limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:31.372 (9.2s)
> Enter [BeforeEach] [Annotations] limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitrate.go:33 @ 04/04/23 18:16:31.372
< Exit [BeforeEach] [Annotations] limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitrate.go:33 @ 04/04/23 18:16:35.41 (4.038s)
> Enter [It] Check limit-rate annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitrate.go:37 @ 04/04/23 18:16:35.41
< Exit [It] Check limit-rate annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitrate.go:37 @ 04/04/23 18:16:49.822 (14.412s)
> Enter [AfterEach] [Annotations] limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:49.822
< Exit [AfterEach] [Annotations] limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:50.037 (215ms)
-
-
- > Enter [BeforeEach] [Setting] configmap stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:50.037
< Exit [BeforeEach] [Setting] configmap stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:57.908 (7.87s)
> Enter [BeforeEach] [Setting] configmap stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/settings/stream_snippet.go:38 @ 04/04/23 18:16:57.908
< Exit [BeforeEach] [Setting] configmap stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/settings/stream_snippet.go:38 @ 04/04/23 18:17:01.931 (4.024s)
> Enter [It] should add value of stream-snippet via config map to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/stream_snippet.go:42 @ 04/04/23 18:17:01.931
< Exit [It] should add value of stream-snippet via config map to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/stream_snippet.go:42 @ 04/04/23 18:17:24.158 (22.227s)
> Enter [AfterEach] [Setting] configmap stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:24.158
< Exit [AfterEach] [Setting] configmap stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:24.349 (191ms)
-
-
- > Enter [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:24.35
< Exit [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:31.239 (6.889s)
> Enter [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:79 @ 04/04/23 18:17:31.239
< Exit [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:79 @ 04/04/23 18:17:39.264 (8.025s)
> Enter [It] should connect to the same pod - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:83 @ 04/04/23 18:17:39.264
< Exit [It] should connect to the same pod - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:83 @ 04/04/23 18:18:09.666 (30.402s)
> Enter [AfterEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:09.666
< Exit [AfterEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:09.903 (237ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:09.904
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:16.786 (6.882s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:18:16.786
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:18:20.804 (4.018s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:18:20.804
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:18:35.029 (14.226s)
> Enter [It] should not create additional upstream block when auth-keepalive is set with HTTP/2 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:609 @ 04/04/23 18:18:35.029
< Exit [It] should not create additional upstream block when auth-keepalive is set with HTTP/2 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:609 @ 04/04/23 18:18:41.107 (6.078s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:41.107
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:41.32 (212ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:41.32
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:49.195 (7.875s)
> Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 04/04/23 18:18:49.195
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 04/04/23 18:18:53.217 (4.022s)
> Enter [It] should set valid proxy-ssl-secret - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:37 @ 04/04/23 18:18:53.217
< Exit [It] should set valid proxy-ssl-secret - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:37 @ 04/04/23 18:19:04.077 (10.86s)
> Enter [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:04.077
< Exit [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:04.257 (181ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:04.258
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:12.153 (7.895s)
> Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 04/04/23 18:19:12.153
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 04/04/23 18:19:16.174 (4.021s)
> Enter [It] should set valid proxy-ssl-secret, proxy-ssl-ciphers to HIGH:!AES - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:94 @ 04/04/23 18:19:16.174
< Exit [It] should set valid proxy-ssl-secret, proxy-ssl-ciphers to HIGH:!AES - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:94 @ 04/04/23 18:19:27.319 (11.146s)
> Enter [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:27.32
< Exit [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:27.668 (348ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:27.668
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:34.827 (7.159s)
> Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:19:34.827
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:19:38.85 (4.023s)
> Enter [It] should set backend protocol to '' and use fastcgi_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:94 @ 04/04/23 18:19:38.85
< Exit [It] should set backend protocol to '' and use fastcgi_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:94 @ 04/04/23 18:19:49.066 (10.216s)
> Enter [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:49.066
< Exit [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:49.312 (246ms)
-
-
- > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:49.312
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:57.192 (7.879s)
> Enter [It] should return status 502 for service type=ExternalName with an invalid host - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:153 @ 04/04/23 18:19:57.192
< Exit [It] should return status 502 for service type=ExternalName with an invalid host - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:153 @ 04/04/23 18:20:12.695 (15.504s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:12.695
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:13.536 (840ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:13.536
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:20.628 (7.092s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:20:20.628
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:20:28.704 (8.077s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:20:28.704
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 04/04/23 18:20:28.704
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 04/04/23 18:20:38.882
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 04/04/23 18:20:49.057
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:20:59.272 (30.567s)
> Enter [It] should set request-redirect when global-auth-request-redirect is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:237 @ 04/04/23 18:20:59.272
STEP: Adding a global-auth-request-redirect to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:242 @ 04/04/23 18:20:59.272
< Exit [It] should set request-redirect when global-auth-request-redirect is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:237 @ 04/04/23 18:21:09.45 (10.178s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:09.45
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:09.625 (175ms)
-
-
- > Enter [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:09.625
< Exit [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:16.495 (6.87s)
> Enter [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:36 @ 04/04/23 18:21:16.495
< Exit [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:36 @ 04/04/23 18:21:20.516 (4.021s)
> Enter [It] should not use the Service Cluster IP and Port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:99 @ 04/04/23 18:21:20.516
STEP: checking if the service is reached - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:113 @ 04/04/23 18:21:37.731
STEP: checking if the Service Cluster IP and Port are not used - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:120 @ 04/04/23 18:21:37.737
< Exit [It] should not use the Service Cluster IP and Port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:99 @ 04/04/23 18:21:37.9 (17.384s)
> Enter [AfterEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:37.9
< Exit [AfterEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:38.126 (226ms)
-
-
- > Enter [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:38.126
< Exit [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:46.024 (7.897s)
> Enter [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:32 @ 04/04/23 18:21:46.024
< Exit [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:32 @ 04/04/23 18:21:50.044 (4.02s)
> Enter [It] should return status code 200 for host 'foo' and 'bar' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:62 @ 04/04/23 18:21:50.044
< Exit [It] should return status code 200 for host 'foo' and 'bar' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:62 @ 04/04/23 18:22:00.233 (10.189s)
> Enter [AfterEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:00.233
< Exit [AfterEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:00.414 (181ms)
-
-
- > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:00.414
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:07.306 (6.892s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:22:07.306
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:22:18.341 (11.035s)
> Enter [It] should not configure log-format escape by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:40 @ 04/04/23 18:22:18.341
< Exit [It] should not configure log-format escape by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:40 @ 04/04/23 18:22:21.446 (3.105s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:21.446
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:21.733 (287ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:21.733
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:39.876 (2m18.143s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:24:39.876
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:24:47.956 (8.08s)
> Enter [It] should route requests to the correct upstream if the mainline ingress is modified - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:250 @ 04/04/23 18:24:47.956
STEP: routing requests destined fro the mainline ingress to the mainline upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:288 @ 04/04/23 18:25:09.571
STEP: routing requests destined for the canary ingress to the canary upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:297 @ 04/04/23 18:25:09.578
< Exit [It] should route requests to the correct upstream if the mainline ingress is modified - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:250 @ 04/04/23 18:25:09.586 (21.629s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:09.586
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:09.787 (201ms)
-
-
- > Enter [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:09.787
< Exit [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:16.668 (6.881s)
> Enter [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:79 @ 04/04/23 18:25:16.668
< Exit [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:79 @ 04/04/23 18:25:24.696 (8.028s)
> Enter [It] should connect to the same subset of pods - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:92 @ 04/04/23 18:25:24.696
< Exit [It] should connect to the same subset of pods - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:92 @ 04/04/23 18:25:55.101 (30.405s)
> Enter [AfterEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:55.101
< Exit [AfterEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:55.343 (242ms)
-
-
- > Enter [BeforeEach] [SSL] redirect to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:55.344
< Exit [BeforeEach] [SSL] redirect to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:02.277 (6.934s)
> Enter [BeforeEach] [SSL] redirect to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/http_redirect.go:32 @ 04/04/23 18:26:02.277
< Exit [BeforeEach] [SSL] redirect to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/http_redirect.go:32 @ 04/04/23 18:26:06.299 (4.021s)
> Enter [It] should redirect from HTTP to HTTPS when secret is missing - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/http_redirect.go:36 @ 04/04/23 18:26:06.299
< Exit [It] should redirect from HTTP to HTTPS when secret is missing - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/http_redirect.go:36 @ 04/04/23 18:26:19.516 (13.217s)
> Enter [AfterEach] [SSL] redirect to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:19.516
< Exit [AfterEach] [SSL] redirect to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:19.717 (201ms)
-
-
- > Enter [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:19.718
< Exit [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:26.668 (6.951s)
> Enter [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:31 @ 04/04/23 18:26:26.668
< Exit [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:31 @ 04/04/23 18:26:30.695 (4.027s)
> Enter [It] should add global server-snippet and drop annotations per admin config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:92 @ 04/04/23 18:26:30.695
< Exit [It] should add global server-snippet and drop annotations per admin config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:92 @ 04/04/23 18:27:02.982 (32.287s)
> Enter [AfterEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:02.982
< Exit [AfterEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:03.156 (175ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:03.157
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:11.021 (7.864s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:27:11.021
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:27:15.049 (4.028s)
> Enter [It] should set cookie with expires - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:194 @ 04/04/23 18:27:15.049
< Exit [It] should set cookie with expires - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:194 @ 04/04/23 18:27:25.315 (10.266s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:25.315
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:25.546 (231ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:25.547
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:32.464 (6.917s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:27:32.464
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:27:36.484 (4.02s)
> Enter [It] should allow - matching origin with wildcard origin (2 subdomains) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:425 @ 04/04/23 18:27:36.484
< Exit [It] should allow - matching origin with wildcard origin (2 subdomains) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:425 @ 04/04/23 18:27:43.52 (7.037s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:43.52
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:43.695 (175ms)
-
-
- > Enter [BeforeEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:43.696
< Exit [BeforeEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:50.592 (6.896s)
> Enter [It] should be enabled when set to true - /go/src/k8s.io/ingress-nginx/test/e2e/settings/multi_accept.go:39 @ 04/04/23 18:27:50.592
< Exit [It] should be enabled when set to true - /go/src/k8s.io/ingress-nginx/test/e2e/settings/multi_accept.go:39 @ 04/04/23 18:28:00.821 (10.229s)
> Enter [AfterEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:00.821
< Exit [AfterEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:01.043 (221ms)
-
-
- > Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:01.043
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:08.918 (7.875s)
> Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 04/04/23 18:28:08.918
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 04/04/23 18:28:12.942 (4.024s)
> Enter [It] [BAD_ANNOTATIONS] should allow an ingress if there is a default blocklist config in place - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:102 @ 04/04/23 18:28:12.942
< Exit [It] [BAD_ANNOTATIONS] should allow an ingress if there is a default blocklist config in place - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:102 @ 04/04/23 18:28:31.293 (18.352s)
> Enter [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:31.293
< Exit [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:31.512 (218ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:31.512
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:38.394 (6.882s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:28:38.394
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:28:46.454 (8.06s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:28:46.454
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 04/04/23 18:28:46.454
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 04/04/23 18:28:56.618
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 04/04/23 18:29:06.764
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:29:16.991 (30.537s)
> Enter [It] should return status code 200 when request whitelisted (via ingress annotation) service and 401 when request protected service - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:126 @ 04/04/23 18:29:16.991
STEP: Adding an ingress rule for /bar with annotation enable-global-auth = false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:128 @ 04/04/23 18:29:16.991
STEP: Sending a request to protected service /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:140 @ 04/04/23 18:29:21.174
STEP: Sending a request to whitelisted service /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:147 @ 04/04/23 18:29:21.184
< Exit [It] should return status code 200 when request whitelisted (via ingress annotation) service and 401 when request protected service - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:126 @ 04/04/23 18:29:21.191 (4.2s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:21.191
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:21.411 (220ms)
-
-
- > Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:21.411
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:28.853 (7.441s)
> Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 04/04/23 18:29:28.853
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 04/04/23 18:29:43.082 (14.23s)
> Enter [It] handles an annotation change - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:171 @ 04/04/23 18:29:43.082
< Exit [It] handles an annotation change - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:171 @ 04/04/23 18:29:49.435 (6.352s)
> Enter [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:49.435
< Exit [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:49.619 (185ms)
-
-
- > Enter [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:49.62
< Exit [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:56.496 (6.875s)
> Enter [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:34 @ 04/04/23 18:29:56.496
< Exit [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:34 @ 04/04/23 18:30:00.515 (4.019s)
> Enter [It] should exists Server header in the response when is enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:50 @ 04/04/23 18:30:00.515
< Exit [It] should exists Server header in the response when is enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:50 @ 04/04/23 18:30:17.68 (17.166s)
> Enter [AfterEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:17.68
< Exit [AfterEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:17.86 (179ms)
-
-
- > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:17.86
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:24.767 (6.907s)
> Enter [It] works with external name set to incomplete fqdn - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:62 @ 04/04/23 18:30:24.767
< Exit [It] works with external name set to incomplete fqdn - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:62 @ 04/04/23 18:30:38.985 (14.218s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:38.985
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:39.203 (218ms)
-
-
- > Enter [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:39.204
< Exit [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:47.098 (7.895s)
> Enter [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:33 @ 04/04/23 18:30:47.098
< Exit [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:33 @ 04/04/23 18:30:51.122 (4.023s)
> Enter [It] should list the backend servers - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:37 @ 04/04/23 18:30:51.122
< Exit [It] should list the backend servers - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:37 @ 04/04/23 18:31:01.391 (10.269s)
> Enter [AfterEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:01.391
< Exit [AfterEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:01.582 (191ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:01.582
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:08.498 (6.915s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:31:08.498
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:31:16.564 (8.066s)
> Enter [It] does not crash when canary ingress has multiple paths to the same non-matching backend - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:915 @ 04/04/23 18:31:16.564
< Exit [It] does not crash when canary ingress has multiple paths to the same non-matching backend - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:915 @ 04/04/23 18:31:33.8 (17.236s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:33.8
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:34.042 (242ms)
-
-
- > Enter [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:34.042
< Exit [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:40.946 (6.904s)
> Enter [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:36 @ 04/04/23 18:31:40.946
< Exit [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:36 @ 04/04/23 18:31:44.981 (4.035s)
> Enter [It] should use the Service Cluster IP and Port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:41 @ 04/04/23 18:31:44.981
STEP: checking if the service is reached - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:53 @ 04/04/23 18:31:55.094
STEP: checking if the Service Cluster IP and Port are used - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:60 @ 04/04/23 18:31:55.098
< Exit [It] should use the Service Cluster IP and Port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:41 @ 04/04/23 18:31:55.252 (10.271s)
> Enter [AfterEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:55.252
< Exit [AfterEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:55.492 (240ms)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:55.493
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:02.366 (6.874s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:32:02.366
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:32:06.394 (4.028s)
> Enter [It] should enable modsecurity when enable-owasp-modsecurity-crs is set to true - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:225 @ 04/04/23 18:32:06.394
< Exit [It] should enable modsecurity when enable-owasp-modsecurity-crs is set to true - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:225 @ 04/04/23 18:32:35.569 (29.175s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:35.569
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:35.753 (184ms)
-
-
-
- > Enter [BeforeEach] [Security] Pod Security Policies with volumes - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:35.753
< Exit [BeforeEach] [Security] Pod Security Policies with volumes - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:42.66 (6.907s)
> Enter [It] should be running with a Pod Security Policy - /go/src/k8s.io/ingress-nginx/test/e2e/settings/pod_security_policy_volumes.go:40 @ 04/04/23 18:32:42.66
[SKIPPED] PSP not supported in this version
In [It] at: /go/src/k8s.io/ingress-nginx/test/e2e/settings/pod_security_policy_volumes.go:53 @ 04/04/23 18:32:42.661
< Exit [It] should be running with a Pod Security Policy - /go/src/k8s.io/ingress-nginx/test/e2e/settings/pod_security_policy_volumes.go:40 @ 04/04/23 18:32:42.661 (1ms)
> Enter [AfterEach] [Security] Pod Security Policies with volumes - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:42.661
< Exit [AfterEach] [Security] Pod Security Policies with volumes - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:42.858 (197ms)
-
-
- > Enter [BeforeEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:42.858
< Exit [BeforeEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:49.722 (6.864s)
> Enter [It] should respond with a custom redirect code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:61 @ 04/04/23 18:32:49.722
STEP: setting permanent-redirect-code annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:62 @ 04/04/23 18:32:49.722
STEP: sending request to redirected URL path - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:82 @ 04/04/23 18:32:59.899
< Exit [It] should respond with a custom redirect code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:61 @ 04/04/23 18:32:59.901 (10.18s)
> Enter [AfterEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:59.901
< Exit [AfterEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:00.105 (203ms)
-
-
- > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:00.105
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:07.991 (7.886s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:33:07.991
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:33:19.06 (11.069s)
> Enter [It] should set proxy-headers-hash-bucket-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:60 @ 04/04/23 18:33:19.06
< Exit [It] should set proxy-headers-hash-bucket-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:60 @ 04/04/23 18:33:29.206 (10.146s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:29.206
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:29.433 (227ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:29.433
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:36.312 (6.878s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:33:36.312
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:33:42.335 (6.023s)
> Enter [It] should allow correct origins - single origin for multiple cors values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:216 @ 04/04/23 18:33:42.335
< Exit [It] should allow correct origins - single origin for multiple cors values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:216 @ 04/04/23 18:33:49.381 (7.046s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:49.381
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:49.571 (190ms)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:49.571
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:56.527 (6.956s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:33:56.527
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:34:00.557 (4.03s)
> Enter [It] should disable default modsecurity conf setting when modsecurity-snippet is specified - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:347 @ 04/04/23 18:34:00.557
< Exit [It] should disable default modsecurity conf setting when modsecurity-snippet is specified - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:347 @ 04/04/23 18:34:22.694 (22.137s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:22.694
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:22.91 (216ms)
-
-
- > Enter [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:22.91
< Exit [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:29.807 (6.897s)
> Enter [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:42 @ 04/04/23 18:34:29.807
< Exit [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:42 @ 04/04/23 18:34:29.814 (6ms)
> Enter [It] should expose a TCP service - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:46 @ 04/04/23 18:34:29.814
< Exit [It] should expose a TCP service - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:46 @ 04/04/23 18:34:36.97 (7.156s)
> Enter [AfterEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:36.97
< Exit [AfterEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:37.169 (200ms)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:37.17
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:45.073 (7.903s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:34:45.073
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:34:49.091 (4.018s)
> Enter [It] should enable modsecurity through the config map - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:264 @ 04/04/23 18:34:49.091
< Exit [It] should enable modsecurity through the config map - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:264 @ 04/04/23 18:35:18.316 (29.225s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:18.316
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:18.518 (202ms)
-
-
- > Enter [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:18.518
< Exit [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:25.408 (6.889s)
> Enter [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:32 @ 04/04/23 18:35:25.408
< Exit [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:32 @ 04/04/23 18:35:36.46 (11.052s)
> Enter [It] reuse port should be enabled by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:38 @ 04/04/23 18:35:36.46
< Exit [It] reuse port should be enabled by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:38 @ 04/04/23 18:35:39.652 (3.192s)
> Enter [AfterEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:39.652
< Exit [AfterEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:39.91 (258ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:39.91
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:46.843 (6.933s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:35:46.843
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:35:50.861 (4.018s)
> Enter [BeforeEach] Without IngressClass Cluster scoped Permission - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:587 @ 04/04/23 18:35:50.861
< Exit [BeforeEach] Without IngressClass Cluster scoped Permission - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:587 @ 04/04/23 18:35:58.882 (8.021s)
> Enter [It] should watch Ingress with correct annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:631 @ 04/04/23 18:35:58.882
< Exit [It] should watch Ingress with correct annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:631 @ 04/04/23 18:36:09.027 (10.145s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:09.027
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:09.241 (213ms)
-
-
- > Enter [BeforeEach] [Ingress] [PathType] prefix checks - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:09.241
< Exit [BeforeEach] [Ingress] [PathType] prefix checks - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:17.143 (7.901s)
> Enter [BeforeEach] [Ingress] [PathType] prefix checks - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_prefix.go:31 @ 04/04/23 18:36:17.143
< Exit [BeforeEach] [Ingress] [PathType] prefix checks - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_prefix.go:31 @ 04/04/23 18:36:21.166 (4.023s)
> Enter [It] should return 404 when prefix /aaa does not match request /aaaccc - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_prefix.go:35 @ 04/04/23 18:36:21.166
< Exit [It] should return 404 when prefix /aaa does not match request /aaaccc - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_prefix.go:35 @ 04/04/23 18:36:31.412 (10.246s)
> Enter [AfterEach] [Ingress] [PathType] prefix checks - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:31.412
< Exit [AfterEach] [Ingress] [PathType] prefix checks - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:32.055 (644ms)
-
-
- > Enter [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:32.057
< Exit [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:39.923 (7.865s)
> Enter [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:32 @ 04/04/23 18:36:39.923
< Exit [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:32 @ 04/04/23 18:36:43.949 (4.026s)
> Enter [It] should set mirror-target to https://test.env.com/$request_uri - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:51 @ 04/04/23 18:36:43.949
< Exit [It] should set mirror-target to https://test.env.com/$request_uri - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:51 @ 04/04/23 18:36:54.141 (10.192s)
> Enter [AfterEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:54.141
< Exit [AfterEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:54.342 (200ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:54.342
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:01.212 (6.87s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:37:01.212
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:37:07.231 (6.019s)
> Enter [It] should set valid auth-tls-secret, sslVerify to off, and sslVerifyDepth to 2 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:84 @ 04/04/23 18:37:07.231
< Exit [It] should set valid auth-tls-secret, sslVerify to off, and sslVerifyDepth to 2 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:84 @ 04/04/23 18:37:17.855 (10.625s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:17.855
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:18.076 (221ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:18.076
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:25.984 (7.907s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:37:25.984
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:37:30.003 (4.019s)
> Enter [It] should work with use-regex annotation and session-cookie-path - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:270 @ 04/04/23 18:37:30.003
< Exit [It] should work with use-regex annotation and session-cookie-path - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:270 @ 04/04/23 18:37:40.203 (10.201s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:40.203
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:40.453 (250ms)
-
-
- > Enter [BeforeEach] [Setting] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:40.453
< Exit [BeforeEach] [Setting] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:47.317 (6.864s)
> Enter [It] Add ssl ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_ciphers.go:31 @ 04/04/23 18:37:47.317
< Exit [It] Add ssl ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_ciphers.go:31 @ 04/04/23 18:37:57.514 (10.197s)
> Enter [AfterEach] [Setting] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:57.514
< Exit [AfterEach] [Setting] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:57.725 (211ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:57.725
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:04.608 (6.883s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:38:04.608
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:38:08.636 (4.028s)
> Enter [It] should return status code 200 when authentication is configured and Authorization header is sent - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:172 @ 04/04/23 18:38:08.636
< Exit [It] should return status code 200 when authentication is configured and Authorization header is sent - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:172 @ 04/04/23 18:38:20.58 (11.945s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:20.58
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:20.761 (181ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:20.762
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:27.757 (6.995s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:38:27.757
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:38:31.784 (4.027s)
> Enter [It] should set proxy_redirect to hello.com goodbye.com - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:68 @ 04/04/23 18:38:31.784
< Exit [It] should set proxy_redirect to hello.com goodbye.com - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:68 @ 04/04/23 18:38:41.901 (10.118s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:41.901
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:42.108 (207ms)
-
-
- > Enter [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:42.108
< Exit [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:50.04 (7.932s)
> Enter [It] use the default configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:32 @ 04/04/23 18:38:50.04
< Exit [It] use the default configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:32 @ 04/04/23 18:38:53.238 (3.198s)
> Enter [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:53.238
< Exit [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:53.443 (205ms)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:53.443
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:00.319 (6.876s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:39:00.319
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:39:04.344 (4.026s)
> Enter [It] should not exists opentracing directive - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:58 @ 04/04/23 18:39:04.344
< Exit [It] should not exists opentracing directive - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:58 @ 04/04/23 18:39:21.438 (17.094s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:21.438
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:21.668 (229ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:39:21.668
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:39:21.668 (0s)
-
-
- > Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:21.67
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:29.901 (8.232s)
> Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 04/04/23 18:39:29.901
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 04/04/23 18:39:40.966 (11.065s)
> Enter [It] should delete Ingress updated to catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:81 @ 04/04/23 18:39:40.966
< Exit [It] should delete Ingress updated to catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:81 @ 04/04/23 18:39:55.23 (14.264s)
> Enter [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:55.23
< Exit [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:55.411 (181ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:55.412
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:03.291 (7.88s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:40:03.291
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:40:11.34 (8.049s)
> Enter [It] should route requests only to mainline if canary weight is 0 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:705 @ 04/04/23 18:40:11.34
< Exit [It] should route requests only to mainline if canary weight is 0 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:705 @ 04/04/23 18:40:31.758 (20.417s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:31.758
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:31.95 (192ms)
-
-
- > Enter [BeforeEach] single ingress - multiple hosts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:31.951
< Exit [BeforeEach] single ingress - multiple hosts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:39.859 (7.909s)
> Enter [BeforeEach] single ingress - multiple hosts - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/multiple_rules.go:33 @ 04/04/23 18:40:39.859
< Exit [BeforeEach] single ingress - multiple hosts - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/multiple_rules.go:33 @ 04/04/23 18:40:47.913 (8.054s)
> Enter [It] should set the correct $service_name NGINX variable - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/multiple_rules.go:38 @ 04/04/23 18:40:47.913
< Exit [It] should set the correct $service_name NGINX variable - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/multiple_rules.go:38 @ 04/04/23 18:41:01.214 (13.301s)
> Enter [AfterEach] single ingress - multiple hosts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:41:01.214
< Exit [AfterEach] single ingress - multiple hosts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:41:01.409 (195ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:19.256
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:27.796 (8.54s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:04:27.796
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:04:39.83 (12.034s)
> Enter [BeforeEach] With watch-ingress-without-class flag - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:462 @ 04/04/23 18:04:39.83
< Exit [BeforeEach] With watch-ingress-without-class flag - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:462 @ 04/04/23 18:04:46.871 (7.041s)
> Enter [It] should watch Ingress with no class and ignore ingress with a different class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:482 @ 04/04/23 18:04:46.871
< Exit [It] should watch Ingress with no class and ignore ingress with a different class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:482 @ 04/04/23 18:05:04.134 (17.262s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:04.134
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:04.398 (264ms)
-
-
- > Enter [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:04.398
< Exit [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:11.399 (7.001s)
> Enter [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:36 @ 04/04/23 18:05:11.399
< Exit [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:36 @ 04/04/23 18:05:15.426 (4.027s)
> Enter [It] should use the Service Cluster IP and Port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:70 @ 04/04/23 18:05:15.426
STEP: checking if the service is reached - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:82 @ 04/04/23 18:05:32.603
STEP: checking if the Service Cluster IP and Port are used - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:89 @ 04/04/23 18:05:32.612
< Exit [It] should use the Service Cluster IP and Port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:70 @ 04/04/23 18:05:32.783 (17.357s)
> Enter [AfterEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:32.783
< Exit [AfterEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:32.966 (182ms)
-
-
- > Enter [BeforeEach] [Flag] disable-service-external-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:32.966
< Exit [BeforeEach] [Flag] disable-service-external-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:40.858 (7.892s)
> Enter [BeforeEach] [Flag] disable-service-external-name - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_service_external_name.go:38 @ 04/04/23 18:05:40.858
< Exit [BeforeEach] [Flag] disable-service-external-name - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_service_external_name.go:38 @ 04/04/23 18:05:52.924 (12.066s)
> Enter [It] should ignore services of external-name type - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_service_external_name.go:52 @ 04/04/23 18:05:52.924
< Exit [It] should ignore services of external-name type - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_service_external_name.go:52 @ 04/04/23 18:06:13.273 (20.349s)
> Enter [AfterEach] [Flag] disable-service-external-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:13.273
< Exit [AfterEach] [Flag] disable-service-external-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:13.49 (217ms)
-
-
- > Enter [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:13.49
< Exit [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:20.419 (6.929s)
> Enter [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:38 @ 04/04/23 18:06:20.419
< Exit [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:38 @ 04/04/23 18:06:24.447 (4.029s)
> Enter [It] should configure satisfy directive correctly - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:42 @ 04/04/23 18:06:24.447
< Exit [It] should configure satisfy directive correctly - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:42 @ 04/04/23 18:06:41.792 (17.345s)
> Enter [AfterEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:41.792
< Exit [AfterEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:41.98 (187ms)
-
-
- > Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:41.98
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:49.854 (7.874s)
> Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:06:49.854
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:07:00.907 (11.052s)
> Enter [It] should set keep alive connection timeout to upstream server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:68 @ 04/04/23 18:07:00.907
< Exit [It] should set keep alive connection timeout to upstream server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:68 @ 04/04/23 18:07:11.072 (10.166s)
> Enter [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:11.073
< Exit [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:11.276 (203ms)
-
-
- > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:11.277
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:19.172 (7.895s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:07:19.172
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:07:28.212 (9.04s)
> Enter [It] should set vmap-hash-bucket-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:100 @ 04/04/23 18:07:28.212
< Exit [It] should set vmap-hash-bucket-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:100 @ 04/04/23 18:07:38.38 (10.168s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:38.38
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:38.612 (232ms)
-
-
- > Enter [BeforeEach] [Setting] [Load Balancer] load-balance - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:38.613
< Exit [BeforeEach] [Setting] [Load Balancer] load-balance - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:45.664 (7.051s)
> Enter [BeforeEach] [Setting] [Load Balancer] load-balance - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/configmap.go:31 @ 04/04/23 18:07:45.664
< Exit [BeforeEach] [Setting] [Load Balancer] load-balance - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/configmap.go:31 @ 04/04/23 18:07:49.689 (4.025s)
> Enter [It] should apply the configmap load-balance setting - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/configmap.go:35 @ 04/04/23 18:07:49.689
< Exit [It] should apply the configmap load-balance setting - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/configmap.go:35 @ 04/04/23 18:08:07.048 (17.358s)
> Enter [AfterEach] [Setting] [Load Balancer] load-balance - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:07.048
< Exit [AfterEach] [Setting] [Load Balancer] load-balance - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:07.227 (180ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:07.228
< Exit [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:25.86 (2m18.633s)
> Enter [It] authorization metadata should be overwritten by external auth response headers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:126 @ 04/04/23 18:10:25.86
< Exit [It] authorization metadata should be overwritten by external auth response headers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:126 @ 04/04/23 18:10:44.166 (18.305s)
> Enter [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:44.166
< Exit [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:44.384 (218ms)
-
-
- > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:44.385
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:51.27 (6.885s)
> Enter [It] should update the external name after a service update - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:248 @ 04/04/23 18:10:51.27
STEP: checking the service is updated to use eu.httpbin.org - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:304 @ 04/04/23 18:11:06.958
< Exit [It] should update the external name after a service update - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:248 @ 04/04/23 18:11:07.097 (15.827s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:07.097
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:07.302 (205ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:07.302
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:15.212 (7.91s)
> Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 04/04/23 18:11:15.212
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 04/04/23 18:11:19.237 (4.025s)
> Enter [It] should set valid proxy-ssl-secret, proxy-ssl-verify to on, proxy-ssl-verify-depth to 2, and proxy-ssl-server-name to on - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:64 @ 04/04/23 18:11:19.237
< Exit [It] should set valid proxy-ssl-secret, proxy-ssl-verify to on, proxy-ssl-verify-depth to 2, and proxy-ssl-server-name to on - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:64 @ 04/04/23 18:11:30.15 (10.913s)
> Enter [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:30.15
< Exit [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:30.361 (211ms)
-
-
- > Enter [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:30.361
< Exit [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:37.259 (6.898s)
> Enter [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:30 @ 04/04/23 18:11:37.259
< Exit [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:30 @ 04/04/23 18:11:39.287 (2.028s)
> Enter [It] set rewrite_log on - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:49 @ 04/04/23 18:11:39.287
< Exit [It] set rewrite_log on - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:49 @ 04/04/23 18:11:49.482 (10.195s)
> Enter [AfterEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:49.482
< Exit [AfterEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:49.703 (222ms)
-
-
- > Enter [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:49.704
< Exit [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:56.672 (6.968s)
> Enter [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:32 @ 04/04/23 18:11:56.672
< Exit [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:32 @ 04/04/23 18:12:07.713 (11.041s)
> Enter [It] reuse port should be enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:52 @ 04/04/23 18:12:07.713
< Exit [It] reuse port should be enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:52 @ 04/04/23 18:12:17.909 (10.196s)
> Enter [AfterEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:17.909
< Exit [AfterEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:18.149 (239ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:18.149
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:26.102 (7.953s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:12:26.102
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:12:34.143 (8.041s)
> Enter [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:604 @ 04/04/23 18:12:34.143
STEP: routing requests to the canary upstream when header value does not match and cookie is set to 'always' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:630 @ 04/04/23 18:12:51.301
< Exit [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:604 @ 04/04/23 18:12:51.309 (17.166s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:51.309
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:51.494 (185ms)
-
-
- > Enter [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:51.494
< Exit [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:58.391 (6.897s)
> Enter [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:31 @ 04/04/23 18:12:58.391
< Exit [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:31 @ 04/04/23 18:13:02.411 (4.02s)
> Enter [It] drops server snippet if disabled by the administrator - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:61 @ 04/04/23 18:13:02.411
< Exit [It] drops server snippet if disabled by the administrator - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:61 @ 04/04/23 18:13:31.674 (29.262s)
> Enter [AfterEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:31.674
< Exit [AfterEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:31.873 (199ms)
-
-
- > Enter [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:31.874
< Exit [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:38.753 (6.879s)
> Enter [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:67 @ 04/04/23 18:13:38.753
< Exit [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:67 @ 04/04/23 18:13:48.95 (10.197s)
> Enter [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:48.95
< Exit [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:49.177 (226ms)
-
-
-
- > Enter [BeforeEach] [Security] Pod Security Policies - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:49.177
< Exit [BeforeEach] [Security] Pod Security Policies - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:57.081 (7.904s)
> Enter [It] should be running with a Pod Security Policy - /go/src/k8s.io/ingress-nginx/test/e2e/settings/pod_security_policy.go:44 @ 04/04/23 18:13:57.081
[SKIPPED] PSP not supported in this version
In [It] at: /go/src/k8s.io/ingress-nginx/test/e2e/settings/pod_security_policy.go:56 @ 04/04/23 18:13:57.084
< Exit [It] should be running with a Pod Security Policy - /go/src/k8s.io/ingress-nginx/test/e2e/settings/pod_security_policy.go:44 @ 04/04/23 18:13:57.084 (2ms)
> Enter [AfterEach] [Security] Pod Security Policies - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:57.084
< Exit [AfterEach] [Security] Pod Security Policies - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:57.316 (232ms)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:57.316
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:04.203 (6.887s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:14:04.203
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:14:08.231 (4.028s)
> Enter [It] should enable modsecurity with snippet and block requests - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:153 @ 04/04/23 18:14:08.231
< Exit [It] should enable modsecurity with snippet and block requests - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:153 @ 04/04/23 18:14:30.484 (22.253s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:30.484
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:30.708 (223ms)
-
-
- > Enter [BeforeEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:30.708
< Exit [BeforeEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:37.628 (6.92s)
> Enter [It] should not create sync events - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_sync_events.go:80 @ 04/04/23 18:14:37.628
< Exit [It] should not create sync events - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_sync_events.go:80 @ 04/04/23 18:15:00.832 (23.203s)
> Enter [AfterEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:00.832
< Exit [AfterEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:01.031 (199ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:01.031
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:07.953 (6.922s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:15:07.953
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:15:11.978 (4.025s)
> Enter [It] should validate auth-tls-verify-client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:206 @ 04/04/23 18:15:11.978
< Exit [It] should validate auth-tls-verify-client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:206 @ 04/04/23 18:15:26.888 (14.91s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:26.888
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:27.083 (195ms)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:27.083
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:34.978 (7.895s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:15:34.978
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:15:39.01 (4.032s)
> Enter [It] should enable opentracing using zipkin - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:160 @ 04/04/23 18:15:39.01
< Exit [It] should enable opentracing using zipkin - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:160 @ 04/04/23 18:15:59.042 (20.032s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:59.042
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:59.301 (259ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:15:59.301
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:15:59.301 (0s)
-
-
- > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:59.302
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:06.324 (7.022s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:16:06.324
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:16:10.352 (4.028s)
> Enter [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 04/04/23 18:16:10.352
STEP: configuring certificate_by_lua and skipping Nginx configuration of the new certificate - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:128 @ 04/04/23 18:16:28.235
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:136 @ 04/04/23 18:16:36.64
< Exit [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 04/04/23 18:16:36.649 (26.297s)
> Enter [It] picks up a non-certificate only change - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:218 @ 04/04/23 18:16:36.649
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:229 @ 04/04/23 18:16:41.653
< Exit [It] picks up a non-certificate only change - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:218 @ 04/04/23 18:16:41.686 (5.038s)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:41.686
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:41.905 (219ms)
-
-
- > Enter [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:41.905
< Exit [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:48.792 (6.887s)
> Enter [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:35 @ 04/04/23 18:16:48.792
< Exit [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:35 @ 04/04/23 18:16:59.851 (11.059s)
> Enter [It] should not trust X-Forwarded-For header when setting is false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:78 @ 04/04/23 18:16:59.851
< Exit [It] should not trust X-Forwarded-For header when setting is false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:78 @ 04/04/23 18:17:17.088 (17.237s)
> Enter [AfterEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:17.088
< Exit [AfterEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:17.268 (179ms)
-
-
- > Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:17.268
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:25.143 (7.875s)
> Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 04/04/23 18:17:25.143
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 04/04/23 18:17:39.338 (14.195s)
> Enter [It] configures balancer Lua middleware correctly - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:50 @ 04/04/23 18:17:39.338
< Exit [It] configures balancer Lua middleware correctly - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:50 @ 04/04/23 18:17:45.709 (6.371s)
> Enter [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:45.709
< Exit [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:45.895 (186ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:45.896
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:52.77 (6.874s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:17:52.77
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:18:00.824 (8.054s)
> Enter [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:301 @ 04/04/23 18:18:00.824
< Exit [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:301 @ 04/04/23 18:18:29.039 (28.216s)
> Enter [It] user does not retain cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:337 @ 04/04/23 18:18:29.039
< Exit [It] user does not retain cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:337 @ 04/04/23 18:18:29.048 (9ms)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:29.048
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:29.27 (222ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:29.27
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:36.638 (7.367s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:18:36.638
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:18:40.656 (4.018s)
> Enter [It] should allow - single origin with required port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:358 @ 04/04/23 18:18:40.656
< Exit [It] should allow - single origin with required port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:358 @ 04/04/23 18:18:47.695 (7.04s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:47.695
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:47.919 (224ms)
-
-
- > Enter [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:47.919
< Exit [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:54.793 (6.873s)
> Enter [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:31 @ 04/04/23 18:18:54.793
< Exit [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:31 @ 04/04/23 18:18:58.818 (4.026s)
> Enter [It] drops snippet "more_set_headers "Foo1: Bar1";" in all locations if disabled by admin" - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:58 @ 04/04/23 18:18:58.818
< Exit [It] drops snippet "more_set_headers "Foo1: Bar1";" in all locations if disabled by admin" - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:58 @ 04/04/23 18:19:28.082 (29.263s)
> Enter [AfterEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:28.082
< Exit [AfterEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:28.561 (479ms)
-
-
- > Enter [BeforeEach] [Annotations] upstream-vhost - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:28.561
< Exit [BeforeEach] [Annotations] upstream-vhost - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:36.485 (7.924s)
> Enter [BeforeEach] [Annotations] upstream-vhost - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamvhost.go:30 @ 04/04/23 18:19:36.485
< Exit [BeforeEach] [Annotations] upstream-vhost - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamvhost.go:30 @ 04/04/23 18:19:40.514 (4.029s)
> Enter [It] set host to upstreamvhost.bar.com - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamvhost.go:34 @ 04/04/23 18:19:40.514
< Exit [It] set host to upstreamvhost.bar.com - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamvhost.go:34 @ 04/04/23 18:19:50.715 (10.201s)
> Enter [AfterEach] [Annotations] upstream-vhost - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:50.715
< Exit [AfterEach] [Annotations] upstream-vhost - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:50.928 (213ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:50.928
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:59.376 (8.447s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:19:59.376
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:20:03.412 (4.036s)
> Enter [It] should turn on proxy-buffering - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:157 @ 04/04/23 18:20:03.412
< Exit [It] should turn on proxy-buffering - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:157 @ 04/04/23 18:20:13.859 (10.448s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:13.859
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:15.468 (1.608s)
-
-
- > Enter [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:15.468
< Exit [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:32.896 (2m17.428s)
> Enter [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:42 @ 04/04/23 18:22:32.896
< Exit [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:42 @ 04/04/23 18:22:32.905 (9ms)
> Enter [It] should reload after an update in the configuration - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:169 @ 04/04/23 18:22:32.905
STEP: setting up a first deployment - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:171 @ 04/04/23 18:22:32.905
STEP: updating the tcp service to a second deployment - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:196 @ 04/04/23 18:22:40.099
< Exit [It] should reload after an update in the configuration - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:169 @ 04/04/23 18:22:50.31 (17.405s)
> Enter [AfterEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:50.31
< Exit [AfterEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:50.534 (224ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:50.534
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:57.402 (6.868s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:22:57.402
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:23:01.417 (4.015s)
> Enter [It] should not break functionality - without `*` - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:291 @ 04/04/23 18:23:01.417
< Exit [It] should not break functionality - without `*` - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:291 @ 04/04/23 18:23:08.429 (7.012s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:08.429
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:08.611 (182ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:08.611
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:15.499 (6.888s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:23:15.499
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:23:19.526 (4.026s)
> Enter [It] should set secure in cookie with provided false annotation on https - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:458 @ 04/04/23 18:23:19.526
< Exit [It] should set secure in cookie with provided false annotation on https - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:458 @ 04/04/23 18:23:29.716 (10.19s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:29.716
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:29.948 (233ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:29.949
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:36.837 (6.888s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:23:36.837
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:23:40.864 (4.027s)
> Enter [It] should return status code 401 when authentication is configured and Authorization header is sent with invalid credentials - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:116 @ 04/04/23 18:23:40.864
< Exit [It] should return status code 401 when authentication is configured and Authorization header is sent with invalid credentials - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:116 @ 04/04/23 18:23:51.976 (11.112s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:51.976
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:52.182 (206ms)
-
-
- > Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:52.183
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:00.596 (8.414s)
> Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 04/04/23 18:24:00.596
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 04/04/23 18:24:04.625 (4.028s)
> Enter [It] should exists opentelemetry_operation_name directive when is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:104 @ 04/04/23 18:24:04.625
< Exit [It] should exists opentelemetry_operation_name directive when is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:104 @ 04/04/23 18:24:21.864 (17.239s)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:21.864
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:22.288 (424ms)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 04/04/23 18:24:22.288
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 04/04/23 18:24:22.288 (0s)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:22.289
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:30.179 (7.89s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:24:30.179
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:24:32.201 (2.022s)
> Enter [It] should set cache_key when external auth cache is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:322 @ 04/04/23 18:24:32.201
< Exit [It] should set cache_key when external auth cache is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:322 @ 04/04/23 18:24:42.391 (10.19s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:42.391
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:42.559 (169ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:42.559
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:49.462 (6.902s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:24:49.462
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:24:55.483 (6.021s)
> Enter [It] should work with server-alias annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:372 @ 04/04/23 18:24:55.483
< Exit [It] should work with server-alias annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:372 @ 04/04/23 18:25:05.677 (10.194s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:05.677
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:05.892 (215ms)
-
-
- > Enter [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:05.892
< Exit [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:12.767 (6.875s)
> Enter [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:54 @ 04/04/23 18:25:12.767
< Exit [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:54 @ 04/04/23 18:25:22.853 (10.086s)
> Enter [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:22.853
< Exit [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:23.038 (186ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:23.039
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:30.928 (7.889s)
> Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:25:30.928
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:25:34.955 (4.027s)
> Enter [It] should set backend protocol to $scheme:// and use proxy_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:49 @ 04/04/23 18:25:34.955
< Exit [It] should set backend protocol to $scheme:// and use proxy_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:49 @ 04/04/23 18:25:45.122 (10.167s)
> Enter [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:45.122
< Exit [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:45.378 (256ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:45.378
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:52.259 (6.88s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:25:52.259
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:25:56.284 (4.026s)
> Enter [BeforeEach] With ingress-class-by-name flag - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:518 @ 04/04/23 18:25:56.284
< Exit [BeforeEach] With ingress-class-by-name flag - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:518 @ 04/04/23 18:26:05.326 (9.041s)
> Enter [It] should watch Ingress that uses the class name even if spec is different - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:539 @ 04/04/23 18:26:05.326
< Exit [It] should watch Ingress that uses the class name even if spec is different - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:539 @ 04/04/23 18:26:29.579 (24.254s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:29.579
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:29.795 (215ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:29.795
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:36.671 (6.876s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:26:36.671
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:26:40.694 (4.023s)
> Enter [It] should not match - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:338 @ 04/04/23 18:26:40.694
< Exit [It] should not match - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:338 @ 04/04/23 18:26:47.715 (7.021s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:47.715
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:47.897 (182ms)
-
-
- > Enter [BeforeEach] [Setting] Configmap change - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:47.898
< Exit [BeforeEach] [Setting] Configmap change - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:54.79 (6.892s)
> Enter [BeforeEach] [Setting] Configmap change - /go/src/k8s.io/ingress-nginx/test/e2e/settings/configmap_change.go:32 @ 04/04/23 18:26:54.79
< Exit [BeforeEach] [Setting] Configmap change - /go/src/k8s.io/ingress-nginx/test/e2e/settings/configmap_change.go:32 @ 04/04/23 18:26:58.813 (4.023s)
> Enter [It] should reload after an update in the configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/configmap_change.go:36 @ 04/04/23 18:26:58.813
STEP: adding a whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/settings/configmap_change.go:42 @ 04/04/23 18:27:05.828
STEP: changing error-log-level - /go/src/k8s.io/ingress-nginx/test/e2e/settings/configmap_change.go:61 @ 04/04/23 18:27:16.071
< Exit [It] should reload after an update in the configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/configmap_change.go:36 @ 04/04/23 18:27:29.359 (30.546s)
> Enter [AfterEach] [Setting] Configmap change - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:29.359
< Exit [AfterEach] [Setting] Configmap change - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:29.558 (198ms)
-
-
- > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:29.558
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:36.431 (6.873s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:27:36.431
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:27:47.466 (11.035s)
> Enter [It] should set variables-hash-bucket-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:80 @ 04/04/23 18:27:47.466
< Exit [It] should set variables-hash-bucket-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:80 @ 04/04/23 18:27:57.638 (10.172s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:57.638
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:57.835 (197ms)
-
-
- > Enter [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:57.835
< Exit [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:04.708 (6.873s)
> Enter [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:40 @ 04/04/23 18:28:04.708
< Exit [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:40 @ 04/04/23 18:28:20.208 (15.5s)
> Enter [It] uses default ssl certificate for catch-all ingress - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:64 @ 04/04/23 18:28:20.208
STEP: making sure new ingress is deployed - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:68 @ 04/04/23 18:28:27.228
STEP: making sure new ingress is responding - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:74 @ 04/04/23 18:28:30.423
STEP: making sure the configured default ssl certificate is being used - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:76 @ 04/04/23 18:28:30.423
< Exit [It] uses default ssl certificate for catch-all ingress - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:64 @ 04/04/23 18:28:32.435 (12.227s)
> Enter [AfterEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:32.435
< Exit [AfterEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:32.615 (181ms)
-
-
- > Enter [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:32.616
< Exit [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:39.497 (6.882s)
> Enter [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:42 @ 04/04/23 18:28:39.497
< Exit [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:42 @ 04/04/23 18:28:49.668 (10.171s)
> Enter [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:49.669
< Exit [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:49.884 (215ms)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:49.884
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:56.783 (6.899s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:28:56.783
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:29:00.81 (4.027s)
> Enter [It] should enable modsecurity - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:35 @ 04/04/23 18:29:00.81
< Exit [It] should enable modsecurity - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:35 @ 04/04/23 18:29:10.998 (10.189s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:10.998
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:11.21 (212ms)
-
-
- > Enter [BeforeEach] [Shutdown] Grace period shutdown - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:11.211
< Exit [BeforeEach] [Shutdown] Grace period shutdown - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:19.1 (7.89s)
> Enter [It] /healthz should return status code 500 during shutdown grace period - /go/src/k8s.io/ingress-nginx/test/e2e/gracefulshutdown/grace_period.go:35 @ 04/04/23 18:29:19.1
< Exit [It] /healthz should return status code 500 during shutdown grace period - /go/src/k8s.io/ingress-nginx/test/e2e/gracefulshutdown/grace_period.go:35 @ 04/04/23 18:30:30.168 (1m11.068s)
> Enter [AfterEach] [Shutdown] Grace period shutdown - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:30.168
< Exit [AfterEach] [Shutdown] Grace period shutdown - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:30.345 (177ms)
-
-
- > Enter [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:30.345
< Exit [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:37.278 (6.932s)
> Enter [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:32 @ 04/04/23 18:30:37.278
< Exit [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:32 @ 04/04/23 18:30:41.303 (4.025s)
> Enter [It] should return status code 200 for host 'foo' and 404 for 'bar' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:36 @ 04/04/23 18:30:41.303
< Exit [It] should return status code 200 for host 'foo' and 404 for 'bar' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:36 @ 04/04/23 18:30:51.481 (10.178s)
> Enter [AfterEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:51.481
< Exit [AfterEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:51.683 (202ms)
-
-
- > Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:51.684
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:58.618 (6.934s)
> Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 04/04/23 18:30:58.618
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 04/04/23 18:31:09.663 (11.045s)
> Enter [It] should enable PROXY Protocol for TCP - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:155 @ 04/04/23 18:31:09.663
Automatically polling progress:
[Setting] use-proxy-protocol should enable PROXY Protocol for TCP (Spec Runtime: 3m17.98s)
/go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:155
In [It] (Node Runtime: 3m0.001s)
/go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:155
Spec Goroutine
goroutine 2932 [IO wait, 3 minutes]
internal/poll.runtime_pollWait(0x7f9e883a91b8, 0x72)
/usr/local/go/src/runtime/netpoll.go:306
internal/poll.(*pollDesc).wait(0xc0000de300?, 0xc00098a926?, 0x0)
/usr/local/go/src/internal/poll/fd_poll_runtime.go:84
internal/poll.(*pollDesc).waitRead(...)
/usr/local/go/src/internal/poll/fd_poll_runtime.go:89
internal/poll.(*FD).Read(0xc0000de300, {0xc00098a926, 0x15a, 0x15a})
/usr/local/go/src/internal/poll/fd_unix.go:167
net.(*netFD).Read(0xc0000de300, {0xc00098a926?, 0x453656?, 0x380?})
/usr/local/go/src/net/fd_posix.go:55
net.(*conn).Read(0xc000516660, {0xc00098a926?, 0x19913c0?, 0xc00098a700?})
/usr/local/go/src/net/net.go:183
io.ReadAll({0x1f62de0, 0xc000516660})
/usr/local/go/src/io/io.go:701
> k8s.io/ingress-nginx/test/e2e/settings.glob..func38.5()
/go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:211
github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func3({0xa0558e, 0xc000300a80})
/go/src/k8s.io/ingress-nginx/.modcache/github.com/onsi/ginkgo/v2@v2.9.0/internal/node.go:463
github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3()
/go/src/k8s.io/ingress-nginx/.modcache/github.com/onsi/ginkgo/v2@v2.9.0/internal/suite.go:863
github.com/onsi/ginkgo/v2/internal.(*Suite).runNode
/go/src/k8s.io/ingress-nginx/.modcache/github.com/onsi/ginkgo/v2@v2.9.0/internal/suite.go:850
< Exit [It] should enable PROXY Protocol for TCP - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:155 @ 04/04/23 18:41:24.726 (10m15.064s)
> Enter [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:41:24.726
< Exit [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:41:24.943 (217ms)
-
-
-
\ No newline at end of file
From ad1fb03f002d6378a9293e08c2c9163030f9287c Mon Sep 17 00:00:00 2001
From: Nicholas Orlowsky
Date: Thu, 11 May 2023 21:06:52 -0400
Subject: [PATCH 017/283] remove linux tag
---
Makefile | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Makefile b/Makefile
index 357ef9827..6037ac39d 100644
--- a/Makefile
+++ b/Makefile
@@ -167,7 +167,7 @@ kind-e2e-chart-tests: ## Run helm chart e2e tests
e2e-test-binary: ## Build binary for e2e tests.
@build/run-in-docker.sh \
MAC_OS=$(MAC_OS) \
- ginkgo build ./test/e2e -tags linux
+ ginkgo build ./test/e2e
.PHONY: print-e2e-suite
print-e2e-suite: e2e-test-binary ## Prints information about the suite of e2e tests.
From fddf4e034c0d766a4815247b414cbd71a1869456 Mon Sep 17 00:00:00 2001
From: Nicholas Orlowsky
Date: Wed, 31 May 2023 23:17:50 -0500
Subject: [PATCH 018/283] fix formatting
---
pkg/util/runtime/cpu_notlinux.go | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/pkg/util/runtime/cpu_notlinux.go b/pkg/util/runtime/cpu_notlinux.go
index 0441af957..2a1b48252 100644
--- a/pkg/util/runtime/cpu_notlinux.go
+++ b/pkg/util/runtime/cpu_notlinux.go
@@ -26,4 +26,4 @@ import (
// NumCPU ...
func NumCPU() int {
return runtime.NumCPU()
-}
\ No newline at end of file
+}
From a9f9793a1fbe269660c70ef9ea33c03f541cc689 Mon Sep 17 00:00:00 2001
From: Nicholas Orlowsky
Date: Sun, 16 Jul 2023 13:18:32 -0400
Subject: [PATCH 019/283] update default value for period when not set
---
pkg/util/runtime/cpu_linux.go | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/pkg/util/runtime/cpu_linux.go b/pkg/util/runtime/cpu_linux.go
index c72f47f01..dc24a1ad7 100644
--- a/pkg/util/runtime/cpu_linux.go
+++ b/pkg/util/runtime/cpu_linux.go
@@ -93,7 +93,7 @@ func readCgroup2FileToInt64Tuple(cgroupFile string) (int64, int64) {
}
if len(values) == 1 {
- return cpuQuota, 1
+ return cpuQuota, 100000
}
cpuPeriod, err := strconv.ParseInt(values[1], 10, 64)
From 3814e1f01fbfebe4c8c9f88e57cd424a56578537 Mon Sep 17 00:00:00 2001
From: Nicholas Orlowsky
Date: Sun, 16 Jul 2023 18:58:58 -0400
Subject: [PATCH 020/283] write e2e tests for cgroups
---
pkg/util/runtime/cpu_linux.go | 4 +-
test/e2e/cgroups/cgroups_linux.go | 78 +-
test/e2e/e2e.go | 41 +-
test/junitreports/report-e2e-test-suite.xml | 1294 +------------------
4 files changed, 92 insertions(+), 1325 deletions(-)
diff --git a/pkg/util/runtime/cpu_linux.go b/pkg/util/runtime/cpu_linux.go
index e5e8db40a..e2eff9fec 100644
--- a/pkg/util/runtime/cpu_linux.go
+++ b/pkg/util/runtime/cpu_linux.go
@@ -38,7 +38,7 @@ import (
func NumCPU() int {
cpus := runtime.NumCPU()
- cgroupVersion := getCgroupVersion()
+ cgroupVersion := GetCgroupVersion()
cpuQuota := int64(-1)
cpuPeriod := int64(-1)
@@ -64,7 +64,7 @@ func IsCgroupAvaliable() bool {
return true
}
-func getCgroupVersion() int64 {
+func GetCgroupVersion() int64 {
// /sys/fs/cgroup/cgroup.controllers will not exist with cgroupsv1
if _, err := os.Stat("/sys/fs/cgroup/cgroup.controllers"); err == nil {
return 2
diff --git a/test/e2e/cgroups/cgroups_linux.go b/test/e2e/cgroups/cgroups_linux.go
index 18b3f837b..b27346dc3 100644
--- a/test/e2e/cgroups/cgroups_linux.go
+++ b/test/e2e/cgroups/cgroups_linux.go
@@ -28,7 +28,10 @@ import (
"k8s.io/ingress-nginx/test/e2e/framework"
+ "path/filepath"
"k8s.io/ingress-nginx/pkg/util/runtime"
+
+ libcontainercgroups "github.com/opencontainers/runc/libcontainer/cgroups"
)
var _ = framework.IngressNginxDescribeSerial("[CGroups] cgroups", func() {
@@ -40,26 +43,75 @@ var _ = framework.IngressNginxDescribeSerial("[CGroups] cgroups", func() {
})
ginkgo.It("detects if cgroups is avaliable", func() {
- assert.Equal(ginkgo.GinkgoT(), runtime.IsCgroupAvaliable(), 1)
+ assert.True(ginkgo.GinkgoT(), runtime.IsCgroupAvaliable())
})
ginkgo.It("detects cgroups version v1", func() {
- assert.Equal(ginkgo.GinkgoT(), runtime.readCgroupFileToInt64(), 1)
- })
-
- ginkgo.It("detects number of CPUs properly in cgroups v1", func() {
- assert.Equal(ginkgo.GinkgoT(), runtime.NumCPU(), -1)
- })
-
- ginkgo.It("detects cgroups version v2", func() {
- // create cgroups2 files
- if err := os.MkdirAll("a/b/c/d", os.ModePerm); err != nil {
+ cgroupPath, err := libcontainercgroups.FindCgroupMountpoint("", "cpu")
+ if err != nil {
log.Fatal(err)
}
+ quotaFile, err := os.Create(filepath.Join(cgroupPath,"cpu.cfs_quota_us"))
+
+ if err != nil {
+ log.Fatal(err)
+ }
+
+ periodFile, err := os.Create(filepath.Join(cgroupPath,"cpu.cfs_period_us"))
+
+ if err != nil {
+ log.Fatal(err)
+ }
+
+ quotaFile.WriteString("4");
+ quotaFile.Sync();
+
+ periodFile.WriteString("2");
+ periodFile.Sync();
+
+ assert.Equal(ginkgo.GinkgoT(), runtime.GetCgroupVersion(), int64(1))
+ assert.Equal(ginkgo.GinkgoT(), runtime.NumCPU(), 2)
+
+ os.Remove(filepath.Join(cgroupPath,"cpu.cfs_quota_us"))
+ os.Remove(filepath.Join(cgroupPath,"cpu.cfs_period_us"))
})
- ginkgo.It("detects number of CPUs properly in cgroups v2", func() {
- assert.Equal(ginkgo.GinkgoT(), runtime.NumCPU(), -1)
+ ginkgo.It("detect cgroups version v2", func() {
+ if err := os.MkdirAll("/sys/fs/cgroup/", os.ModePerm); err != nil {
+ log.Fatal(err)
+ }
+
+ os.Create("/sys/fs/cgroup/cgroup.controllers")
+ file, err := os.Create("/sys/fs/cgroup/cpu.max")
+
+ if err != nil {
+ log.Fatal(err)
+ }
+
+ file.WriteString("4 2");
+ file.Sync();
+
+ assert.Equal(ginkgo.GinkgoT(), runtime.GetCgroupVersion(), int64(2))
+ assert.Equal(ginkgo.GinkgoT(), runtime.NumCPU(), 2)
+
+ os.Remove("/sys/fs/cgroup/cpu.max")
+ os.Remove("/sys/fs/cgroup/cgroup.controllers")
})
+
+ // ginkgo.It("detects number of CPUs properly in cgroups v1", func() {
+ // assert.Equal(ginkgo.GinkgoT(), runtime.NumCPU(), -1)
+ // })
+
+ // ginkgo.It("detects cgroups version v2", func() {
+ // // create cgroups2 files
+ // if err := os.MkdirAll("a/b/c/d", os.ModePerm); err != nil {
+ // log.Fatal(err)
+ // }
+
+ // })
+
+ // ginkgo.It("detects number of CPUs properly in cgroups v2", func() {
+ // assert.Equal(ginkgo.GinkgoT(), runtime.NumCPU(), -1)
+ // })
})
diff --git a/test/e2e/e2e.go b/test/e2e/e2e.go
index a671e8793..57b047230 100644
--- a/test/e2e/e2e.go
+++ b/test/e2e/e2e.go
@@ -29,27 +29,26 @@ import (
"k8s.io/ingress-nginx/test/e2e/framework"
// tests to run
- // _ "k8s.io/ingress-nginx/test/e2e/admission"
- // _ "k8s.io/ingress-nginx/test/e2e/annotations"
- // _ "k8s.io/ingress-nginx/test/e2e/annotations/modsecurity"
- _ "k8s.io/ingress-nginx/test/e2e/cgroups"
- // _ "k8s.io/ingress-nginx/test/e2e/dbg"
- // _ "k8s.io/ingress-nginx/test/e2e/defaultbackend"
- // _ "k8s.io/ingress-nginx/test/e2e/endpointslices"
- // _ "k8s.io/ingress-nginx/test/e2e/gracefulshutdown"
- // _ "k8s.io/ingress-nginx/test/e2e/ingress"
- // _ "k8s.io/ingress-nginx/test/e2e/leaks"
- // _ "k8s.io/ingress-nginx/test/e2e/loadbalance"
- // _ "k8s.io/ingress-nginx/test/e2e/lua"
- // _ "k8s.io/ingress-nginx/test/e2e/nginx"
- // _ "k8s.io/ingress-nginx/test/e2e/security"
- // _ "k8s.io/ingress-nginx/test/e2e/servicebackend"
- // _ "k8s.io/ingress-nginx/test/e2e/settings"
- // _ "k8s.io/ingress-nginx/test/e2e/settings/modsecurity"
- // _ "k8s.io/ingress-nginx/test/e2e/settings/ocsp"
- // _ "k8s.io/ingress-nginx/test/e2e/ssl"
- // _ "k8s.io/ingress-nginx/test/e2e/status"
- // _ "k8s.io/ingress-nginx/test/e2e/tcpudp"
+ _ "k8s.io/ingress-nginx/test/e2e/admission"
+ _ "k8s.io/ingress-nginx/test/e2e/annotations"
+ _ "k8s.io/ingress-nginx/test/e2e/annotations/modsecurity"
+ _ "k8s.io/ingress-nginx/test/e2e/dbg"
+ _ "k8s.io/ingress-nginx/test/e2e/defaultbackend"
+ _ "k8s.io/ingress-nginx/test/e2e/endpointslices"
+ _ "k8s.io/ingress-nginx/test/e2e/gracefulshutdown"
+ _ "k8s.io/ingress-nginx/test/e2e/ingress"
+ _ "k8s.io/ingress-nginx/test/e2e/leaks"
+ _ "k8s.io/ingress-nginx/test/e2e/loadbalance"
+ _ "k8s.io/ingress-nginx/test/e2e/lua"
+ _ "k8s.io/ingress-nginx/test/e2e/nginx"
+ _ "k8s.io/ingress-nginx/test/e2e/security"
+ _ "k8s.io/ingress-nginx/test/e2e/servicebackend"
+ _ "k8s.io/ingress-nginx/test/e2e/settings"
+ _ "k8s.io/ingress-nginx/test/e2e/settings/modsecurity"
+ _ "k8s.io/ingress-nginx/test/e2e/settings/ocsp"
+ _ "k8s.io/ingress-nginx/test/e2e/ssl"
+ _ "k8s.io/ingress-nginx/test/e2e/status"
+ _ "k8s.io/ingress-nginx/test/e2e/tcpudp"
)
// RunE2ETests checks configuration parameters (specified through flags) and then runs
diff --git a/test/junitreports/report-e2e-test-suite.xml b/test/junitreports/report-e2e-test-suite.xml
index fc919bad2..e48076b5a 100644
--- a/test/junitreports/report-e2e-test-suite.xml
+++ b/test/junitreports/report-e2e-test-suite.xml
@@ -1,12 +1,12 @@
-
-
+
+
-
+
@@ -20,1292 +20,8 @@
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:19.256
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:40.576 (2m21.32s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:06:40.576
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:06:44.629 (4.053s)
> Enter [It] should set cors methods to only allow POST, GET - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:62 @ 04/04/23 18:06:44.629
< Exit [It] should set cors methods to only allow POST, GET - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:62 @ 04/04/23 18:06:54.768 (10.139s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:54.768
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:54.976 (208ms)
-
-
- > Enter [BeforeEach] [Setting] [Load Balancer] round-robin - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:54.976
< Exit [BeforeEach] [Setting] [Load Balancer] round-robin - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:01.906 (6.93s)
> Enter [BeforeEach] [Setting] [Load Balancer] round-robin - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/round_robin.go:34 @ 04/04/23 18:07:01.906
< Exit [BeforeEach] [Setting] [Load Balancer] round-robin - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/round_robin.go:34 @ 04/04/23 18:07:12.967 (11.06s)
> Enter [It] should evenly distribute requests with round-robin (default algorithm) - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/round_robin.go:39 @ 04/04/23 18:07:12.967
< Exit [It] should evenly distribute requests with round-robin (default algorithm) - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/round_robin.go:39 @ 04/04/23 18:09:21.17 (2m8.203s)
> Enter [AfterEach] [Setting] [Load Balancer] round-robin - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:21.17
< Exit [AfterEach] [Setting] [Load Balancer] round-robin - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:21.399 (229ms)
-
-
- > Enter [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:21.4
< Exit [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:28.324 (6.924s)
> Enter [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:35 @ 04/04/23 18:09:28.324
< Exit [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:35 @ 04/04/23 18:09:39.376 (11.052s)
> Enter [It] should trust X-Forwarded headers when setting is true - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:40 @ 04/04/23 18:09:39.376
STEP: ensuring single values are parsed correctly - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:54 @ 04/04/23 18:09:56.563
STEP: ensuring that first entry in X-Forwarded-Host is used as the best host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:75 @ 04/04/23 18:09:56.572
< Exit [It] should trust X-Forwarded headers when setting is true - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:40 @ 04/04/23 18:09:56.578 (17.202s)
> Enter [AfterEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:56.578
< Exit [AfterEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:56.789 (211ms)
-
-
- > Enter [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:56.79
< Exit [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:03.662 (6.873s)
> Enter [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:34 @ 04/04/23 18:10:03.662
< Exit [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:34 @ 04/04/23 18:10:07.688 (4.026s)
> Enter [It] should redirect from www HTTPS to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:64 @ 04/04/23 18:10:07.688
STEP: setting up server for redirect from www - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:65 @ 04/04/23 18:10:07.688
STEP: sending request to www should redirect to domain - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:91 @ 04/04/23 18:10:22.913
STEP: sending request to domain should not redirect to www - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:103 @ 04/04/23 18:10:22.941
< Exit [It] should redirect from www HTTPS to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:64 @ 04/04/23 18:10:22.969 (15.281s)
> Enter [AfterEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:22.969
< Exit [AfterEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:23.209 (240ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:23.21
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:31.083 (7.874s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:10:31.083
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:10:35.101 (4.018s)
> Enter [It] should set secure in cookie with provided true annotation on http - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:412 @ 04/04/23 18:10:35.101
< Exit [It] should set secure in cookie with provided true annotation on http - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:412 @ 04/04/23 18:10:45.308 (10.206s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:45.308
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:45.524 (217ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:45.525
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:52.399 (6.874s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:10:52.399
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:10:56.446 (4.048s)
> Enter [It] should not set cookie without domain annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:248 @ 04/04/23 18:10:56.446
< Exit [It] should not set cookie without domain annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:248 @ 04/04/23 18:11:06.571 (10.124s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:06.571
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:06.765 (195ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:06.765
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:13.684 (6.918s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:11:13.684
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:11:17.714 (4.03s)
> Enter [It] should set sticky cookie without host - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:352 @ 04/04/23 18:11:17.714
< Exit [It] should set sticky cookie without host - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:352 @ 04/04/23 18:11:27.946 (10.232s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:27.946
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:28.167 (220ms)
-
-
- > Enter [BeforeEach] [Security] request smuggling - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:28.167
< Exit [BeforeEach] [Security] request smuggling - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:36.071 (7.904s)
> Enter [BeforeEach] [Security] request smuggling - /go/src/k8s.io/ingress-nginx/test/e2e/security/request_smuggling.go:35 @ 04/04/23 18:11:36.071
< Exit [BeforeEach] [Security] request smuggling - /go/src/k8s.io/ingress-nginx/test/e2e/security/request_smuggling.go:35 @ 04/04/23 18:11:38.106 (2.035s)
> Enter [It] should not return body content from error_page - /go/src/k8s.io/ingress-nginx/test/e2e/security/request_smuggling.go:39 @ 04/04/23 18:11:38.106
< Exit [It] should not return body content from error_page - /go/src/k8s.io/ingress-nginx/test/e2e/security/request_smuggling.go:39 @ 04/04/23 18:12:00.307 (22.201s)
> Enter [AfterEach] [Security] request smuggling - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:00.307
< Exit [AfterEach] [Security] request smuggling - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:00.53 (223ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:00.531
< Exit [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:07.492 (6.961s)
> Enter [It] should use grpc_pass in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:43 @ 04/04/23 18:12:07.492
< Exit [It] should use grpc_pass in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:43 @ 04/04/23 18:12:24.818 (17.326s)
> Enter [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:24.818
< Exit [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:25.032 (214ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:25.033
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:32.425 (7.392s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:12:32.425
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:12:36.448 (4.023s)
> Enter [It] should return status code 401 when authentication is configured with invalid content and Authorization header is sent - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:227 @ 04/04/23 18:12:36.448
< Exit [It] should return status code 401 when authentication is configured with invalid content and Authorization header is sent - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:227 @ 04/04/23 18:12:46.572 (10.124s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:46.572
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:46.787 (215ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:46.788
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:54.215 (7.427s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:12:54.215
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:13:02.279 (8.064s)
> Enter [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:490 @ 04/04/23 18:13:02.279
STEP: routing requests to the canary upstream when header pattern is matched - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:514 @ 04/04/23 18:13:19.503
STEP: routing requests to the mainline upstream when header failed to match header value - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:523 @ 04/04/23 18:13:19.508
< Exit [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:490 @ 04/04/23 18:13:19.51 (17.231s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:19.51
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:19.813 (303ms)
-
-
- > Enter [BeforeEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:19.813
< Exit [BeforeEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:26.704 (6.89s)
> Enter [It] should be enabled by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/multi_accept.go:31 @ 04/04/23 18:13:26.704
< Exit [It] should be enabled by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/multi_accept.go:31 @ 04/04/23 18:13:29.872 (3.169s)
> Enter [AfterEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:29.872
< Exit [AfterEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:30.073 (201ms)
-
-
- > Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:30.073
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:37.948 (7.874s)
> Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 04/04/23 18:13:37.948
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 04/04/23 18:13:41.967 (4.019s)
> Enter [It] [BAD_ANNOTATIONS] should drop an ingress if there is a custom blocklist config in place and allow others to pass - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:133 @ 04/04/23 18:13:41.967
< Exit [It] [BAD_ANNOTATIONS] should drop an ingress if there is a custom blocklist config in place and allow others to pass - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:133 @ 04/04/23 18:14:07.32 (25.353s)
> Enter [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:07.32
< Exit [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:07.487 (167ms)
-
-
-
- > Enter [BeforeEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:07.487
< Exit [BeforeEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:14.369 (6.882s)
> Enter [It] disables access logging for default backend - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:105 @ 04/04/23 18:14:14.369
[SKIPPED] enable-access-log-for-default-backend
In [It] at: /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:107 @ 04/04/23 18:14:14.37
< Exit [It] disables access logging for default backend - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:105 @ 04/04/23 18:14:14.37 (1ms)
> Enter [AfterEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:14.37
< Exit [AfterEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:14.561 (191ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:14.561
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:21.468 (6.907s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:14:21.468
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:14:29.526 (8.058s)
> Enter [It] respects always and never values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:643 @ 04/04/23 18:14:29.526
STEP: routing requests to the canary upstream when cookie is set to 'always' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:667 @ 04/04/23 18:14:46.664
STEP: routing requests to the mainline upstream when cookie is set to 'never' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:678 @ 04/04/23 18:14:54.864
STEP: routing requests to the mainline upstream when cookie is set to anything else - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:689 @ 04/04/23 18:15:04.858
< Exit [It] respects always and never values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:643 @ 04/04/23 18:15:14.862 (45.336s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:14.862
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:15.079 (218ms)
-
-
- > Enter [BeforeEach] [Annotations] default-backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:15.08
< Exit [BeforeEach] [Annotations] default-backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:22.972 (7.892s)
> Enter [BeforeEach] [Annotations] default-backend - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/default_backend.go:32 @ 04/04/23 18:15:22.972
< Exit [BeforeEach] [Annotations] default-backend - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/default_backend.go:32 @ 04/04/23 18:15:26.998 (4.026s)
> Enter [It] should use a custom default backend as upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/default_backend.go:37 @ 04/04/23 18:15:26.998
< Exit [It] should use a custom default backend as upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/default_backend.go:37 @ 04/04/23 18:15:37.18 (10.182s)
> Enter [AfterEach] [Annotations] default-backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:37.18
< Exit [AfterEach] [Annotations] default-backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:37.392 (212ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:37.392
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:44.321 (6.929s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:15:44.321
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:15:50.372 (6.051s)
> Enter [It] always routes traffic to canary if first request was affinitized to canary (explicit sticky behavior) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:1000 @ 04/04/23 18:15:50.372
< Exit [It] always routes traffic to canary if first request was affinitized to canary (explicit sticky behavior) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:1000 @ 04/04/23 18:16:15.956 (25.584s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:15.956
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:16.151 (195ms)
-
-
- > Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:16.152
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:25.575 (9.424s)
> Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 04/04/23 18:16:25.576
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 04/04/23 18:16:29.621 (4.045s)
> Enter [It] should write rewrite logs - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:37 @ 04/04/23 18:16:29.621
STEP: setting enable-rewrite-log annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:38 @ 04/04/23 18:16:29.621
< Exit [It] should write rewrite logs - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:37 @ 04/04/23 18:16:42.864 (13.243s)
> Enter [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:42.864
< Exit [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:43.089 (224ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:43.089
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:50.483 (7.394s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:16:50.483
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:16:54.502 (4.019s)
> Enter [It] should set sslClientCertificate, sslVerifyClient and sslVerifyDepth with auth-tls-secret - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:36 @ 04/04/23 18:16:54.502
< Exit [It] should set sslClientCertificate, sslVerifyClient and sslVerifyDepth with auth-tls-secret - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:36 @ 04/04/23 18:17:09.564 (15.063s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:09.564
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:09.781 (217ms)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:09.782
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:16.68 (6.899s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:17:16.68
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:17:20.71 (4.03s)
> Enter [It] should propagate the w3c header when configured with jaeger - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:197 @ 04/04/23 18:17:20.71
< Exit [It] should propagate the w3c header when configured with jaeger - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:197 @ 04/04/23 18:17:50.976 (30.266s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:50.976
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:51.176 (200ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:17:51.176
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:17:51.176 (0s)
-
-
- > Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:51.177
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:59.072 (7.895s)
> Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 04/04/23 18:17:59.072
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 04/04/23 18:18:13.271 (14.199s)
> Enter [It] handles endpoints only changes - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:62 @ 04/04/23 18:18:13.271
< Exit [It] handles endpoints only changes - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:62 @ 04/04/23 18:18:23.585 (10.314s)
> Enter [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:23.585
< Exit [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:23.805 (219ms)
-
-
- > Enter [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:23.805
< Exit [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:30.696 (6.891s)
> Enter [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:36 @ 04/04/23 18:18:30.696
< Exit [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:36 @ 04/04/23 18:18:34.717 (4.021s)
> Enter [It] should not appear references to secret updates not used in ingress rules - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:40 @ 04/04/23 18:18:34.717
< Exit [It] should not appear references to secret updates not used in ingress rules - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:40 @ 04/04/23 18:18:57.987 (23.27s)
> Enter [AfterEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:57.987
< Exit [AfterEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:58.194 (208ms)
-
-
- > Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:58.195
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:08.072 (9.877s)
> Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 04/04/23 18:19:08.072
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 04/04/23 18:19:12.096 (4.024s)
> Enter [It] should include opentelemetry_trust_incoming_spans on directive when enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:74 @ 04/04/23 18:19:12.096
< Exit [It] should include opentelemetry_trust_incoming_spans on directive when enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:74 @ 04/04/23 18:19:29.486 (17.39s)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:29.486
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:30 (514ms)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 04/04/23 18:19:30
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 04/04/23 18:19:30 (0s)
-
-
- > Enter [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:30.007
< Exit [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:37.929 (7.922s)
> Enter [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:34 @ 04/04/23 18:19:37.929
< Exit [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:34 @ 04/04/23 18:19:41.957 (4.027s)
> Enter [It] should redirect from www HTTP to HTTP - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:38 @ 04/04/23 18:19:41.957
STEP: setting up server for redirect from www - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:39 @ 04/04/23 18:19:41.957
STEP: sending request to www.fromtowwwredirect.bar.com - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:55 @ 04/04/23 18:19:52.111
< Exit [It] should redirect from www HTTP to HTTP - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:38 @ 04/04/23 18:19:52.114 (10.157s)
> Enter [AfterEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:52.114
< Exit [AfterEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:52.309 (195ms)
-
-
- > Enter [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:52.309
< Exit [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:59.222 (6.912s)
> Enter [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:33 @ 04/04/23 18:19:59.222
< Exit [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:33 @ 04/04/23 18:20:03.271 (4.049s)
> Enter [It] should produce valid JSON for /dbg general - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:85 @ 04/04/23 18:20:03.271
< Exit [It] should produce valid JSON for /dbg general - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:85 @ 04/04/23 18:20:10.739 (7.468s)
> Enter [AfterEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:10.739
< Exit [AfterEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:11.546 (807ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:11.548
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:20.355 (8.808s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:20:20.355
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:20:28.54 (8.185s)
> Enter [It] should route requests split between mainline and canary if canary weight is 50 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:808 @ 04/04/23 18:20:28.54
< Exit [It] should route requests split between mainline and canary if canary weight is 50 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:808 @ 04/04/23 18:21:23.965 (55.425s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:23.965
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:24.188 (223ms)
-
-
- > Enter [BeforeEach] [Annotations] custom-http-errors - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:24.188
< Exit [BeforeEach] [Annotations] custom-http-errors - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:32.093 (7.904s)
> Enter [BeforeEach] [Annotations] custom-http-errors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:37 @ 04/04/23 18:21:32.093
< Exit [BeforeEach] [Annotations] custom-http-errors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:37 @ 04/04/23 18:21:36.116 (4.023s)
> Enter [It] configures Nginx correctly - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:41 @ 04/04/23 18:21:36.116
STEP: turning on proxy_intercept_errors directive - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:59 @ 04/04/23 18:21:46.348
STEP: configuring error_page directive - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:62 @ 04/04/23 18:21:46.348
STEP: creating error locations - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:67 @ 04/04/23 18:21:46.348
STEP: updating configuration when only custom-http-error value changes - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:72 @ 04/04/23 18:21:46.349
STEP: ignoring duplicate values (503 in this case) per server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:90 @ 04/04/23 18:21:50.55
STEP: using the custom default-backend from annotation for upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:102 @ 04/04/23 18:22:00.715
< Exit [It] configures Nginx correctly - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:41 @ 04/04/23 18:22:08.9 (32.784s)
> Enter [AfterEach] [Annotations] custom-http-errors - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:08.9
< Exit [AfterEach] [Annotations] custom-http-errors - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:09.112 (212ms)
-
-
- > Enter [BeforeEach] [Annotations] connection-proxy-header - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:09.112
< Exit [BeforeEach] [Annotations] connection-proxy-header - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:17.003 (7.891s)
> Enter [BeforeEach] [Annotations] connection-proxy-header - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/connection.go:32 @ 04/04/23 18:22:17.003
< Exit [BeforeEach] [Annotations] connection-proxy-header - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/connection.go:32 @ 04/04/23 18:22:21.032 (4.029s)
> Enter [It] set connection header to keep-alive - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/connection.go:36 @ 04/04/23 18:22:21.032
< Exit [It] set connection header to keep-alive - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/connection.go:36 @ 04/04/23 18:22:31.159 (10.126s)
> Enter [AfterEach] [Annotations] connection-proxy-header - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:31.159
< Exit [AfterEach] [Annotations] connection-proxy-header - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:31.365 (206ms)
-
-
- > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:31.366
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:38.253 (6.887s)
> Enter [It] should return 200 for service type=ExternalName using FQDN with trailing dot - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:217 @ 04/04/23 18:22:38.253
< Exit [It] should return 200 for service type=ExternalName using FQDN with trailing dot - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:217 @ 04/04/23 18:22:48.533 (10.28s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:48.533
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:48.75 (218ms)
-
-
- > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:48.751
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:55.631 (6.88s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:22:55.631
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:22:59.653 (4.022s)
> Enter [BeforeEach] should configure TLS protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:47 @ 04/04/23 18:22:59.653
< Exit [BeforeEach] should configure TLS protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:47 @ 04/04/23 18:23:08.743 (9.09s)
> Enter [It] setting cipher suite - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:65 @ 04/04/23 18:23:08.743
< Exit [It] setting cipher suite - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:65 @ 04/04/23 18:23:18.9 (10.157s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:18.9
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:19.087 (187ms)
-
-
- > Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:19.087
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:27.019 (7.931s)
> Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:23:27.019
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:23:31.042 (4.023s)
> Enter [It] should not set client_body_buffer_size to invalid 1b - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:145 @ 04/04/23 18:23:31.042
< Exit [It] should not set client_body_buffer_size to invalid 1b - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:145 @ 04/04/23 18:23:41.252 (10.21s)
> Enter [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:41.252
< Exit [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:41.433 (181ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:41.433
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:48.317 (6.884s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:23:48.317
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:23:52.34 (4.023s)
> Enter [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:383 @ 04/04/23 18:23:52.34
< Exit [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:383 @ 04/04/23 18:24:11.665 (19.325s)
> Enter [It] user with annotated ingress retains cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:433 @ 04/04/23 18:24:11.665
< Exit [It] user with annotated ingress retains cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:433 @ 04/04/23 18:24:16.916 (5.251s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:16.916
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:17.295 (379ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:17.296
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:24.725 (7.429s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:24:24.725
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:24:28.761 (4.036s)
> Enter [It] should accept both Ingresses with default IngressClassName and IngressClass annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:132 @ 04/04/23 18:24:28.761
< Exit [It] should accept both Ingresses with default IngressClassName and IngressClass annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:132 @ 04/04/23 18:24:45.952 (17.19s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:45.952
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:46.145 (194ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:46.146
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:54.048 (7.903s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:24:54.048
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:24:58.076 (4.028s)
> Enter [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 04/04/23 18:24:58.076
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 04/04/23 18:25:03.11
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 04/04/23 18:25:13.321
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 04/04/23 18:25:23.483
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 04/04/23 18:25:33.694
< Exit [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 04/04/23 18:25:48.897 (50.821s)
> Enter [It] should redirect to signin url when not signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:849 @ 04/04/23 18:25:48.897
< Exit [It] should redirect to signin url when not signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:849 @ 04/04/23 18:25:48.908 (11ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:48.908
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:49.135 (227ms)
-
-
- > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:49.135
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:56.988 (7.853s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:25:56.988
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:26:08.04 (11.052s)
> Enter [It] should enable the log-format-escape-none - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:63 @ 04/04/23 18:26:08.04
< Exit [It] should enable the log-format-escape-none - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:63 @ 04/04/23 18:26:18.223 (10.184s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:18.223
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:18.414 (191ms)
-
-
- > Enter [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:18.415
< Exit [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:25.316 (6.901s)
> Enter [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:31 @ 04/04/23 18:26:25.316
< Exit [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:31 @ 04/04/23 18:26:29.352 (4.036s)
> Enter [It] disable-access-log set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:35 @ 04/04/23 18:26:29.352
< Exit [It] disable-access-log set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:35 @ 04/04/23 18:26:46.584 (17.231s)
> Enter [AfterEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:46.584
< Exit [AfterEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:46.805 (221ms)
-
-
- > Enter [BeforeEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:46.805
< Exit [BeforeEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:53.714 (6.909s)
> Enter [It] should return 503 when backend service does not exist - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_backend.go:36 @ 04/04/23 18:26:53.714
< Exit [It] should return 503 when backend service does not exist - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_backend.go:36 @ 04/04/23 18:27:03.859 (10.145s)
> Enter [AfterEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:03.859
< Exit [AfterEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:04.058 (199ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:04.058
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:22.496 (2m18.438s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:29:22.496
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:29:26.527 (4.032s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:29:26.527
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:29:40.697 (14.169s)
> Enter [It] should not create additional upstream block when host part of auth-url contains a variable - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:570 @ 04/04/23 18:29:40.697
< Exit [It] should not create additional upstream block when host part of auth-url contains a variable - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:570 @ 04/04/23 18:30:03.916 (23.219s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:03.916
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:04.131 (215ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:04.131
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:12.003 (7.871s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:30:12.003
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:30:16.028 (4.025s)
> Enter [It] should return 403 using auth-tls-match-cn with no matching CN from client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:266 @ 04/04/23 18:30:16.028
< Exit [It] should return 403 using auth-tls-match-cn with no matching CN from client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:266 @ 04/04/23 18:30:26.487 (10.459s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:26.487
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:26.704 (217ms)
-
-
- > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:26.704
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:33.592 (6.888s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:30:33.592
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:30:44.636 (11.044s)
> Enter [It] should set variables-hash-max-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:88 @ 04/04/23 18:30:44.636
< Exit [It] should set variables-hash-max-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:88 @ 04/04/23 18:30:54.792 (10.156s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:54.792
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:54.971 (179ms)
-
-
- > Enter [BeforeEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:98 @ 04/04/23 18:30:54.971
< Exit [BeforeEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:98 @ 04/04/23 18:30:56.98 (2.008s)
> Enter [It] fails when using alias directive - /go/src/k8s.io/ingress-nginx/test/e2e/nginx/nginx.go:115 @ 04/04/23 18:30:56.98
< Exit [It] fails when using alias directive - /go/src/k8s.io/ingress-nginx/test/e2e/nginx/nginx.go:115 @ 04/04/23 18:31:57.006 (1m0.027s)
> Enter [AfterEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:99 @ 04/04/23 18:31:57.006
< Exit [AfterEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:99 @ 04/04/23 18:31:57.009 (3ms)
-
-
- > Enter [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:57.009
< Exit [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:03.889 (6.88s)
> Enter [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:37 @ 04/04/23 18:32:03.889
< Exit [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:37 @ 04/04/23 18:32:07.917 (4.028s)
> Enter [It] should add value of stream-snippet to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:41 @ 04/04/23 18:32:07.917
< Exit [It] should add value of stream-snippet to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:41 @ 04/04/23 18:32:23.139 (15.222s)
> Enter [AfterEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:23.139
< Exit [AfterEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:23.334 (195ms)
-
-
- > Enter [BeforeEach] [Annotations] force-ssl-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:23.334
< Exit [BeforeEach] [Annotations] force-ssl-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:30.222 (6.888s)
> Enter [BeforeEach] [Annotations] force-ssl-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/forcesslredirect.go:30 @ 04/04/23 18:32:30.222
< Exit [BeforeEach] [Annotations] force-ssl-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/forcesslredirect.go:30 @ 04/04/23 18:32:34.249 (4.027s)
> Enter [It] should redirect to https - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/forcesslredirect.go:34 @ 04/04/23 18:32:34.249
< Exit [It] should redirect to https - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/forcesslredirect.go:34 @ 04/04/23 18:32:41.274 (7.025s)
> Enter [AfterEach] [Annotations] force-ssl-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:41.274
< Exit [AfterEach] [Annotations] force-ssl-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:41.496 (222ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:41.497
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:48.376 (6.879s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:32:48.376
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:32:52.403 (4.027s)
> Enter [BeforeEach] With specific ingress-class flags - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:392 @ 04/04/23 18:32:52.403
< Exit [BeforeEach] With specific ingress-class flags - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:392 @ 04/04/23 18:33:00.451 (8.048s)
> Enter [It] should ignore Ingress with no class and accept the correctly configured Ingresses - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:413 @ 04/04/23 18:33:00.451
< Exit [It] should ignore Ingress with no class and accept the correctly configured Ingresses - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:413 @ 04/04/23 18:33:24.697 (24.246s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:24.697
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:24.873 (176ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:24.873
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:32.238 (7.364s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:33:32.238
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:33:42.291 (10.053s)
> Enter [It] should route requests only to canary if canary weight is 100 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:743 @ 04/04/23 18:33:42.291
< Exit [It] should route requests only to canary if canary weight is 100 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:743 @ 04/04/23 18:33:59.526 (17.235s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:59.526
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:59.709 (183ms)
-
-
- > Enter [BeforeEach] plugins - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:59.71
< Exit [BeforeEach] plugins - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:06.602 (6.893s)
> Enter [BeforeEach] plugins - /go/src/k8s.io/ingress-nginx/test/e2e/settings/plugins.go:31 @ 04/04/23 18:34:06.602
< Exit [BeforeEach] plugins - /go/src/k8s.io/ingress-nginx/test/e2e/settings/plugins.go:31 @ 04/04/23 18:34:10.627 (4.025s)
> Enter [It] should exist a x-hello-world header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/plugins.go:35 @ 04/04/23 18:34:10.627
< Exit [It] should exist a x-hello-world header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/plugins.go:35 @ 04/04/23 18:34:27.807 (17.179s)
> Enter [AfterEach] plugins - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:27.807
< Exit [AfterEach] plugins - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:28.007 (200ms)
-
-
- > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:28.007
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:35.896 (7.889s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:34:35.896
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:34:39.916 (4.02s)
> Enter [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 04/04/23 18:34:39.916
STEP: configuring certificate_by_lua and skipping Nginx configuration of the new certificate - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:128 @ 04/04/23 18:34:57.039
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:136 @ 04/04/23 18:35:05.187
< Exit [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 04/04/23 18:35:05.197 (25.281s)
> Enter [It] falls back to using default certificate when secret gets deleted without reloading - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:185 @ 04/04/23 18:35:05.197
STEP: serving the default certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:204 @ 04/04/23 18:35:10.227
STEP: skipping Nginx reload - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:214 @ 04/04/23 18:35:10.293
< Exit [It] falls back to using default certificate when secret gets deleted without reloading - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:185 @ 04/04/23 18:35:10.293 (5.095s)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:10.293
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:10.501 (209ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:10.502
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:17.387 (6.885s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:35:17.387
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:35:21.413 (4.026s)
> Enter [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:383 @ 04/04/23 18:35:21.413
< Exit [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:383 @ 04/04/23 18:35:42.607 (21.195s)
> Enter [It] user retains cookie by default - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:411 @ 04/04/23 18:35:42.607
< Exit [It] user retains cookie by default - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:411 @ 04/04/23 18:35:42.616 (9ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:42.616
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:42.832 (216ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:42.832
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:49.737 (6.905s)
> Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 04/04/23 18:35:49.737
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 04/04/23 18:35:54.76 (5.023s)
> Enter [It] should use fastcgi_pass in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:37 @ 04/04/23 18:35:54.76
< Exit [It] should use fastcgi_pass in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:37 @ 04/04/23 18:36:04.978 (10.218s)
> Enter [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:04.978
< Exit [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:05.161 (183ms)
-
-
- > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:05.162
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:13.068 (7.906s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:36:13.068
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:36:17.096 (4.027s)
> Enter [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 04/04/23 18:36:17.096
STEP: configuring certificate_by_lua and skipping Nginx configuration of the new certificate - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:128 @ 04/04/23 18:36:34.288
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:136 @ 04/04/23 18:36:42.473
< Exit [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 04/04/23 18:36:42.5 (25.405s)
> Enter [It] picks up the updated certificate without reloading - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:149 @ 04/04/23 18:36:42.5
STEP: configuring certificate_by_lua and skipping Nginx configuration of the new certificate - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:163 @ 04/04/23 18:36:47.607
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:169 @ 04/04/23 18:36:50.731
STEP: skipping Nginx reload - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:180 @ 04/04/23 18:36:53.763
< Exit [It] picks up the updated certificate without reloading - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:149 @ 04/04/23 18:36:53.763 (11.263s)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:53.763
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:53.98 (217ms)
-
-
- > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:53.981
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:00.852 (6.872s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:37:00.852
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:37:13.899 (13.046s)
> Enter [It] log-format default escape - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:105 @ 04/04/23 18:37:13.899
< Exit [It] log-format default escape - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:105 @ 04/04/23 18:37:27.067 (13.169s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:27.067
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:27.254 (186ms)
-
-
- > Enter [BeforeEach] brotli - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:27.254
< Exit [BeforeEach] brotli - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:35.134 (7.88s)
> Enter [BeforeEach] brotli - /go/src/k8s.io/ingress-nginx/test/e2e/settings/brotli.go:35 @ 04/04/23 18:37:35.134
< Exit [BeforeEach] brotli - /go/src/k8s.io/ingress-nginx/test/e2e/settings/brotli.go:35 @ 04/04/23 18:37:39.153 (4.019s)
> Enter [It] should only compress responses that meet the `brotli-min-length` condition - /go/src/k8s.io/ingress-nginx/test/e2e/settings/brotli.go:39 @ 04/04/23 18:37:39.153
< Exit [It] should only compress responses that meet the `brotli-min-length` condition - /go/src/k8s.io/ingress-nginx/test/e2e/settings/brotli.go:39 @ 04/04/23 18:38:10.344 (31.191s)
> Enter [AfterEach] brotli - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:10.344
< Exit [AfterEach] brotli - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:10.535 (191ms)
-
-
- > Enter [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:10.535
< Exit [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:17.414 (6.879s)
> Enter [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:31 @ 04/04/23 18:38:17.414
< Exit [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:31 @ 04/04/23 18:38:21.437 (4.023s)
> Enter [It] disable-http-access-log set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:53 @ 04/04/23 18:38:21.437
< Exit [It] disable-http-access-log set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:53 @ 04/04/23 18:38:38.614 (17.177s)
> Enter [AfterEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:38.614
< Exit [AfterEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:38.835 (221ms)
-
-
- > Enter [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:38.836
< Exit [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:45.698 (6.862s)
> Enter [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:30 @ 04/04/23 18:38:45.698
< Exit [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:30 @ 04/04/23 18:38:49.734 (4.036s)
> Enter [It] set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:34 @ 04/04/23 18:38:49.734
< Exit [It] set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:34 @ 04/04/23 18:38:59.959 (10.225s)
> Enter [AfterEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:59.959
< Exit [AfterEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:00.179 (220ms)
-
-
-
- > Enter [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:00.179
< Exit [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:08.619 (8.44s)
> Enter [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:42 @ 04/04/23 18:39:08.619
< Exit [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:42 @ 04/04/23 18:39:12.644 (4.025s)
> Enter [It] should only allow requests from specific countries - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:70 @ 04/04/23 18:39:12.644
[SKIPPED] GeoIP test are temporarily disabled
In [It] at: /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:71 @ 04/04/23 18:39:12.645
< Exit [It] should only allow requests from specific countries - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:70 @ 04/04/23 18:39:12.645 (1ms)
> Enter [AfterEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:12.645
< Exit [AfterEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:12.862 (217ms)
-
-
- > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:12.863
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:19.76 (6.897s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:39:19.76
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:39:23.829 (4.069s)
> Enter [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 04/04/23 18:39:23.829
< Exit [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 04/04/23 18:39:33.03 (9.2s)
> Enter [It] setting includeSubDomains parameter - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:127 @ 04/04/23 18:39:33.03
< Exit [It] setting includeSubDomains parameter - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:127 @ 04/04/23 18:39:43.259 (10.229s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:43.259
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:43.444 (186ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:43.445
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:50.328 (6.883s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:39:50.328
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:39:58.361 (8.034s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:39:58.361
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 04/04/23 18:39:58.361
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 04/04/23 18:40:08.534
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 04/04/23 18:40:18.725
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:40:28.928 (30.567s)
> Enter [It] should add auth headers when global-auth-response-headers is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:223 @ 04/04/23 18:40:28.928
STEP: Adding a global-auth-response-headers to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:228 @ 04/04/23 18:40:28.928
< Exit [It] should add auth headers when global-auth-response-headers is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:223 @ 04/04/23 18:40:39.119 (10.19s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:39.119
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:39.335 (216ms)
-
-
- > Enter [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:39.335
< Exit [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:46.231 (6.896s)
> Enter [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:32 @ 04/04/23 18:40:46.231
< Exit [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:32 @ 04/04/23 18:40:48.266 (2.035s)
> Enter [It] should not set invalid proxy read timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:52 @ 04/04/23 18:40:48.266
< Exit [It] should not set invalid proxy read timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:52 @ 04/04/23 18:41:05.463 (17.198s)
> Enter [AfterEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:41:05.463
< Exit [AfterEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:41:05.678 (215ms)
-
-
- > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:41:24.95
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:41:57.132 (32.182s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 18:41:57.132
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 18:42:05.196 (8.064s)
> Enter [It] should not return an error if the Ingress V1 definition is valid with IngressClass annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:180 @ 04/04/23 18:42:05.196
< Exit [It] should not return an error if the Ingress V1 definition is valid with IngressClass annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:180 @ 04/04/23 18:42:08.558 (3.362s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:42:08.558
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:42:08.881 (323ms)
-
-
- > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:42:08.881
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:42:27.269 (18.388s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 18:42:27.269
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 18:42:35.33 (8.061s)
> Enter [It] should return an error if the Ingress V1 definition contains invalid annotations - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:196 @ 04/04/23 18:42:35.33
< Exit [It] should return an error if the Ingress V1 definition contains invalid annotations - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:196 @ 04/04/23 18:42:35.482 (152ms)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:42:35.482
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:42:35.681 (199ms)
-
-
- > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:42:35.681
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:42:54.33 (18.649s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 18:42:54.33
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 21:18:55.121 (10.056s)
> Enter [It] should not allow overlaps of host and paths without canary annotations - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:70 @ 04/04/23 21:18:55.121
< Exit [It] should not allow overlaps of host and paths without canary annotations - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:70 @ 04/04/23 21:18:58.366 (3.245s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 21:18:58.367
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 21:18:58.612 (246ms)
-
-
- > Enter [BeforeEach] [TopologyHints] topology aware routing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 21:18:58.613
< Exit [BeforeEach] [TopologyHints] topology aware routing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 21:19:05.487 (6.875s)
> Enter [BeforeEach] [TopologyHints] topology aware routing - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/topology.go:39 @ 04/04/23 21:19:05.487
< Exit [BeforeEach] [TopologyHints] topology aware routing - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/topology.go:39 @ 04/04/23 21:19:09.523 (4.036s)
> Enter [It] should return 200 when service has topology hints - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/topology.go:43 @ 04/04/23 21:19:09.523
STEP: checking if the service is reached - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/topology.go:53 @ 04/04/23 21:19:19.701
< Exit [It] should return 200 when service has topology hints - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/topology.go:43 @ 04/04/23 21:19:19.839 (10.316s)
> Enter [AfterEach] [TopologyHints] topology aware routing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 21:19:19.839
< Exit [AfterEach] [TopologyHints] topology aware routing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 21:19:20.061 (222ms)
-
-
- > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 21:19:20.061
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:17:57.17 (30.737s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:17:57.17
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:18:05.234 (8.065s)
> Enter [It] should block ingress with invalid path - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:108 @ 04/04/23 22:18:05.234
< Exit [It] should block ingress with invalid path - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:108 @ 04/04/23 22:18:08.53 (3.296s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:18:08.53
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:18:08.765 (235ms)
-
-
- > Enter [BeforeEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:18:08.766
< Exit [BeforeEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:18:22.642 (13.877s)
> Enter [BeforeEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/settings/namespace_selector.go:51 @ 04/04/23 22:18:22.642
< Exit [BeforeEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/settings/namespace_selector.go:51 @ 04/04/23 22:18:48.76 (26.118s)
> Enter [It] should ingore Ingress of namespace without label foo=bar and accept those of namespace with label foo=bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/namespace_selector.go:63 @ 04/04/23 22:18:48.76
< Exit [It] should ingore Ingress of namespace without label foo=bar and accept those of namespace with label foo=bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/namespace_selector.go:63 @ 04/04/23 22:18:55.044 (6.284s)
> Enter [AfterEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:18:55.044
< Exit [AfterEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:18:55.29 (246ms)
> Enter [AfterEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/settings/namespace_selector.go:56 @ 04/04/23 22:18:55.29
< Exit [AfterEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/settings/namespace_selector.go:56 @ 04/04/23 22:18:55.293 (3ms)
-
-
- > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:18:55.294
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:19:12.977 (17.683s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:19:12.977
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:19:21.048 (8.072s)
> Enter [It] should not return an error for an invalid Ingress when it has unknown class - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:207 @ 04/04/23 22:19:21.048
< Exit [It] should not return an error for an invalid Ingress when it has unknown class - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:207 @ 04/04/23 22:19:21.18 (132ms)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:19:21.18
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:19:21.377 (197ms)
-
-
- > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:19:21.377
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:19:52.511 (31.134s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:19:52.511
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:20:00.575 (8.064s)
> Enter [It] reject ingress with global-rate-limit annotations when memcached is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:43 @ 04/04/23 22:20:00.575
STEP: rejects ingress when memcached is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:52 @ 04/04/23 22:20:00.575
STEP: accepts ingress when memcached is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:57 @ 04/04/23 22:20:00.587
< Exit [It] reject ingress with global-rate-limit annotations when memcached is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:43 @ 04/04/23 22:20:10.885 (10.31s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:20:10.885
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:20:11.143 (257ms)
-
-
- > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:20:11.143
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:20:29.584 (18.441s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:20:29.584
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:20:37.66 (8.076s)
> Enter [It] should return an error if there is an invalid value in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:136 @ 04/04/23 22:20:37.66
< Exit [It] should return an error if there is an invalid value in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:136 @ 04/04/23 22:20:44.7 (7.04s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:20:44.7
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:20:44.899 (199ms)
-
-
- > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:20:44.899
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:21:03.976 (19.078s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:21:03.976
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:21:12.046 (8.07s)
> Enter [It] should return an error if there is a forbidden value in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:150 @ 04/04/23 22:21:12.046
< Exit [It] should return an error if there is a forbidden value in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:150 @ 04/04/23 22:21:19.079 (7.033s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:21:19.079
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:21:19.337 (258ms)
-
-
- > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:21:19.337
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:21:37.731 (18.394s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:21:37.731
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:21:45.791 (8.06s)
> Enter [It] should return an error if there is an error validating the ingress definition - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:125 @ 04/04/23 22:21:45.791
< Exit [It] should return an error if there is an error validating the ingress definition - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:125 @ 04/04/23 22:21:45.852 (61ms)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:21:45.852
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:21:46.057 (205ms)
-
-
- > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:21:46.057
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:22:04.907 (18.85s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:22:04.907
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:22:12.968 (8.061s)
> Enter [It] should not return an error if the Ingress V1 definition is valid with Ingress Class - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:164 @ 04/04/23 22:22:12.968
< Exit [It] should not return an error if the Ingress V1 definition is valid with Ingress Class - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:164 @ 04/04/23 22:22:18.358 (5.39s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:22:18.358
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:22:18.592 (234ms)
-
-
- > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:22:18.592
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 22:22:47.015 (28.422s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:22:47.015
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 04/04/23 22:22:55.073 (8.059s)
> Enter [It] should allow overlaps of host and paths with canary annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:87 @ 04/04/23 22:22:55.073
< Exit [It] should allow overlaps of host and paths with canary annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:87 @ 04/04/23 22:22:58.439 (3.366s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:22:58.439
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 22:22:58.64 (201ms)
-
-
- > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:19.251
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:26.76 (7.509s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:04:26.76
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:04:38.808 (12.048s)
> Enter [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 04/04/23 18:04:38.808
STEP: configuring certificate_by_lua and skipping Nginx configuration of the new certificate - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:128 @ 04/04/23 18:04:55.931
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:136 @ 04/04/23 18:05:04.12
< Exit [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 04/04/23 18:05:04.15 (25.342s)
> Enter [It] supports requests with domain with trailing dot - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:145 @ 04/04/23 18:05:04.15
< Exit [It] supports requests with domain with trailing dot - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:145 @ 04/04/23 18:05:04.174 (24ms)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:04.174
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:04.407 (234ms)
-
-
- > Enter [BeforeEach] [Annotations] preserve-trailing-slash - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:04.408
< Exit [BeforeEach] [Annotations] preserve-trailing-slash - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:11.385 (6.978s)
> Enter [BeforeEach] [Annotations] preserve-trailing-slash - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/preservetrailingslash.go:30 @ 04/04/23 18:05:11.385
< Exit [BeforeEach] [Annotations] preserve-trailing-slash - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/preservetrailingslash.go:30 @ 04/04/23 18:05:15.42 (4.034s)
> Enter [It] should allow preservation of trailing slashes - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/preservetrailingslash.go:34 @ 04/04/23 18:05:15.42
< Exit [It] should allow preservation of trailing slashes - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/preservetrailingslash.go:34 @ 04/04/23 18:05:22.428 (7.008s)
> Enter [AfterEach] [Annotations] preserve-trailing-slash - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:22.428
< Exit [AfterEach] [Annotations] preserve-trailing-slash - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:22.626 (198ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:22.626
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:29.568 (6.942s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:05:29.568
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:05:33.606 (4.037s)
> Enter [It] should set valid proxy timeouts - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:115 @ 04/04/23 18:05:33.606
< Exit [It] should set valid proxy timeouts - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:115 @ 04/04/23 18:05:43.732 (10.127s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:43.732
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:43.917 (184ms)
-
-
- > Enter [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:43.917
< Exit [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:51.802 (7.885s)
> Enter [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:32 @ 04/04/23 18:05:51.802
< Exit [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:32 @ 04/04/23 18:05:55.831 (4.029s)
> Enter [It] should exist a proxy_host using the upstream-vhost annotation value - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:57 @ 04/04/23 18:05:55.831
< Exit [It] should exist a proxy_host using the upstream-vhost annotation value - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:57 @ 04/04/23 18:06:05.978 (10.147s)
> Enter [AfterEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:05.978
< Exit [AfterEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:06.188 (210ms)
-
-
- > Enter [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:06.189
< Exit [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:14.133 (7.945s)
> Enter [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:34 @ 04/04/23 18:06:14.133
< Exit [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:34 @ 04/04/23 18:06:18.165 (4.031s)
> Enter [It] should not exists Server header in the response - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:38 @ 04/04/23 18:06:18.165
< Exit [It] should not exists Server header in the response - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:38 @ 04/04/23 18:06:35.378 (17.213s)
> Enter [AfterEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:35.378
< Exit [AfterEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:35.637 (259ms)
-
-
- > Enter [BeforeEach] [Setting] Configmap - limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:35.637
< Exit [BeforeEach] [Setting] Configmap - limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:42.521 (6.884s)
> Enter [BeforeEach] [Setting] Configmap - limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/settings/limit_rate.go:32 @ 04/04/23 18:06:42.521
< Exit [BeforeEach] [Setting] Configmap - limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/settings/limit_rate.go:32 @ 04/04/23 18:06:46.54 (4.019s)
> Enter [It] Check limit-rate config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/limit_rate.go:36 @ 04/04/23 18:06:46.54
< Exit [It] Check limit-rate config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/limit_rate.go:36 @ 04/04/23 18:07:17.039 (30.499s)
> Enter [AfterEach] [Setting] Configmap - limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:17.039
< Exit [AfterEach] [Setting] Configmap - limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:17.22 (180ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:17.22
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:24.225 (7.005s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:07:24.225
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:07:26.256 (2.031s)
> Enter [It] does not set the path to / on the generated cookie if there's more than one rule referring to the same backend - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:121 @ 04/04/23 18:07:26.256
< Exit [It] does not set the path to / on the generated cookie if there's more than one rule referring to the same backend - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:121 @ 04/04/23 18:07:36.45 (10.194s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:36.45
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:36.633 (183ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:36.633
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:43.537 (6.903s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:07:43.537
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:07:51.596 (8.059s)
> Enter [It] should response with a 200 status from the mainline upstream when requests are made to the mainline ingress - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:48 @ 04/04/23 18:07:51.596
< Exit [It] should response with a 200 status from the mainline upstream when requests are made to the mainline ingress - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:48 @ 04/04/23 18:08:08.813 (17.217s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:08.813
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:09.063 (249ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:09.063
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:16.959 (7.896s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:08:16.959
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:08:25.017 (8.058s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:08:25.017
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 04/04/23 18:08:25.017
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 04/04/23 18:08:35.191
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 04/04/23 18:08:45.372
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:08:55.507 (30.491s)
> Enter [It] should still return status code 200 after auth backend is deleted using cache - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:155 @ 04/04/23 18:08:55.507
STEP: Adding a global-auth-cache-key to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:163 @ 04/04/23 18:08:55.507
< Exit [It] should still return status code 200 after auth backend is deleted using cache - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:155 @ 04/04/23 18:09:12.69 (17.183s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:12.69
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:12.914 (224ms)
-
-
- > Enter [BeforeEach] [Ingress] DeepInspection - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:12.915
< Exit [BeforeEach] [Ingress] DeepInspection - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:19.799 (6.884s)
> Enter [BeforeEach] [Ingress] DeepInspection - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/deep_inspection.go:30 @ 04/04/23 18:09:19.799
< Exit [BeforeEach] [Ingress] DeepInspection - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/deep_inspection.go:30 @ 04/04/23 18:09:23.825 (4.026s)
> Enter [It] should drop whole ingress if one path matches invalid regex - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/deep_inspection.go:34 @ 04/04/23 18:09:23.825
< Exit [It] should drop whole ingress if one path matches invalid regex - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/deep_inspection.go:34 @ 04/04/23 18:09:41.065 (17.24s)
> Enter [AfterEach] [Ingress] DeepInspection - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:41.065
< Exit [AfterEach] [Ingress] DeepInspection - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:41.299 (233ms)
-
-
- > Enter [BeforeEach] [Setting] [Lua] lua-shared-dicts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:41.299
< Exit [BeforeEach] [Setting] [Lua] lua-shared-dicts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:49.196 (7.896s)
> Enter [It] configures lua shared dicts - /go/src/k8s.io/ingress-nginx/test/e2e/settings/lua_shared_dicts.go:29 @ 04/04/23 18:09:49.196
< Exit [It] configures lua shared dicts - /go/src/k8s.io/ingress-nginx/test/e2e/settings/lua_shared_dicts.go:29 @ 04/04/23 18:10:01.416 (12.22s)
> Enter [AfterEach] [Setting] [Lua] lua-shared-dicts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:01.416
< Exit [AfterEach] [Setting] [Lua] lua-shared-dicts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:01.602 (187ms)
-
-
- > Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:01.603
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:08.48 (6.877s)
> Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 04/04/23 18:10:08.48
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 04/04/23 18:10:12.502 (4.022s)
> Enter [It] should use correct longest path match - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:66 @ 04/04/23 18:10:12.502
STEP: creating a regular ingress definition - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:69 @ 04/04/23 18:10:12.502
STEP: making a request to the non-rewritten location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:78 @ 04/04/23 18:10:22.752
STEP: creating an ingress definition with the rewrite-target annotation set on the "/" location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:88 @ 04/04/23 18:10:22.759
STEP: making a second request to the non-rewritten location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:102 @ 04/04/23 18:10:32.852
< Exit [It] should use correct longest path match - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:66 @ 04/04/23 18:10:32.86 (20.358s)
> Enter [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:32.86
< Exit [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:33.04 (180ms)
-
-
- > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:33.04
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:40.925 (7.885s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:10:40.925
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:10:44.945 (4.02s)
> Enter [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 04/04/23 18:10:44.945
Apr 4 18:10:54.109: INFO: Unexpected TLS error: tls: failed to verify certificate: x509: certificate is valid for ingress.local, not settings-tls
< Exit [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 04/04/23 18:10:56.109 (11.164s)
> Enter [It] setting max-age parameter - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:111 @ 04/04/23 18:10:56.109
< Exit [It] setting max-age parameter - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:111 @ 04/04/23 18:11:06.315 (10.206s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:06.315
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:06.527 (212ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:06.528
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:13.431 (6.904s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:11:13.431
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:11:21.479 (8.048s)
> Enter [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:301 @ 04/04/23 18:11:21.479
< Exit [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:301 @ 04/04/23 18:11:49.732 (28.253s)
> Enter [It] user with global-auth-always-set-cookie key in configmap retains cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:348 @ 04/04/23 18:11:49.732
< Exit [It] user with global-auth-always-set-cookie key in configmap retains cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:348 @ 04/04/23 18:11:56.743 (7.011s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:56.743
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:56.926 (183ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:56.926
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:03.815 (6.889s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:12:03.815
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:12:11.862 (8.047s)
> Enter [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:301 @ 04/04/23 18:12:11.862
< Exit [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:301 @ 04/04/23 18:12:40.103 (28.241s)
> Enter [It] user retains cookie by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:326 @ 04/04/23 18:12:40.103
< Exit [It] user retains cookie by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:326 @ 04/04/23 18:12:40.112 (9ms)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:40.112
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:40.334 (222ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:40.335
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:47.184 (6.849s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:12:47.184
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:12:51.214 (4.031s)
> Enter [It] should not allow - portless origin with wildcard origin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:515 @ 04/04/23 18:12:51.214
< Exit [It] should not allow - portless origin with wildcard origin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:515 @ 04/04/23 18:12:58.232 (7.018s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:58.232
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:58.436 (203ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:58.436
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:05.332 (6.896s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:13:05.332
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:13:09.361 (4.029s)
> Enter [It] should return status code 200 when authentication is configured with a map and Authorization header is sent - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:199 @ 04/04/23 18:13:09.361
< Exit [It] should return status code 200 when authentication is configured with a map and Authorization header is sent - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:199 @ 04/04/23 18:13:21.468 (12.107s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:21.468
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:21.639 (171ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:21.639
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:29.514 (7.875s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:13:29.514
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:13:33.537 (4.023s)
> Enter [It] should pass URL-encoded certificate to upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:161 @ 04/04/23 18:13:33.537
< Exit [It] should pass URL-encoded certificate to upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:161 @ 04/04/23 18:13:47.331 (13.794s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:47.331
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:47.532 (202ms)
-
-
- > Enter [BeforeEach] [Default Backend] custom service - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:47.533
< Exit [BeforeEach] [Default Backend] custom service - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:54.43 (6.897s)
> Enter [It] uses custom default backend that returns 200 as status code - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/custom_default_backend.go:36 @ 04/04/23 18:13:54.43
< Exit [It] uses custom default backend that returns 200 as status code - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/custom_default_backend.go:36 @ 04/04/23 18:14:10.603 (16.173s)
> Enter [AfterEach] [Default Backend] custom service - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:10.603
< Exit [AfterEach] [Default Backend] custom service - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:10.797 (195ms)
-
-
- > Enter [BeforeEach] [Annotations] whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:10.798
< Exit [BeforeEach] [Annotations] whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:17.742 (6.944s)
> Enter [BeforeEach] [Annotations] whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipwhitelist.go:30 @ 04/04/23 18:14:17.742
< Exit [BeforeEach] [Annotations] whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipwhitelist.go:30 @ 04/04/23 18:14:21.766 (4.024s)
> Enter [It] should set valid ip whitelist range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipwhitelist.go:34 @ 04/04/23 18:14:21.766
< Exit [It] should set valid ip whitelist range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipwhitelist.go:34 @ 04/04/23 18:14:31.914 (10.148s)
> Enter [AfterEach] [Annotations] whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:31.914
< Exit [AfterEach] [Annotations] whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:32.125 (211ms)
-
-
- > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:32.125
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:40.045 (7.92s)
> Enter [It] should return 200 for service type=ExternalName using a port name - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:184 @ 04/04/23 18:14:40.045
< Exit [It] should return 200 for service type=ExternalName using a port name - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:184 @ 04/04/23 18:14:50.345 (10.299s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:50.345
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:50.661 (317ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:50.662
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:57.86 (7.198s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:14:57.86
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:15:01.901 (4.041s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:15:01.901
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:15:16.075 (14.174s)
> Enter [It] should not create additional upstream block when auth-keepalive is not set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:552 @ 04/04/23 18:15:16.075
< Exit [It] should not create additional upstream block when auth-keepalive is not set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:552 @ 04/04/23 18:15:39.289 (23.214s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:39.289
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:39.523 (234ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:39.523
< Exit [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:46.413 (6.89s)
> Enter [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:43 @ 04/04/23 18:15:46.413
< Exit [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:43 @ 04/04/23 18:16:05.358 (18.945s)
> Enter [It] should return status code 401 when accessing '/' unauthentication - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:54 @ 04/04/23 18:16:05.358
< Exit [It] should return status code 401 when accessing '/' unauthentication - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:54 @ 04/04/23 18:16:08.518 (3.16s)
> Enter [AfterEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:08.518
< Exit [AfterEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:08.699 (180ms)
-
-
- > Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:08.699
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:15.641 (6.942s)
> Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 04/04/23 18:16:15.641
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 04/04/23 18:16:26.725 (11.084s)
> Enter [It] should enable PROXY Protocol for HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:112 @ 04/04/23 18:16:26.725
< Exit [It] should enable PROXY Protocol for HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:112 @ 04/04/23 18:17:59.041 (1m32.316s)
> Enter [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:59.041
< Exit [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:59.27 (229ms)
-
-
- > Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:59.27
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:07.156 (7.885s)
> Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 04/04/23 18:18:07.156
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 04/04/23 18:18:19.212 (12.057s)
> Enter [It] should ignore catch all Ingress with backend - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:50 @ 04/04/23 18:18:19.212
< Exit [It] should ignore catch all Ingress with backend - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:50 @ 04/04/23 18:18:39.618 (20.406s)
> Enter [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:39.618
< Exit [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:39.83 (212ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:39.831
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:46.716 (6.885s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:18:46.716
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:18:50.744 (4.028s)
> Enter [It] should allow headers for cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:137 @ 04/04/23 18:18:50.744
< Exit [It] should allow headers for cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:137 @ 04/04/23 18:19:00.902 (10.159s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:00.902
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:01.091 (189ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:01.092
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:09.007 (7.915s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:19:09.007
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:19:17.081 (8.074s)
> Enter [It] should return 404 status for requests to the canary if no matching ingress is found - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:80 @ 04/04/23 18:19:17.081
< Exit [It] should return 404 status for requests to the canary if no matching ingress is found - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:80 @ 04/04/23 18:19:24.105 (7.024s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:24.105
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:24.388 (283ms)
-
-
- > Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:24.389
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:43.748 (2m19.359s)
> Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 04/04/23 18:21:43.748
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 04/04/23 18:21:57.954 (14.206s)
> Enter [It] handles endpoints only changes (down scaling of replicas) - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:87 @ 04/04/23 18:21:57.954
< Exit [It] handles endpoints only changes (down scaling of replicas) - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:87 @ 04/04/23 18:22:20.304 (22.351s)
> Enter [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:20.304
< Exit [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:20.502 (198ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:20.503
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:27.369 (6.866s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:22:27.369
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:22:31.399 (4.03s)
> Enter [It] should not set proxy client-max-body-size to incorrect value - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:100 @ 04/04/23 18:22:31.399
< Exit [It] should not set proxy client-max-body-size to incorrect value - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:100 @ 04/04/23 18:22:41.545 (10.146s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:41.545
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:41.748 (203ms)
-
-
- > Enter [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:41.748
< Exit [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:58.304 (2m16.556s)
> Enter [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:32 @ 04/04/23 18:24:58.304
< Exit [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:32 @ 04/04/23 18:25:07.351 (9.047s)
> Enter [It] reuse port should be disabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:44 @ 04/04/23 18:25:07.351
< Exit [It] reuse port should be disabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:44 @ 04/04/23 18:25:17.463 (10.112s)
> Enter [AfterEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:17.463
< Exit [AfterEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:17.721 (257ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:17.721
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:36 (2m18.279s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:27:36
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:27:40.022 (4.023s)
> Enter [It] should set snippet "proxy_set_header My-Custom-Header 42;" when external auth is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:266 @ 04/04/23 18:27:40.022
< Exit [It] should set snippet "proxy_set_header My-Custom-Header 42;" when external auth is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:266 @ 04/04/23 18:27:50.223 (10.201s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:50.224
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:50.413 (190ms)
-
-
- > Enter [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:50.414
< Exit [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:04.312 (13.898s)
> Enter [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:38 @ 04/04/23 18:28:04.312
< Exit [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:38 @ 04/04/23 18:28:11.43 (7.118s)
> Enter [It] should set the X-Forwarded-Port header to 443 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:100 @ 04/04/23 18:28:11.43
Apr 4 18:28:24.664: INFO: Unexpected TLS error: tls: failed to verify certificate: x509: certificate is valid for ingress.local, not forwarded-headers
< Exit [It] should set the X-Forwarded-Port header to 443 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:100 @ 04/04/23 18:28:29.799 (18.368s)
> Enter [AfterEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:29.799
< Exit [AfterEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:30.029 (230ms)
-
-
- > Enter [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:30.03
< Exit [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:36.888 (6.859s)
> Enter [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:31 @ 04/04/23 18:28:36.888
< Exit [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:31 @ 04/04/23 18:28:40.919 (4.03s)
> Enter [It] set snippet "more_set_headers "Foo1: Bar1";" in all locations" - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:35 @ 04/04/23 18:28:40.919
< Exit [It] set snippet "more_set_headers "Foo1: Bar1";" in all locations" - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:35 @ 04/04/23 18:28:51.095 (10.176s)
> Enter [AfterEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:51.095
< Exit [AfterEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:51.273 (178ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:51.273
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:59.672 (8.399s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:28:59.672
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:29:07.713 (8.041s)
> Enter [It] should route requests to the correct upstream if the canary ingress is modified - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:307 @ 04/04/23 18:29:07.713
STEP: routing requests destined for the mainline ingress to the mainline upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:351 @ 04/04/23 18:29:32.166
STEP: routing requests destined for the canary ingress to the canary upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:360 @ 04/04/23 18:29:32.169
< Exit [It] should route requests to the correct upstream if the canary ingress is modified - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:307 @ 04/04/23 18:29:32.172 (24.459s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:32.172
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:32.356 (184ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:32.356
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:39.249 (6.892s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:29:39.249
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:29:43.271 (4.022s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:29:43.271
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:29:57.423 (14.152s)
> Enter [It] should not create additional upstream block when auth-keepalive is negative - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:590 @ 04/04/23 18:29:57.423
< Exit [It] should not create additional upstream block when auth-keepalive is negative - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:590 @ 04/04/23 18:30:20.684 (23.26s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:20.684
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:20.873 (189ms)
-
-
- > Enter [BeforeEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:20.873
< Exit [BeforeEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:27.823 (6.95s)
> Enter [It] should create sync events - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_sync_events.go:53 @ 04/04/23 18:30:27.823
< Exit [It] should create sync events - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_sync_events.go:53 @ 04/04/23 18:30:49.071 (21.248s)
> Enter [AfterEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:49.071
< Exit [AfterEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:49.267 (196ms)
-
-
- > Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:49.267
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:56.179 (6.912s)
> Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:30:56.179
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:31:00.207 (4.028s)
> Enter [It] should set client_body_buffer_size to 1K - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:57 @ 04/04/23 18:31:00.207
< Exit [It] should set client_body_buffer_size to 1K - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:57 @ 04/04/23 18:31:10.334 (10.127s)
> Enter [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:10.334
< Exit [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:10.562 (228ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:10.562
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:17.468 (6.905s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:31:17.468
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:31:21.488 (4.02s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:31:21.488
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:31:35.745 (14.257s)
> Enter [It] keeps processing new ingresses even if one of the existing ingresses is misconfigured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:505 @ 04/04/23 18:31:35.745
< Exit [It] keeps processing new ingresses even if one of the existing ingresses is misconfigured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:505 @ 04/04/23 18:31:46.949 (11.204s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:46.949
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:47.158 (209ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:47.158
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:55.054 (7.895s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:31:55.054
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:31:59.086 (4.032s)
> Enter [It] should allow origin for cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:110 @ 04/04/23 18:31:59.086
< Exit [It] should allow origin for cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:110 @ 04/04/23 18:32:06.117 (7.031s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:06.117
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:06.335 (217ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:06.335
< Exit [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:13.216 (6.881s)
> Enter [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:43 @ 04/04/23 18:32:13.216
< Exit [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:43 @ 04/04/23 18:32:30.126 (16.91s)
> Enter [It] should return status code 200 when accessing '/' authentication - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:68 @ 04/04/23 18:32:30.126
< Exit [It] should return status code 200 when accessing '/' authentication - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:68 @ 04/04/23 18:32:34.111 (3.985s)
> Enter [AfterEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:34.111
< Exit [AfterEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:34.285 (174ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:34.285
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:42.164 (7.878s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:32:42.164
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:32:46.19 (4.026s)
> Enter [It] should not allow - single origin without port and origin with required port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:405 @ 04/04/23 18:32:46.19
< Exit [It] should not allow - single origin without port and origin with required port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:405 @ 04/04/23 18:32:53.221 (7.031s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:53.221
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:53.428 (207ms)
-
-
- > Enter [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:53.428
< Exit [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:00.295 (6.867s)
> Enter [It] should set gzip_min_length to 100 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:78 @ 04/04/23 18:33:00.295
< Exit [It] should set gzip_min_length to 100 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:78 @ 04/04/23 18:33:17.519 (17.224s)
> Enter [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:17.519
< Exit [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:17.698 (178ms)
-
-
- > Enter [BeforeEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:17.698
< Exit [BeforeEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:24.578 (6.881s)
> Enter [It] should have worker_rlimit_nofile option and be independent on amount of worker processes - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_options.go:38 @ 04/04/23 18:33:24.578
< Exit [It] should have worker_rlimit_nofile option and be independent on amount of worker processes - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_options.go:38 @ 04/04/23 18:33:34.73 (10.152s)
> Enter [AfterEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:34.73
< Exit [AfterEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:34.905 (175ms)
-
-
- > Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:34.906
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:44.808 (9.902s)
> Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:33:44.808
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:33:55.842 (11.034s)
> Enter [It] should set keepalive time to upstream server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:77 @ 04/04/23 18:33:55.842
< Exit [It] should set keepalive time to upstream server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:77 @ 04/04/23 18:34:05.994 (10.152s)
> Enter [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:05.994
< Exit [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:06.258 (264ms)
-
-
-
-
-
- > Enter [BeforeEach] [Shutdown] ingress controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:06.259
< Exit [BeforeEach] [Shutdown] ingress controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:14.168 (7.909s)
> Enter [BeforeEach] [Shutdown] ingress controller - /go/src/k8s.io/ingress-nginx/test/e2e/gracefulshutdown/shutdown.go:35 @ 04/04/23 18:34:14.168
< Exit [BeforeEach] [Shutdown] ingress controller - /go/src/k8s.io/ingress-nginx/test/e2e/gracefulshutdown/shutdown.go:35 @ 04/04/23 18:34:25.207 (11.04s)
> Enter [It] should shutdown in less than 60 secons without pending connections - /go/src/k8s.io/ingress-nginx/test/e2e/gracefulshutdown/shutdown.go:40 @ 04/04/23 18:34:25.207
< Exit [It] should shutdown in less than 60 secons without pending connections - /go/src/k8s.io/ingress-nginx/test/e2e/gracefulshutdown/shutdown.go:40 @ 04/04/23 18:34:36.4 (11.193s)
> Enter [AfterEach] [Shutdown] ingress controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:36.4
< Exit [AfterEach] [Shutdown] ingress controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:36.599 (199ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:36.6
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:44.48 (7.88s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:34:44.48
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:34:48.503 (4.024s)
> Enter [BeforeEach] when external authentication is configured with a custom redirect param - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:651 @ 04/04/23 18:34:48.503
< Exit [BeforeEach] when external authentication is configured with a custom redirect param - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:651 @ 04/04/23 18:35:02.728 (14.224s)
> Enter [It] should return status code 200 when signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:678 @ 04/04/23 18:35:02.728
< Exit [It] should return status code 200 when signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:678 @ 04/04/23 18:35:02.742 (15ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:02.742
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:02.951 (209ms)
-
-
- > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:02.951
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:09.829 (6.877s)
> Enter [It] should sync ingress on external name service addition/deletion - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:311 @ 04/04/23 18:35:09.829
< Exit [It] should sync ingress on external name service addition/deletion - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:311 @ 04/04/23 18:35:30.35 (20.521s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:30.35
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:30.552 (202ms)
-
-
- > Enter [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:30.552
< Exit [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:37.481 (6.929s)
> Enter [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:39 @ 04/04/23 18:35:37.481
< Exit [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:39 @ 04/04/23 18:35:48.587 (11.106s)
> Enter [It] should pass unknown traffic to default backend and handle known traffic - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:79 @ 04/04/23 18:35:48.587
< Exit [It] should pass unknown traffic to default backend and handle known traffic - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:79 @ 04/04/23 18:36:17.402 (28.814s)
> Enter [AfterEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:17.402
< Exit [AfterEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:17.602 (201ms)
-
-
- > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:17.603
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:24.47 (6.867s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:36:24.47
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:36:35.523 (11.052s)
> Enter [It] should enable the log-format-escape-json - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:47 @ 04/04/23 18:36:35.523
< Exit [It] should enable the log-format-escape-json - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:47 @ 04/04/23 18:36:45.69 (10.167s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:45.69
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:45.908 (218ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:45.908
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:52.807 (6.899s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:36:52.807
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:36:56.83 (4.024s)
> Enter [It] should 302 redirect to error page instead of 400 when auth-tls-error-page is set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:114 @ 04/04/23 18:36:56.83
< Exit [It] should 302 redirect to error page instead of 400 when auth-tls-error-page is set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:114 @ 04/04/23 18:37:10.803 (13.972s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:10.803
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:10.971 (169ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:10.972
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:17.855 (6.884s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:37:17.855
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:37:21.879 (4.023s)
> Enter [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:383 @ 04/04/23 18:37:21.879
< Exit [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:383 @ 04/04/23 18:37:43.087 (21.209s)
> Enter [It] user does not retain cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:422 @ 04/04/23 18:37:43.087
< Exit [It] user does not retain cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:422 @ 04/04/23 18:37:43.095 (8ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:43.095
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:43.321 (225ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:43.321
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:50.242 (6.92s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:37:50.242
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:37:58.297 (8.055s)
> Enter [It] should not use canary as a catch-all server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:863 @ 04/04/23 18:37:58.297
< Exit [It] should not use canary as a catch-all server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:863 @ 04/04/23 18:38:15.503 (17.206s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:15.503
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:15.723 (220ms)
-
-
- > Enter [BeforeEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:15.724
< Exit [BeforeEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:22.643 (6.92s)
> Enter [It] should return 404 sending requests when only a default backend is running - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:33 @ 04/04/23 18:38:22.643
STEP: basic HTTP GET request without host to path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:27.644
STEP: basic HTTP GET request without host to path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:27.657
STEP: basic HTTPS GET request without host to path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:27.667
STEP: basic HTTPS GET request without host to path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:27.695
STEP: basic HTTP POST request without host to path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:27.708
STEP: basic HTTP POST request without host to path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:27.712
STEP: basic HTTPS POST request without host to path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:28.052
STEP: basic HTTPS POST request without host to path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:28.468
STEP: basic HTTP GET request to host foo.bar.com and path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:28.852
STEP: basic HTTP GET request to host foo.bar.com and path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:29.25
STEP: basic HTTPS GET request to host foo.bar.com and path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:29.647
STEP: basic HTTPS GET request to host foo.bar.com and path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:30.07
STEP: basic HTTP POST request to host foo.bar.com and path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:30.469
STEP: basic HTTP POST request to host foo.bar.com and path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:30.847
STEP: basic HTTPS POST request to host foo.bar.com and path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:31.252
STEP: basic HTTPS POST request to host foo.bar.com and path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 04/04/23 18:38:31.65
< Exit [It] should return 404 sending requests when only a default backend is running - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:33 @ 04/04/23 18:38:32.067 (9.424s)
> Enter [AfterEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:32.067
< Exit [AfterEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:32.276 (208ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:32.276
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:40.184 (7.908s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:38:40.184
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:38:48.25 (8.066s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:38:48.25
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 04/04/23 18:38:48.25
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 04/04/23 18:38:58.421
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 04/04/23 18:39:08.584
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:39:18.813 (30.563s)
> Enter [It] should return status code 200 when request whitelisted (via no-auth-locations) service and 401 when request protected service - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:102 @ 04/04/23 18:39:18.813
STEP: Adding a no-auth-locations for /bar to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:104 @ 04/04/23 18:39:18.813
STEP: Sending a request to protected service /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:111 @ 04/04/23 18:39:29.026
STEP: Sending a request to whitelisted service /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:118 @ 04/04/23 18:39:29.042
< Exit [It] should return status code 200 when request whitelisted (via no-auth-locations) service and 401 when request protected service - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:102 @ 04/04/23 18:39:29.049 (10.236s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:29.049
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:29.257 (208ms)
-
-
- > Enter [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:29.257
< Exit [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:37.143 (7.885s)
> Enter [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:32 @ 04/04/23 18:39:37.143
< Exit [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:32 @ 04/04/23 18:39:39.168 (2.025s)
> Enter [It] should return status code 200 for hosts defined in two ingresses, different path with one alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:87 @ 04/04/23 18:39:39.168
< Exit [It] should return status code 200 for hosts defined in two ingresses, different path with one alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:87 @ 04/04/23 18:39:56.292 (17.124s)
> Enter [AfterEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:56.292
< Exit [AfterEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:56.478 (186ms)
-
-
- > Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:56.478
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:03.36 (6.881s)
> Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:40:03.36
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:40:14.407 (11.047s)
> Enter [It] should set keepalive_timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:40 @ 04/04/23 18:40:14.407
< Exit [It] should set keepalive_timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:40 @ 04/04/23 18:40:24.598 (10.191s)
> Enter [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:24.598
< Exit [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:24.819 (221ms)
-
-
- > Enter [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:24.819
< Exit [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:39.201 (14.382s)
> Enter [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:38 @ 04/04/23 18:40:39.201
< Exit [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:38 @ 04/04/23 18:40:46.467 (7.266s)
> Enter [It] should set X-Forwarded-Port headers accordingly when listening on a non-default HTTP port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:48 @ 04/04/23 18:40:46.467
< Exit [It] should set X-Forwarded-Port headers accordingly when listening on a non-default HTTP port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:48 @ 04/04/23 18:40:56.662 (10.195s)
> Enter [AfterEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:56.662
< Exit [AfterEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:56.852 (191ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:19.258
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:27.76 (8.502s)
> Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:04:27.76
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:04:39.782 (12.022s)
> Enter [It] should set backend protocol to grpc:// and use grpc_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:64 @ 04/04/23 18:04:39.782
< Exit [It] should set backend protocol to grpc:// and use grpc_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:64 @ 04/04/23 18:04:49.993 (10.211s)
> Enter [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:04:49.993
< Exit [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:04:50.223 (229ms)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:50.223
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:58.145 (7.922s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:04:58.145
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:05:02.17 (4.025s)
> Enter [It] should enable modsecurity without using 'modsecurity on;' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:110 @ 04/04/23 18:05:02.17
< Exit [It] should enable modsecurity without using 'modsecurity on;' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:110 @ 04/04/23 18:05:19.394 (17.225s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:19.394
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:19.624 (230ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:19.625
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:26.544 (6.92s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:05:26.544
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:05:30.589 (4.045s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:05:30.589
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:05:58.841 (28.251s)
> Enter [It] should create additional upstream block when auth-keepalive is set with HTTP/1.x - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:623 @ 04/04/23 18:05:58.841
< Exit [It] should create additional upstream block when auth-keepalive is set with HTTP/1.x - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:623 @ 04/04/23 18:06:22.065 (23.224s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:22.065
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:22.266 (201ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:22.267
< Exit [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:29.196 (6.929s)
> Enter [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:33 @ 04/04/23 18:06:29.196
< Exit [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:33 @ 04/04/23 18:06:40.24 (11.044s)
> Enter [It] should block User-Agents defined in the ConfigMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:55 @ 04/04/23 18:06:40.24
< Exit [It] should block User-Agents defined in the ConfigMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:55 @ 04/04/23 18:06:50.425 (10.185s)
> Enter [AfterEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:50.425
< Exit [AfterEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:50.601 (177ms)
-
-
- > Enter [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:50.602
< Exit [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:57.545 (6.943s)
> Enter [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:31 @ 04/04/23 18:06:57.545
< Exit [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:31 @ 04/04/23 18:07:01.588 (4.043s)
> Enter [It] should set the X-Forwarded-Prefix to the annotation value - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:35 @ 04/04/23 18:07:01.588
< Exit [It] should set the X-Forwarded-Prefix to the annotation value - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:35 @ 04/04/23 18:07:11.685 (10.097s)
> Enter [AfterEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:11.685
< Exit [AfterEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:11.883 (198ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:11.883
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:18.774 (6.89s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:07:18.774
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:07:22.815 (4.041s)
> Enter [It] should allow correct origins - missing subdomain + origin with wildcard origin and correct origin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:535 @ 04/04/23 18:07:22.815
< Exit [It] should allow correct origins - missing subdomain + origin with wildcard origin and correct origin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:535 @ 04/04/23 18:07:29.864 (7.049s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:29.864
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:30.072 (208ms)
-
-
- > Enter [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:30.072
< Exit [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:48.992 (2m18.92s)
> Enter [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:32 @ 04/04/23 18:09:48.992
< Exit [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:32 @ 04/04/23 18:09:53.047 (4.055s)
> Enter [It] should set mirror-target to http://localhost/mirror - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:36 @ 04/04/23 18:09:53.047
< Exit [It] should set mirror-target to http://localhost/mirror - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:36 @ 04/04/23 18:10:03.229 (10.182s)
> Enter [AfterEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:03.229
< Exit [AfterEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:03.446 (217ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:03.446
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:10.362 (6.916s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:10:10.362
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:10:14.4 (4.038s)
> Enter [It] should return status code 200 when no authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:46 @ 04/04/23 18:10:14.4
< Exit [It] should return status code 200 when no authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:46 @ 04/04/23 18:10:24.616 (10.216s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:24.616
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:24.82 (204ms)
-
-
- > Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:24.821
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:31.7 (6.879s)
> Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 04/04/23 18:10:31.7
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 04/04/23 18:10:42.759 (11.059s)
> Enter [It] should respect port passed by the PROXY Protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:46 @ 04/04/23 18:10:42.759
< Exit [It] should respect port passed by the PROXY Protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:46 @ 04/04/23 18:12:14.993 (1m32.235s)
> Enter [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:14.993
< Exit [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:15.384 (390ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:15.384
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:22.265 (6.881s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:12:22.265
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:12:24.285 (2.02s)
> Enter [It] should return status code 503 when authentication is configured with an invalid secret - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:65 @ 04/04/23 18:12:24.285
< Exit [It] should return status code 503 when authentication is configured with an invalid secret - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:65 @ 04/04/23 18:12:34.441 (10.156s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:34.441
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:34.624 (183ms)
-
-
- > Enter [BeforeEach] [Setting] Add no tls redirect locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:34.624
< Exit [BeforeEach] [Setting] Add no tls redirect locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:41.556 (6.931s)
> Enter [It] Check no tls redirect locations config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_tls_redirect_locations.go:31 @ 04/04/23 18:12:41.556
< Exit [It] Check no tls redirect locations config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_tls_redirect_locations.go:31 @ 04/04/23 18:13:01.842 (20.286s)
> Enter [AfterEach] [Setting] Add no tls redirect locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:01.842
< Exit [AfterEach] [Setting] Add no tls redirect locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:02.025 (183ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:02.025
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:09.923 (7.898s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:13:09.923
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:13:13.962 (4.038s)
> Enter [It] should not allow - single origin with port and origin without port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:386 @ 04/04/23 18:13:13.962
< Exit [It] should not allow - single origin with port and origin without port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:386 @ 04/04/23 18:13:20.977 (7.016s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:20.977
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:21.159 (181ms)
-
-
- > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:21.159
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:29.044 (7.885s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:13:29.044
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:13:40.088 (11.044s)
> Enter [It] should disable the log-format-escape-json - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:55 @ 04/04/23 18:13:40.088
< Exit [It] should disable the log-format-escape-json - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:55 @ 04/04/23 18:13:50.23 (10.141s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:50.23
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:50.426 (197ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:50.427
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:57.36 (6.933s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:13:57.36
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:14:01.385 (4.026s)
> Enter [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 04/04/23 18:14:01.385
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 04/04/23 18:14:06.428
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 04/04/23 18:14:16.618
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 04/04/23 18:14:26.768
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 04/04/23 18:14:36.897
< Exit [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 04/04/23 18:14:52.087 (50.702s)
> Enter [It] should deny login for different servers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:820 @ 04/04/23 18:14:52.087
STEP: logging into server thisHost /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:821 @ 04/04/23 18:14:52.087
STEP: receiving an internal server error without cache on thisHost location /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:833 @ 04/04/23 18:14:59.113
< Exit [It] should deny login for different servers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:820 @ 04/04/23 18:15:59.128 (1m7.041s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:59.128
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:59.362 (234ms)
-
-
- > Enter [BeforeEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:59.363
< Exit [BeforeEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:06.334 (6.971s)
> Enter [It] should set ingress details variables for ingresses with host without IngressRuleValue, only Backend - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/without_host.go:55 @ 04/04/23 18:16:06.334
< Exit [It] should set ingress details variables for ingresses with host without IngressRuleValue, only Backend - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/without_host.go:55 @ 04/04/23 18:16:20.803 (14.469s)
> Enter [AfterEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:20.803
< Exit [AfterEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:21.76 (957ms)
-
-
- > Enter [BeforeEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:21.77
< Exit [BeforeEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:31.035 (9.266s)
> Enter [It] should respond with a standard redirect code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:33 @ 04/04/23 18:16:31.035
STEP: setting permanent-redirect annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:34 @ 04/04/23 18:16:31.036
STEP: sending request to redirected URL path - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:52 @ 04/04/23 18:16:41.175
< Exit [It] should respond with a standard redirect code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:33 @ 04/04/23 18:16:41.182 (10.147s)
> Enter [AfterEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:41.182
< Exit [AfterEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:41.409 (227ms)
-
-
- > Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:41.409
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:57.856 (2m16.447s)
> Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 04/04/23 18:18:57.856
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 04/04/23 18:19:09.919 (12.063s)
> Enter [It] should allow Ingress with rules - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:123 @ 04/04/23 18:19:09.919
< Exit [It] should allow Ingress with rules - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:123 @ 04/04/23 18:19:20.272 (10.353s)
> Enter [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:20.272
< Exit [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:20.675 (403ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:20.677
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:28.892 (8.215s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:19:28.892
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:19:32.924 (4.032s)
> Enter [It] should return 200 using auth-tls-match-cn where atleast one of the regex options matches CN from client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:324 @ 04/04/23 18:19:32.924
< Exit [It] should return 200 using auth-tls-match-cn where atleast one of the regex options matches CN from client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:324 @ 04/04/23 18:19:43.863 (10.939s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:43.863
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:44.064 (200ms)
-
-
- > Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:44.064
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:53.434 (9.37s)
> Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 04/04/23 18:19:53.434
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 04/04/23 18:19:55.451 (2.017s)
> Enter [It] should exists opentelemetry directive when is enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:60 @ 04/04/23 18:19:55.451
< Exit [It] should exists opentelemetry directive when is enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:60 @ 04/04/23 18:20:12.863 (17.412s)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:12.863
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:13.699 (836ms)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 04/04/23 18:20:13.699
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 04/04/23 18:20:13.699 (0s)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:13.7
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:22.723 (9.023s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:20:22.723
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:20:26.762 (4.038s)
> Enter [It] should not set invalid proxy timeouts - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:136 @ 04/04/23 18:20:26.762
< Exit [It] should not set invalid proxy timeouts - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:136 @ 04/04/23 18:20:36.907 (10.146s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:36.907
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:37.137 (230ms)
-
-
- > Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:37.137
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:45.044 (7.907s)
> Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 04/04/23 18:20:45.044
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 04/04/23 18:20:49.07 (4.026s)
> Enter [It] should not exists opentelemetry directive - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:47 @ 04/04/23 18:20:49.07
< Exit [It] should not exists opentelemetry directive - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:47 @ 04/04/23 18:21:06.287 (17.217s)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:06.287
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:06.513 (226ms)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 04/04/23 18:21:06.513
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 04/04/23 18:21:06.513 (0s)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:06.513
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:13.397 (6.884s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:21:13.397
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:21:15.42 (2.023s)
> Enter [It] should return status code 401 and cors headers when authentication and cors is configured but Authorization header is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:144 @ 04/04/23 18:21:15.42
< Exit [It] should return status code 401 and cors headers when authentication and cors is configured but Authorization header is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:144 @ 04/04/23 18:21:26.454 (11.034s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:26.454
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:26.651 (198ms)
-
-
- > Enter [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:26.652
< Exit [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:33.515 (6.863s)
> Enter [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:80 @ 04/04/23 18:21:33.515
< Exit [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:80 @ 04/04/23 18:21:43.707 (10.192s)
> Enter [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:43.707
< Exit [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:43.924 (216ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:43.924
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:50.816 (6.892s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:21:50.816
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:21:54.851 (4.035s)
> Enter [It] should allow - single origin for multiple cors values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:169 @ 04/04/23 18:21:54.851
< Exit [It] should allow - single origin for multiple cors values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:169 @ 04/04/23 18:22:01.873 (7.022s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:01.873
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:02.061 (188ms)
-
-
- > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:02.061
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:09.943 (7.882s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:22:09.943
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:22:20.994 (11.051s)
> Enter [It] log-format-escape-json enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:82 @ 04/04/23 18:22:20.994
< Exit [It] log-format-escape-json enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:82 @ 04/04/23 18:22:34.191 (13.197s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:34.191
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:34.407 (216ms)
-
-
- > Enter [BeforeEach] [Ingress] [PathType] mix Exact and Prefix paths - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:34.407
< Exit [BeforeEach] [Ingress] [PathType] mix Exact and Prefix paths - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:41.334 (6.927s)
> Enter [BeforeEach] [Ingress] [PathType] mix Exact and Prefix paths - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:33 @ 04/04/23 18:22:41.334
< Exit [BeforeEach] [Ingress] [PathType] mix Exact and Prefix paths - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:33 @ 04/04/23 18:22:45.355 (4.021s)
> Enter [It] should choose the correct location - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:39 @ 04/04/23 18:22:45.355
STEP: Checking exact request to / - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:63 @ 04/04/23 18:23:02.535
STEP: Checking prefix request to /bar - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:76 @ 04/04/23 18:23:02.543
STEP: Checking exact request to /foo - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:109 @ 04/04/23 18:23:19.72
STEP: Checking prefix request to /foo/bar - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:122 @ 04/04/23 18:23:19.723
STEP: Checking prefix request to /foobar - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:134 @ 04/04/23 18:23:19.724
< Exit [It] should choose the correct location - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:39 @ 04/04/23 18:23:19.726 (34.371s)
> Enter [AfterEach] [Ingress] [PathType] mix Exact and Prefix paths - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:19.726
< Exit [AfterEach] [Ingress] [PathType] mix Exact and Prefix paths - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:19.917 (190ms)
-
-
- > Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:19.917
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:27.858 (7.94s)
> Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:23:27.858
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:23:31.884 (4.027s)
> Enter [It] should set client_body_buffer_size to 1m - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:101 @ 04/04/23 18:23:31.884
< Exit [It] should set client_body_buffer_size to 1m - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:101 @ 04/04/23 18:23:42.035 (10.15s)
> Enter [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:42.035
< Exit [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:42.253 (218ms)
-
-
- > Enter [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:42.254
< Exit [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:50.152 (7.898s)
> Enter [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:35 @ 04/04/23 18:23:50.152
< Exit [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:35 @ 04/04/23 18:23:59.193 (9.041s)
> Enter [It] should not trust X-Forwarded headers when setting is false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:92 @ 04/04/23 18:23:59.193
< Exit [It] should not trust X-Forwarded headers when setting is false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:92 @ 04/04/23 18:24:16.594 (17.4s)
> Enter [AfterEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:16.594
< Exit [AfterEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:16.994 (401ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:16.995
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:25.428 (8.433s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:24:25.428
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:24:33.475 (8.047s)
> Enter [It] should route requests split between mainline and canary if canary weight is 100 and weight total is 200 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:834 @ 04/04/23 18:24:33.475
< Exit [It] should route requests split between mainline and canary if canary weight is 100 and weight total is 200 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:834 @ 04/04/23 18:25:28.827 (55.352s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:28.827
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:29.073 (245ms)
-
-
- > Enter [BeforeEach] [Annotations] http2-push-preload - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:29.073
< Exit [BeforeEach] [Annotations] http2-push-preload - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:35.955 (6.882s)
> Enter [BeforeEach] [Annotations] http2-push-preload - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/http2pushpreload.go:30 @ 04/04/23 18:25:35.955
< Exit [BeforeEach] [Annotations] http2-push-preload - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/http2pushpreload.go:30 @ 04/04/23 18:25:39.976 (4.021s)
> Enter [It] enable the http2-push-preload directive - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/http2pushpreload.go:34 @ 04/04/23 18:25:39.976
< Exit [It] enable the http2-push-preload directive - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/http2pushpreload.go:34 @ 04/04/23 18:25:50.116 (10.14s)
> Enter [AfterEach] [Annotations] http2-push-preload - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:50.116
< Exit [AfterEach] [Annotations] http2-push-preload - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:50.35 (233ms)
-
-
- > Enter [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:50.35
< Exit [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:57.262 (6.911s)
> Enter [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:35 @ 04/04/23 18:25:57.262
< Exit [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:35 @ 04/04/23 18:26:08.325 (11.063s)
> Enter [It] trusts X-Forwarded-For header only when setting is true - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:40 @ 04/04/23 18:26:08.325
STEP: ensuring single values are parsed correctly - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:54 @ 04/04/23 18:26:25.541
< Exit [It] trusts X-Forwarded-For header only when setting is true - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:40 @ 04/04/23 18:26:25.551 (17.226s)
> Enter [AfterEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:25.551
< Exit [AfterEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:25.758 (207ms)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:25.758
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:32.641 (6.883s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:26:32.641
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:26:36.668 (4.026s)
> Enter [It] should disable modsecurity - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:74 @ 04/04/23 18:26:36.668
< Exit [It] should disable modsecurity - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:74 @ 04/04/23 18:26:46.879 (10.212s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:46.879
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:47.059 (180ms)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:47.06
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:53.958 (6.898s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:26:53.958
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:26:57.986 (4.028s)
> Enter [It] should enable modsecurity through the config map but ignore snippet as disabled by admin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:305 @ 04/04/23 18:26:57.986
< Exit [It] should enable modsecurity through the config map but ignore snippet as disabled by admin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:305 @ 04/04/23 18:27:27.257 (29.271s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:27.257
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:27.443 (186ms)
-
-
- > Enter [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:27.443
< Exit [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:34.37 (6.927s)
> Enter [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:31 @ 04/04/23 18:27:34.37
< Exit [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:31 @ 04/04/23 18:27:38.399 (4.029s)
> Enter [It] only allow explicitly allowed IPs, deny all others - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:86 @ 04/04/23 18:27:38.399
STEP: sending request from an explicitly denied IP range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:115 @ 04/04/23 18:27:55.604
STEP: sending request from an implicitly denied IP - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:123 @ 04/04/23 18:27:55.61
STEP: sending request from an explicitly allowed IP range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:131 @ 04/04/23 18:27:55.616
STEP: sending request from an explicitly allowed IP range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:139 @ 04/04/23 18:27:55.623
< Exit [It] only allow explicitly allowed IPs, deny all others - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:86 @ 04/04/23 18:28:02.653 (24.254s)
> Enter [AfterEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:02.653
< Exit [AfterEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:02.902 (249ms)
-
-
- > Enter [BeforeEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:02.903
< Exit [BeforeEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:09.803 (6.9s)
> Enter [It] should be disabled when set to false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/multi_accept.go:49 @ 04/04/23 18:28:09.803
< Exit [It] should be disabled when set to false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/multi_accept.go:49 @ 04/04/23 18:28:20.04 (10.238s)
> Enter [AfterEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:20.041
< Exit [AfterEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:20.276 (236ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:20.277
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:28.169 (7.892s)
> Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:28:28.169
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:28:30.185 (2.016s)
> Enter [It] should set backend protocol to grpcs:// and use grpc_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:79 @ 04/04/23 18:28:30.185
< Exit [It] should set backend protocol to grpcs:// and use grpc_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:79 @ 04/04/23 18:28:40.334 (10.15s)
> Enter [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:40.334
< Exit [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:40.52 (185ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:40.52
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:47.397 (6.877s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:28:47.397
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:28:51.425 (4.028s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:28:51.425
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:29:05.527 (14.103s)
> Enter [It] should redirect to signin url when not signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:494 @ 04/04/23 18:29:05.527
< Exit [It] should redirect to signin url when not signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:494 @ 04/04/23 18:29:05.539 (12ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:05.539
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:05.766 (227ms)
-
-
- > Enter [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:05.767
< Exit [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:12.664 (6.897s)
> Enter [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:32 @ 04/04/23 18:29:12.664
< Exit [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:32 @ 04/04/23 18:29:16.693 (4.029s)
> Enter [It] should set valid proxy timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:36 @ 04/04/23 18:29:16.693
< Exit [It] should set valid proxy timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:36 @ 04/04/23 18:29:33.899 (17.207s)
> Enter [AfterEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:33.899
< Exit [AfterEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:34.123 (224ms)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:34.124
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:42.012 (7.888s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:29:42.012
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:29:46.039 (4.027s)
> Enter [It] should enable modsecurity with transaction ID and OWASP rules - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:53 @ 04/04/23 18:29:46.039
< Exit [It] should enable modsecurity with transaction ID and OWASP rules - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:53 @ 04/04/23 18:29:56.186 (10.147s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:56.186
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:56.375 (189ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:56.375
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:03.267 (6.892s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:30:03.267
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:30:07.298 (4.031s)
> Enter [It] should change the default proxy HTTP version - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:233 @ 04/04/23 18:30:07.298
< Exit [It] should change the default proxy HTTP version - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:233 @ 04/04/23 18:30:17.47 (10.172s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:17.47
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:17.686 (215ms)
-
-
- > Enter [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:17.686
< Exit [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:35.008 (2m17.322s)
> Enter [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:36 @ 04/04/23 18:32:35.008
< Exit [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:36 @ 04/04/23 18:32:39.033 (4.025s)
> Enter [It] should return the fake SSL certificate if the secret is invalid - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:82 @ 04/04/23 18:32:39.033
< Exit [It] should return the fake SSL certificate if the secret is invalid - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:82 @ 04/04/23 18:32:52.207 (13.174s)
> Enter [AfterEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:52.207
< Exit [AfterEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:52.41 (203ms)
-
-
- > Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:52.41
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:59.312 (6.902s)
> Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:32:59.312
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:33:03.343 (4.031s)
> Enter [It] should set client_body_buffer_size to 1000 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:35 @ 04/04/23 18:33:03.343
< Exit [It] should set client_body_buffer_size to 1000 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:35 @ 04/04/23 18:33:13.571 (10.227s)
> Enter [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:13.571
< Exit [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:13.79 (220ms)
-
-
- > Enter [BeforeEach] [Setting] OCSP - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:13.791
< Exit [BeforeEach] [Setting] OCSP - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:20.666 (6.876s)
> Enter [BeforeEach] [Setting] OCSP - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:45 @ 04/04/23 18:33:20.666
< Exit [BeforeEach] [Setting] OCSP - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:45 @ 04/04/23 18:33:24.686 (4.02s)
> Enter [It] should enable OCSP and contain stapling information in the connection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:49 @ 04/04/23 18:33:24.686
STEP: running cfssl gencert -initca ca_csr.json | cfssljson -bare ca - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:216 @ 04/04/23 18:33:31.697
STEP: running cfssl gencert -ca ca.pem -ca-key ca-key.pem -config=cfssl_config.json -profile=intermediate intermediate_ca_csr.json | cfssljson -bare intermediate_ca - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:216 @ 04/04/23 18:33:32.042
STEP: running cfssl gencert -ca intermediate_ca.pem -ca-key intermediate_ca-key.pem -config=cfssl_config.json -profile=ocsp ocsp_csr.json | cfssljson -bare ocsp - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:216 @ 04/04/23 18:33:32.211
STEP: running cfssl serve -db-config=db-config.json -ca-key=intermediate_ca-key.pem -ca=intermediate_ca.pem -config=cfssl_config.json -responder=ocsp.pem -responder-key=ocsp-key.pem - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:228 @ 04/04/23 18:33:32.385
STEP: running cfssl gencert -remote=localhost -profile=server leaf_csr.json | cfssljson -bare leaf - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:238 @ 04/04/23 18:33:37.385
STEP: running cfssl ocsprefresh -ca intermediate_ca.pem -responder=ocsp.pem -responder-key=ocsp-key.pem -db-config=db-config.json - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:252 @ 04/04/23 18:33:37.548
< Exit [It] should enable OCSP and contain stapling information in the connection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:49 @ 04/04/23 18:34:06.016 (41.33s)
> Enter [AfterEach] [Setting] OCSP - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:06.016
< Exit [AfterEach] [Setting] OCSP - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:06.329 (312ms)
-
-
- > Enter [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:06.329
< Exit [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:13.238 (6.909s)
> Enter [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:38 @ 04/04/23 18:34:13.238
< Exit [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:38 @ 04/04/23 18:34:17.265 (4.027s)
> Enter [It] should allow multiple auth with satisfy any - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:84 @ 04/04/23 18:34:17.265
< Exit [It] should allow multiple auth with satisfy any - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:84 @ 04/04/23 18:34:33.244 (15.979s)
> Enter [AfterEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:33.244
< Exit [AfterEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:33.413 (169ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:33.413
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:40.3 (6.887s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:34:40.3
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:34:44.318 (4.018s)
> Enter [It] should not set snippet "proxy_set_header My-Custom-Header 42;" when external auth is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:284 @ 04/04/23 18:34:44.318
< Exit [It] should not set snippet "proxy_set_header My-Custom-Header 42;" when external auth is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:284 @ 04/04/23 18:34:54.489 (10.171s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:54.489
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:54.674 (185ms)
-
-
- > Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:54.674
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:01.542 (6.868s)
> Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 04/04/23 18:35:01.542
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 04/04/23 18:35:15.829 (14.287s)
> Enter [It] handles endpoints only changes consistently (down scaling of replicas vs. empty service) - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:125 @ 04/04/23 18:35:15.829
< Exit [It] handles endpoints only changes consistently (down scaling of replicas vs. empty service) - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:125 @ 04/04/23 18:35:42.1 (26.271s)
> Enter [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:42.1
< Exit [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:42.298 (198ms)
-
-
- > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:42.298
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:50.176 (7.878s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:35:50.176
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:35:54.197 (4.021s)
> Enter [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 04/04/23 18:35:54.197
Apr 4 18:36:03.338: INFO: Unexpected TLS error: tls: failed to verify certificate: x509: certificate is valid for ingress.local, not settings-tls
< Exit [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 04/04/23 18:36:05.327 (11.13s)
> Enter [It] setting preload parameter - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:146 @ 04/04/23 18:36:05.327
< Exit [It] setting preload parameter - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:146 @ 04/04/23 18:36:15.512 (10.185s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:15.512
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:15.744 (233ms)
-
-
- > Enter [BeforeEach] [Endpointslices] long service name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:15.745
< Exit [BeforeEach] [Endpointslices] long service name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:23.617 (7.872s)
> Enter [BeforeEach] [Endpointslices] long service name - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/longname.go:34 @ 04/04/23 18:36:23.617
< Exit [BeforeEach] [Endpointslices] long service name - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/longname.go:34 @ 04/04/23 18:36:27.64 (4.023s)
> Enter [It] should return 200 when service name has max allowed number of characters 63 - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/longname.go:38 @ 04/04/23 18:36:27.64
STEP: checking if the service is reached - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/longname.go:48 @ 04/04/23 18:36:37.807
< Exit [It] should return 200 when service name has max allowed number of characters 63 - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/longname.go:38 @ 04/04/23 18:36:37.815 (10.175s)
> Enter [AfterEach] [Endpointslices] long service name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:37.815
< Exit [AfterEach] [Endpointslices] long service name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:38.05 (235ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:38.05
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:45.936 (7.886s)
> Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 04/04/23 18:36:45.936
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 04/04/23 18:36:47.961 (2.026s)
> Enter [It] should add fastcgi_index in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:54 @ 04/04/23 18:36:47.961
< Exit [It] should add fastcgi_index in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:54 @ 04/04/23 18:36:58.079 (10.118s)
> Enter [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:58.079
< Exit [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:58.306 (226ms)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:58.306
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:16.416 (2m18.11s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:39:16.416
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:39:20.463 (4.047s)
> Enter [It] should enable modsecurity globally and with modsecurity-snippet block requests - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:189 @ 04/04/23 18:39:20.463
< Exit [It] should enable modsecurity globally and with modsecurity-snippet block requests - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:189 @ 04/04/23 18:39:49.668 (29.205s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:49.668
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:49.888 (220ms)
-
-
- > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:49.888
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:57.8 (7.912s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:39:57.8
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:40:01.823 (4.023s)
> Enter [It] should not use ports during the HTTP to HTTPS redirection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:187 @ 04/04/23 18:40:01.823
Apr 4 18:40:10.971: INFO: Unexpected TLS error: tls: failed to verify certificate: x509: certificate is valid for ingress.local, not settings-tls
< Exit [It] should not use ports during the HTTP to HTTPS redirection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:187 @ 04/04/23 18:40:12.979 (11.155s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:12.979
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:13.188 (209ms)
-
-
- > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:13.188
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:21.087 (7.899s)
> Enter [It] should return 200 for service type=ExternalName with a port defined - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:129 @ 04/04/23 18:40:21.087
< Exit [It] should return 200 for service type=ExternalName with a port defined - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:129 @ 04/04/23 18:40:31.585 (10.498s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:31.585
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:31.773 (188ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:31.773
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:38.672 (6.898s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:40:38.672
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:40:42.706 (4.034s)
> Enter [BeforeEach] when external authentication is configured with a custom redirect param - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:651 @ 04/04/23 18:40:42.706
< Exit [BeforeEach] when external authentication is configured with a custom redirect param - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:651 @ 04/04/23 18:40:56.901 (14.195s)
> Enter [It] should redirect to signin url when not signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:687 @ 04/04/23 18:40:56.901
< Exit [It] should redirect to signin url when not signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:687 @ 04/04/23 18:40:56.912 (10ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:56.912
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:57.097 (186ms)
-
-
- I0404 18:04:54.427675 25 request.go:690] Waited for 1.19834838s due to client-side throttling, not priority and fairness, request: GET:https://10.96.0.1:443/api/v1/namespaces/e2e-tests-limit-connections-1680631459257336272-jn44f/services/nginx-ingress-controller
- > Enter [BeforeEach] [Annotations] Annotation - limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:19.256
< Exit [BeforeEach] [Annotations] Annotation - limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:26.817 (7.56s)
> Enter [BeforeEach] [Annotations] Annotation - limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitconnections.go:34 @ 04/04/23 18:04:26.817
< Exit [BeforeEach] [Annotations] Annotation - limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitconnections.go:34 @ 04/04/23 18:04:38.845 (12.028s)
> Enter [It] should limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitconnections.go:38 @ 04/04/23 18:04:38.845
< Exit [It] should limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitconnections.go:38 @ 04/04/23 18:05:03.259 (24.414s)
> Enter [AfterEach] [Annotations] Annotation - limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:03.259
< Exit [AfterEach] [Annotations] Annotation - limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:03.482 (224ms)
-
-
- > Enter [BeforeEach] [Ingress] [PathType] exact - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:03.483
< Exit [BeforeEach] [Ingress] [PathType] exact - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:10.366 (6.883s)
> Enter [BeforeEach] [Ingress] [PathType] exact - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_exact.go:33 @ 04/04/23 18:05:10.366
< Exit [BeforeEach] [Ingress] [PathType] exact - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_exact.go:33 @ 04/04/23 18:05:14.405 (4.039s)
> Enter [It] should choose exact location for /exact - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_exact.go:37 @ 04/04/23 18:05:14.405
< Exit [It] should choose exact location for /exact - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_exact.go:37 @ 04/04/23 18:05:41.807 (27.402s)
> Enter [AfterEach] [Ingress] [PathType] exact - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:41.807
< Exit [AfterEach] [Ingress] [PathType] exact - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:42.078 (271ms)
-
-
- > Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:42.079
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:50.08 (8.002s)
> Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 04/04/23 18:05:50.08
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 04/04/23 18:05:54.108 (4.028s)
> Enter [It] [BAD_ANNOTATIONS] should drop an ingress if there is an invalid character in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:36 @ 04/04/23 18:05:54.108
< Exit [It] [BAD_ANNOTATIONS] should drop an ingress if there is an invalid character in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:36 @ 04/04/23 18:06:21.53 (27.422s)
> Enter [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:21.53
< Exit [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:21.804 (274ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:21.804
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:28.705 (6.901s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:06:28.705
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:06:32.732 (4.027s)
> Enter [It] should not break functionality - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:267 @ 04/04/23 18:06:32.732
< Exit [It] should not break functionality - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:267 @ 04/04/23 18:06:39.756 (7.024s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:39.756
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:39.957 (201ms)
-
-
- > Enter [BeforeEach] [Annotations] app-root - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:39.958
< Exit [BeforeEach] [Annotations] app-root - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:47.864 (7.907s)
> Enter [BeforeEach] [Annotations] app-root - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/approot.go:31 @ 04/04/23 18:06:47.864
< Exit [BeforeEach] [Annotations] app-root - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/approot.go:31 @ 04/04/23 18:06:51.912 (4.047s)
> Enter [It] should redirect to /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/approot.go:35 @ 04/04/23 18:06:51.912
< Exit [It] should redirect to /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/approot.go:35 @ 04/04/23 18:07:02.086 (10.175s)
> Enter [AfterEach] [Annotations] app-root - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:02.086
< Exit [AfterEach] [Annotations] app-root - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:02.297 (211ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:02.297
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:10.188 (7.891s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:07:10.188
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:07:14.226 (4.037s)
> Enter [It] should return 200 using auth-tls-match-cn with matching CN from client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:295 @ 04/04/23 18:07:14.226
< Exit [It] should return 200 using auth-tls-match-cn with matching CN from client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:295 @ 04/04/23 18:07:25.018 (10.792s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:25.018
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:25.219 (201ms)
-
-
- > Enter [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:25.22
< Exit [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:33.104 (7.884s)
> Enter [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:31 @ 04/04/23 18:07:33.104
< Exit [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:31 @ 04/04/23 18:07:35.129 (2.025s)
> Enter [It] only deny explicitly denied IPs, allow all others - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:35 @ 04/04/23 18:07:35.129
STEP: sending request from an explicitly denied IP range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:61 @ 04/04/23 18:07:52.29
STEP: sending request from an explicitly denied IP address - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:69 @ 04/04/23 18:07:52.298
STEP: sending request from an implicitly allowed IP range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:77 @ 04/04/23 18:07:52.304
< Exit [It] only deny explicitly denied IPs, allow all others - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:35 @ 04/04/23 18:07:59.326 (24.197s)
> Enter [AfterEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:59.326
< Exit [AfterEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:59.52 (194ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:59.52
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:06.412 (6.892s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:08:06.412
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:08:14.461 (8.049s)
> Enter [It] should not use canary with domain as a server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:891 @ 04/04/23 18:08:14.461
< Exit [It] should not use canary with domain as a server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:891 @ 04/04/23 18:08:31.701 (17.24s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:31.701
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:31.909 (208ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:31.909
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:39.801 (7.892s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:08:39.801
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:08:43.836 (4.035s)
> Enter [It] should set "proxy_set_header 'My-Custom-Header' '42';" when auth-headers are set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:301 @ 04/04/23 18:08:43.836
< Exit [It] should set "proxy_set_header 'My-Custom-Header' '42';" when auth-headers are set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:301 @ 04/04/23 18:08:54.106 (10.269s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:54.106
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:54.318 (212ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:54.318
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:01.207 (6.889s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:09:01.207
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:09:09.264 (8.058s)
> Enter [It] should routes to mainline upstream when the given Regex causes error - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:566 @ 04/04/23 18:09:09.264
STEP: routing requests to the mainline upstream when the given Regex causes error - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:591 @ 04/04/23 18:09:26.43
< Exit [It] should routes to mainline upstream when the given Regex causes error - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:566 @ 04/04/23 18:09:26.434 (17.169s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:26.434
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:26.658 (224ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:26.658
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:33.593 (6.935s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:09:33.593
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:09:37.637 (4.044s)
> Enter [It] should delete Ingress when class is removed - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:192 @ 04/04/23 18:09:37.637
< Exit [It] should delete Ingress when class is removed - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:192 @ 04/04/23 18:10:02.989 (25.352s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:02.989
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:03.188 (199ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:03.189
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:11.089 (7.901s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:10:11.09
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:10:19.123 (8.033s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:10:19.123
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 04/04/23 18:10:19.123
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 04/04/23 18:10:29.295
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 04/04/23 18:10:39.491
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:10:49.631 (30.509s)
> Enter [It] should proxy_method method when global-auth-method is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:197 @ 04/04/23 18:10:49.631
STEP: Adding a global-auth-method to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:202 @ 04/04/23 18:10:49.631
< Exit [It] should proxy_method method when global-auth-method is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:197 @ 04/04/23 18:10:59.844 (10.213s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:59.844
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:00.053 (208ms)
-
-
- > Enter [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:00.053
< Exit [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:17.888 (2m17.835s)
> Enter [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:32 @ 04/04/23 18:13:17.888
< Exit [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:32 @ 04/04/23 18:13:21.926 (4.038s)
> Enter [It] should not set invalid proxy timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:52 @ 04/04/23 18:13:21.926
< Exit [It] should not set invalid proxy timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:52 @ 04/04/23 18:13:39.103 (17.177s)
> Enter [AfterEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:39.103
< Exit [AfterEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:39.316 (214ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:39.317
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:46.2 (6.883s)
> Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 04/04/23 18:13:46.2
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 04/04/23 18:13:51.228 (5.028s)
> Enter [It] should add fastcgi_param in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:71 @ 04/04/23 18:13:51.228
< Exit [It] should add fastcgi_param in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:71 @ 04/04/23 18:14:01.351 (10.123s)
> Enter [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:01.351
< Exit [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:01.572 (222ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:01.573
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:08.451 (6.878s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:14:08.451
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:14:12.484 (4.033s)
> Enter [It] should enable cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:35 @ 04/04/23 18:14:12.484
< Exit [It] should enable cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:35 @ 04/04/23 18:14:22.62 (10.136s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:22.62
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:22.8 (179ms)
-
-
- > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:22.8
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:29.697 (6.897s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:14:29.697
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:14:33.724 (4.026s)
> Enter [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 04/04/23 18:14:33.724
< Exit [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 04/04/23 18:14:43.071 (9.347s)
> Enter [It] overriding what's set from the upstream - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:166 @ 04/04/23 18:14:43.071
< Exit [It] overriding what's set from the upstream - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:166 @ 04/04/23 18:14:50.277 (7.207s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:50.277
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:50.564 (287ms)
-
-
- > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:50.566
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:57.791 (7.225s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:14:57.791
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:15:01.819 (4.028s)
> Enter [It] picks up the previously missing secret for a given ingress without reloading - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:70 @ 04/04/23 18:15:01.819
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:94 @ 04/04/23 18:15:18.959
STEP: skipping Nginx reload - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:101 @ 04/04/23 18:15:21.991
< Exit [It] picks up the previously missing secret for a given ingress without reloading - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:70 @ 04/04/23 18:15:22.003 (20.184s)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:22.003
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:22.173 (170ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:22.173
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:30.052 (7.879s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:15:30.052
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:15:32.076 (2.024s)
> Enter [It] should disable cors allow credentials - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:94 @ 04/04/23 18:15:32.076
< Exit [It] should disable cors allow credentials - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:94 @ 04/04/23 18:15:42.292 (10.217s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:42.292
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:42.533 (240ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:42.533
< Exit [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:49.463 (6.93s)
> Enter [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:43 @ 04/04/23 18:15:49.463
< Exit [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:43 @ 04/04/23 18:16:08.363 (18.9s)
> Enter [It] should return status code 200 when accessing '/noauth' unauthenticated - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:82 @ 04/04/23 18:16:08.363
< Exit [It] should return status code 200 when accessing '/noauth' unauthenticated - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:82 @ 04/04/23 18:16:11.514 (3.151s)
> Enter [AfterEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:11.514
< Exit [AfterEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:11.73 (216ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:11.73
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:18.612 (6.881s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:16:18.612
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:16:28.726 (10.115s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:16:28.726
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 04/04/23 18:16:28.726
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 04/04/23 18:16:38.887
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 04/04/23 18:16:49.114
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:16:59.322 (30.595s)
> Enter [It] should return status code 401 when request any protected service - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:85 @ 04/04/23 18:16:59.322
STEP: Sending a request to protected service /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:87 @ 04/04/23 18:16:59.322
STEP: Sending a request to protected service /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:94 @ 04/04/23 18:16:59.333
< Exit [It] should return status code 401 when request any protected service - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:85 @ 04/04/23 18:16:59.342 (20ms)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:59.342
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:59.57 (229ms)
-
-
- > Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:59.571
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:06.433 (6.862s)
> Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 04/04/23 18:17:06.433
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 04/04/23 18:17:18.505 (12.072s)
> Enter [It] should ignore catch all Ingress with backend and rules - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:69 @ 04/04/23 18:17:18.505
< Exit [It] should ignore catch all Ingress with backend and rules - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:69 @ 04/04/23 18:17:28.675 (10.171s)
> Enter [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:28.675
< Exit [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:28.85 (174ms)
-
-
- > Enter [BeforeEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:28.85
< Exit [BeforeEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:37.72 (8.87s)
> Enter [It] should have worker_rlimit_nofile option - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_options.go:31 @ 04/04/23 18:17:37.72
< Exit [It] should have worker_rlimit_nofile option - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_options.go:31 @ 04/04/23 18:17:40.919 (3.199s)
> Enter [AfterEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:40.919
< Exit [AfterEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:41.126 (207ms)
-
-
- > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:41.126
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:49.014 (7.887s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:17:49.014
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 04/04/23 18:17:53.032 (4.018s)
> Enter [It] should not use ports or X-Forwarded-Host during the HTTP to HTTPS redirection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:205 @ 04/04/23 18:17:53.032
Apr 4 18:18:09.269: INFO: Unexpected TLS error: tls: failed to verify certificate: x509: certificate is valid for ingress.local, not settings-tls
< Exit [It] should not use ports or X-Forwarded-Host during the HTTP to HTTPS redirection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:205 @ 04/04/23 18:18:11.272 (18.241s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:11.272
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:11.48 (208ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:11.48
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:18.335 (6.854s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:18:18.335
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:18:22.355 (4.02s)
> Enter [It] should build proxy next upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:194 @ 04/04/23 18:18:22.355
< Exit [It] should build proxy next upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:194 @ 04/04/23 18:18:32.501 (10.146s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:32.501
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:32.736 (236ms)
-
-
- > Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:32.737
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:39.632 (6.895s)
> Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 04/04/23 18:18:39.632
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 04/04/23 18:18:50.669 (11.037s)
> Enter [It] should respect proto passed by the PROXY Protocol server port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:79 @ 04/04/23 18:18:50.669
< Exit [It] should respect proto passed by the PROXY Protocol server port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:79 @ 04/04/23 18:20:22.888 (1m32.219s)
> Enter [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:22.888
< Exit [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:23.276 (388ms)
-
-
- > Enter [BeforeEach] [Annotations] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:23.277
< Exit [BeforeEach] [Annotations] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:31.164 (7.887s)
> Enter [BeforeEach] [Annotations] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/sslciphers.go:31 @ 04/04/23 18:20:31.164
< Exit [BeforeEach] [Annotations] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/sslciphers.go:31 @ 04/04/23 18:20:33.226 (2.062s)
> Enter [It] should change ssl ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/sslciphers.go:35 @ 04/04/23 18:20:33.226
< Exit [It] should change ssl ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/sslciphers.go:35 @ 04/04/23 18:20:43.402 (10.176s)
> Enter [AfterEach] [Annotations] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:43.402
< Exit [AfterEach] [Annotations] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:43.603 (201ms)
-
-
- > Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:43.603
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:50.486 (6.883s)
> Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:20:50.486
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:20:54.514 (4.028s)
> Enter [It] should set client_body_buffer_size to 1k - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:79 @ 04/04/23 18:20:54.514
< Exit [It] should set client_body_buffer_size to 1k - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:79 @ 04/04/23 18:21:04.738 (10.224s)
> Enter [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:04.738
< Exit [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:04.947 (209ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:04.947
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:11.835 (6.888s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:21:11.835
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:21:15.853 (4.017s)
> Enter [It] should turn off proxy-request-buffering - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:179 @ 04/04/23 18:21:15.853
< Exit [It] should turn off proxy-request-buffering - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:179 @ 04/04/23 18:21:26.03 (10.178s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:26.03
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:26.226 (196ms)
-
-
- > Enter [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:26.227
< Exit [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:34.123 (7.896s)
> Enter [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:33 @ 04/04/23 18:21:34.123
< Exit [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:33 @ 04/04/23 18:21:38.158 (4.035s)
> Enter [It] should get information for a specific backend server - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:56 @ 04/04/23 18:21:38.158
< Exit [It] should get information for a specific backend server - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:56 @ 04/04/23 18:21:48.595 (10.437s)
> Enter [AfterEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:48.595
< Exit [AfterEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:48.793 (198ms)
-
-
- > Enter [BeforeEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:98 @ 04/04/23 18:21:48.794
< Exit [BeforeEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:98 @ 04/04/23 18:21:50.797 (2.003s)
> Enter [It] start nginx with default configuration - /go/src/k8s.io/ingress-nginx/test/e2e/nginx/nginx.go:102 @ 04/04/23 18:21:50.797
< Exit [It] start nginx with default configuration - /go/src/k8s.io/ingress-nginx/test/e2e/nginx/nginx.go:102 @ 04/04/23 18:21:59.838 (9.042s)
> Enter [AfterEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:99 @ 04/04/23 18:21:59.839
< Exit [AfterEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:99 @ 04/04/23 18:21:59.841 (3ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:59.842
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:07.232 (7.39s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:22:07.232
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:22:11.252 (4.02s)
> Enter [It] should set cors max-age - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:78 @ 04/04/23 18:22:11.252
< Exit [It] should set cors max-age - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:78 @ 04/04/23 18:22:21.435 (10.182s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:21.435
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:21.724 (289ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:21.725
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:29.212 (7.488s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:22:29.212
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:22:33.245 (4.033s)
> Enter [It] should allow - matching origin+port with wildcard origin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:488 @ 04/04/23 18:22:33.245
< Exit [It] should allow - matching origin+port with wildcard origin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:488 @ 04/04/23 18:22:40.278 (7.032s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:40.278
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:40.502 (224ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:40.502
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:47.367 (6.865s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:22:47.368
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:22:51.389 (4.021s)
> Enter [It] should change cookie name on ingress definition change - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:64 @ 04/04/23 18:22:51.389
< Exit [It] should change cookie name on ingress definition change - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:64 @ 04/04/23 18:23:06.598 (15.209s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:06.598
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:06.803 (205ms)
-
-
- > Enter [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:06.804
< Exit [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:13.683 (6.879s)
> Enter [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:31 @ 04/04/23 18:23:13.683
< Exit [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:31 @ 04/04/23 18:23:17.702 (4.019s)
> Enter [It] should add value of server-snippet setting to all ingress config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:35 @ 04/04/23 18:23:17.702
< Exit [It] should add value of server-snippet setting to all ingress config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:35 @ 04/04/23 18:23:50.157 (32.455s)
> Enter [AfterEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:50.157
< Exit [AfterEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:50.365 (209ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:50.366
< Exit [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:57.248 (6.882s)
> Enter [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:33 @ 04/04/23 18:23:57.248
< Exit [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:33 @ 04/04/23 18:24:06.308 (9.06s)
> Enter [It] should block Referers defined in the ConfigMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:88 @ 04/04/23 18:24:06.308
< Exit [It] should block Referers defined in the ConfigMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:88 @ 04/04/23 18:24:16.602 (10.294s)
> Enter [AfterEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:16.602
< Exit [AfterEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:17.016 (414ms)
-
-
- > Enter [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:17.016
< Exit [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:25.558 (8.541s)
> Enter [It] should set gzip_types to application/javascript - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:89 @ 04/04/23 18:24:25.558
< Exit [It] should set gzip_types to application/javascript - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:89 @ 04/04/23 18:24:42.749 (17.191s)
> Enter [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:42.749
< Exit [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:42.994 (245ms)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:42.994
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:49.859 (6.865s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:24:49.859
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:24:55.885 (6.025s)
> Enter [It] should exists opentracing_operation_name directive when is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:115 @ 04/04/23 18:24:55.885
< Exit [It] should exists opentracing_operation_name directive when is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:115 @ 04/04/23 18:25:13.047 (17.162s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:13.047
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:13.223 (176ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:25:13.223
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:25:13.223 (0s)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:13.223
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:21.122 (7.899s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:25:21.122
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:25:27.151 (6.029s)
> Enter [It] should not allow - single origin for multiple cors values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:196 @ 04/04/23 18:25:27.151
< Exit [It] should not allow - single origin for multiple cors values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:196 @ 04/04/23 18:25:34.17 (7.019s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:34.17
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:34.371 (201ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:34.371
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:41.275 (6.904s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:25:41.275
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:25:49.318 (8.044s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:25:49.318
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 04/04/23 18:25:49.318
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 04/04/23 18:25:59.469
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 04/04/23 18:26:09.647
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:26:19.839 (30.521s)
> Enter [It] should set snippet when global external auth is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:250 @ 04/04/23 18:26:19.839
STEP: Adding a global-auth-snippet to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:254 @ 04/04/23 18:26:19.839
< Exit [It] should set snippet when global external auth is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:250 @ 04/04/23 18:26:29.995 (10.156s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:29.995
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:30.195 (200ms)
-
-
- > Enter [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:30.195
< Exit [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:37.066 (6.871s)
> Enter [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:31 @ 04/04/23 18:26:37.066
< Exit [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:31 @ 04/04/23 18:26:41.082 (4.015s)
> Enter [It] add valid directives to server via server snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:35 @ 04/04/23 18:26:41.082
< Exit [It] add valid directives to server via server snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:35 @ 04/04/23 18:26:51.227 (10.145s)
> Enter [AfterEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:51.227
< Exit [AfterEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:51.453 (226ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:51.453
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:58.324 (6.87s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:26:58.324
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:27:02.348 (4.024s)
> Enter [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 04/04/23 18:27:02.348
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 04/04/23 18:27:07.377
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 04/04/23 18:27:17.563
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 04/04/23 18:27:27.77
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 04/04/23 18:27:37.89
< Exit [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 04/04/23 18:27:53.085 (50.737s)
> Enter [It] should deny login for different location on same server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:792 @ 04/04/23 18:27:53.085
STEP: receiving an internal server error without cache on location /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:811 @ 04/04/23 18:28:00.105
< Exit [It] should deny login for different location on same server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:792 @ 04/04/23 18:29:00.109 (1m7.024s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:00.109
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:00.314 (205ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:00.314
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:08.193 (7.878s)
> Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 04/04/23 18:29:08.193
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 04/04/23 18:29:10.222 (2.029s)
> Enter [It] should return OK for service with backend protocol FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:102 @ 04/04/23 18:29:10.222
< Exit [It] should return OK for service with backend protocol FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:102 @ 04/04/23 18:29:20.442 (10.22s)
> Enter [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:20.442
< Exit [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:20.65 (208ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:20.651
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:27.592 (6.941s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:29:27.592
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:29:35.635 (8.044s)
> Enter [It] should route requests only to canary if canary weight is equal to canary weight total - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:775 @ 04/04/23 18:29:35.635
< Exit [It] should route requests only to canary if canary weight is equal to canary weight total - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:775 @ 04/04/23 18:29:52.866 (17.23s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:52.866
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:53.101 (235ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] modsecurity-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:53.101
< Exit [BeforeEach] [Setting] [Security] modsecurity-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:00.998 (7.896s)
> Enter [It] should add value of modsecurity-snippet setting to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/modsecurity/modsecurity_snippet.go:30 @ 04/04/23 18:30:00.998
< Exit [It] should add value of modsecurity-snippet setting to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/modsecurity/modsecurity_snippet.go:30 @ 04/04/23 18:30:11.215 (10.217s)
> Enter [AfterEach] [Setting] [Security] modsecurity-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:11.215
< Exit [AfterEach] [Setting] [Security] modsecurity-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:11.436 (221ms)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:11.436
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:18.304 (6.868s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:30:18.304
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:30:22.331 (4.027s)
> Enter [It] should exists opentracing directive when is enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:71 @ 04/04/23 18:30:22.331
< Exit [It] should exists opentracing directive when is enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:71 @ 04/04/23 18:30:39.546 (17.216s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:39.546
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:39.763 (217ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:30:39.763
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:30:39.763 (0s)
-
-
- > Enter [BeforeEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:39.763
< Exit [BeforeEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:47.146 (7.383s)
> Enter [It] Check persistent affinity mode - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinitymode.go:67 @ 04/04/23 18:30:47.146
< Exit [It] Check persistent affinity mode - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinitymode.go:67 @ 04/04/23 18:32:47.648 (2m0.502s)
> Enter [AfterEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:47.648
< Exit [AfterEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:47.827 (179ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:47.827
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:04.512 (2m16.685s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:35:04.512
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:35:08.555 (4.042s)
> Enter [It] should ignore Ingress with a different class annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:68 @ 04/04/23 18:35:08.555
< Exit [It] should ignore Ingress with a different class annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:68 @ 04/04/23 18:35:25.764 (17.209s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:25.764
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:25.96 (196ms)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:25.96
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:33.883 (7.923s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:35:33.883
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:35:37.911 (4.028s)
> Enter [It] should enable opentracing using jaeger - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:172 @ 04/04/23 18:35:37.911
< Exit [It] should enable opentracing using jaeger - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:172 @ 04/04/23 18:35:57.93 (20.019s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:57.93
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:58.103 (173ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:35:58.103
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:35:58.103 (0s)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:58.104
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:05.96 (7.857s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:36:05.96
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:36:14.017 (8.056s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:36:14.017
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 04/04/23 18:36:14.017
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 04/04/23 18:36:24.203
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 04/04/23 18:36:34.361
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:36:44.521 (30.504s)
> Enter [It] should add custom error page when global-auth-signin url is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:210 @ 04/04/23 18:36:44.521
STEP: Adding a global-auth-signin to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:215 @ 04/04/23 18:36:44.521
< Exit [It] should add custom error page when global-auth-signin url is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:210 @ 04/04/23 18:36:54.694 (10.173s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:54.694
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:54.922 (228ms)
-
-
- > Enter [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:54.922
< Exit [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:02.365 (7.443s)
> Enter [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:31 @ 04/04/23 18:37:02.365
< Exit [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:31 @ 04/04/23 18:37:08.389 (6.023s)
> Enter [It] disable-stream-access-log set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:71 @ 04/04/23 18:37:08.389
< Exit [It] disable-stream-access-log set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:71 @ 04/04/23 18:37:25.61 (17.222s)
> Enter [AfterEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:25.611
< Exit [AfterEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:25.869 (258ms)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:25.869
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:32.759 (6.89s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:37:32.759
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:37:36.785 (4.026s)
> Enter [It] should enable opentracing using jaeger with sampler host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:184 @ 04/04/23 18:37:36.785
< Exit [It] should enable opentracing using jaeger with sampler host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:184 @ 04/04/23 18:37:56.815 (20.03s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:56.815
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:57.041 (227ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:37:57.041
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:37:57.041 (0s)
-
-
- > Enter [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:57.042
< Exit [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:04.9 (7.858s)
> Enter [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:34 @ 04/04/23 18:38:04.9
< Exit [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:34 @ 04/04/23 18:38:15.932 (11.032s)
> Enter [It] Add a custom header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:40 @ 04/04/23 18:38:15.932
< Exit [It] Add a custom header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:40 @ 04/04/23 18:38:26.137 (10.204s)
> Enter [AfterEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:26.137
< Exit [AfterEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:26.471 (334ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:26.471
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:33.322 (6.851s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:38:33.322
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:38:37.351 (4.029s)
> Enter [It] should serve Ingress when class is updated between annotation and ingressClassName - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:323 @ 04/04/23 18:38:37.351
< Exit [It] should serve Ingress when class is updated between annotation and ingressClassName - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:323 @ 04/04/23 18:39:02.787 (25.436s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:02.787
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:03.018 (231ms)
-
-
- > Enter [BeforeEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:03.025
< Exit [BeforeEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:11.02 (7.995s)
> Enter [It] should return 503 when all backend service endpoints are unavailable - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_backend.go:54 @ 04/04/23 18:39:11.02
< Exit [It] should return 503 when all backend service endpoints are unavailable - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_backend.go:54 @ 04/04/23 18:39:21.316 (10.296s)
> Enter [AfterEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:21.316
< Exit [AfterEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:21.504 (188ms)
-
-
- > Enter [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:21.504
< Exit [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:29.492 (7.988s)
> Enter [It] should set gzip_disable to msie6 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:67 @ 04/04/23 18:39:29.492
< Exit [It] should set gzip_disable to msie6 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:67 @ 04/04/23 18:39:46.643 (17.151s)
> Enter [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:46.643
< Exit [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:46.835 (192ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:46.835
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:53.72 (6.885s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:39:53.72
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:40:01.768 (8.048s)
> Enter [It] routes traffic to either mainline or canary backend (legacy behavior) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:1058 @ 04/04/23 18:40:01.768
< Exit [It] routes traffic to either mainline or canary backend (legacy behavior) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:1058 @ 04/04/23 18:40:57.335 (55.567s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:57.335
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:57.533 (198ms)
-
-
- > Enter [BeforeEach] [Status] status update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:19.249
< Exit [BeforeEach] [Status] status update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:26.794 (7.545s)
> Enter [It] should update status field after client-go reconnection - /go/src/k8s.io/ingress-nginx/test/e2e/status/update.go:43 @ 04/04/23 18:04:26.794
Apr 4 18:04:26.794: INFO: Asynchronously running '/bin/bash -c /usr/local/bin/kubectl proxy --accept-hosts=.* --address=0.0.0.0 --port=0'
Apr 4 18:04:49.019: INFO: waiting for leader election and initial status update
Apr 4 18:05:29.033: INFO: Asynchronously running '/bin/bash -c /usr/local/bin/kubectl proxy --accept-hosts=.* --address=0.0.0.0 --port=42431'
< Exit [It] should update status field after client-go reconnection - /go/src/k8s.io/ingress-nginx/test/e2e/status/update.go:43 @ 04/04/23 18:05:39.069 (1m12.275s)
> Enter [AfterEach] [Status] status update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:39.069
< Exit [AfterEach] [Status] status update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:39.293 (225ms)
-
-
- > Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:39.294
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:46.218 (6.925s)
> Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:05:46.218
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 04/04/23 18:05:50.239 (4.02s)
> Enter [It] should set client_body_buffer_size to 1M - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:123 @ 04/04/23 18:05:50.239
< Exit [It] should set client_body_buffer_size to 1M - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:123 @ 04/04/23 18:06:00.422 (10.184s)
> Enter [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:00.422
< Exit [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:00.649 (227ms)
-
-
- > Enter [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:00.649
< Exit [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:07.542 (6.893s)
> Enter [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:32 @ 04/04/23 18:06:07.542
< Exit [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:32 @ 04/04/23 18:06:11.569 (4.027s)
> Enter [It] should exist a proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:36 @ 04/04/23 18:06:11.569
< Exit [It] should exist a proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:36 @ 04/04/23 18:06:21.772 (10.203s)
> Enter [AfterEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:21.772
< Exit [AfterEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:21.963 (191ms)
-
-
- > Enter [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:21.964
< Exit [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:28.888 (6.924s)
> Enter [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:34 @ 04/04/23 18:06:28.888
< Exit [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:34 @ 04/04/23 18:06:39.938 (11.05s)
> Enter [It] Add multiple custom headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:65 @ 04/04/23 18:06:39.938
< Exit [It] Add multiple custom headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:65 @ 04/04/23 18:06:50.151 (10.213s)
> Enter [AfterEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:50.151
< Exit [AfterEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:50.374 (223ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:50.375
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:57.307 (6.932s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:06:57.307
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:07:05.355 (8.048s)
> Enter [It] should route requests to the correct upstream if mainline ingress is created before the canary ingress - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:161 @ 04/04/23 18:07:05.355
STEP: routing requests destined for the mainline ingress to the maineline upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:185 @ 04/04/23 18:07:22.519
STEP: routing requests destined for the canary ingress to the canary upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:195 @ 04/04/23 18:07:22.526
< Exit [It] should route requests to the correct upstream if mainline ingress is created before the canary ingress - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:161 @ 04/04/23 18:07:22.534 (17.179s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:22.534
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:22.759 (225ms)
-
-
- > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:22.759
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:29.671 (6.912s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:07:29.671
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:07:40.702 (11.031s)
> Enter [It] should set proxy-headers-hash-max-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:68 @ 04/04/23 18:07:40.702
< Exit [It] should set proxy-headers-hash-max-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:68 @ 04/04/23 18:07:50.922 (10.22s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:50.922
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:51.164 (242ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:51.164
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:59.041 (7.877s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:07:59.041
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:08:03.067 (4.025s)
> Enter [It] should ignore Ingress with different controller class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:104 @ 04/04/23 18:08:03.067
< Exit [It] should ignore Ingress with different controller class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:104 @ 04/04/23 18:08:20.253 (17.187s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:20.253
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:20.455 (201ms)
-
-
- > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:20.455
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:27.83 (7.375s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:08:27.83
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:08:38.87 (11.04s)
> Enter [It] log-format-escape-none enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:128 @ 04/04/23 18:08:38.87
< Exit [It] log-format-escape-none enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:128 @ 04/04/23 18:08:52.098 (13.228s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:52.098
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:52.323 (225ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:52.323
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:59.233 (6.909s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:08:59.233
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:09:03.258 (4.025s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:09:03.258
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:09:17.471 (14.213s)
> Enter [It] should return status code 200 when signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:485 @ 04/04/23 18:09:17.471
< Exit [It] should return status code 200 when signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:485 @ 04/04/23 18:09:17.477 (6ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:17.477
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:17.663 (186ms)
-
-
- > Enter [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:17.664
< Exit [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:24.618 (6.955s)
> Enter [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:40 @ 04/04/23 18:09:24.618
< Exit [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:40 @ 04/04/23 18:09:37.752 (13.134s)
> Enter [It] uses default ssl certificate for host based ingress when configured certificate does not match host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:80 @ 04/04/23 18:09:37.752
STEP: making sure new ingress is deployed - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:90 @ 04/04/23 18:09:44.916
STEP: making sure the configured default ssl certificate is being used - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:96 @ 04/04/23 18:09:48.094
< Exit [It] uses default ssl certificate for host based ingress when configured certificate does not match host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:80 @ 04/04/23 18:09:50.119 (12.367s)
> Enter [AfterEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:50.119
< Exit [AfterEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:50.349 (230ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:50.349
< Exit [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:57.22 (6.871s)
> Enter [It] should return OK for service with backend protocol GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:68 @ 04/04/23 18:09:57.22
< Exit [It] should return OK for service with backend protocol GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:68 @ 04/04/23 18:10:11.466 (14.247s)
> Enter [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:11.466
< Exit [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:11.655 (189ms)
-
-
- > Enter [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:11.655
< Exit [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:18.528 (6.872s)
> Enter [It] should be enabled with default settings - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:39 @ 04/04/23 18:10:18.528
< Exit [It] should be enabled with default settings - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:39 @ 04/04/23 18:10:28.683 (10.155s)
> Enter [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:28.683
< Exit [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:28.876 (193ms)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:28.876
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:35.756 (6.88s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:10:35.756
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:10:39.781 (4.025s)
> Enter [It] should include opentracing_trust_incoming_span off directive when disabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:85 @ 04/04/23 18:10:39.781
< Exit [It] should include opentracing_trust_incoming_span off directive when disabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:85 @ 04/04/23 18:10:56.965 (17.184s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:56.965
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:57.186 (221ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:10:57.186
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:10:57.186 (0s)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:57.186
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:05.078 (7.892s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:11:05.078
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:11:09.104 (4.027s)
> Enter [It] should warn user when use-regex is true and session-cookie-path is not set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:294 @ 04/04/23 18:11:09.104
< Exit [It] should warn user when use-regex is true and session-cookie-path is not set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:294 @ 04/04/23 18:11:22.32 (13.216s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:22.32
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:22.585 (265ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:22.585
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:29.564 (6.979s)
> Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:11:29.564
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:11:33.585 (4.021s)
> Enter [It] should set backend protocol to '' and use ajp_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:109 @ 04/04/23 18:11:33.585
< Exit [It] should set backend protocol to '' and use ajp_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:109 @ 04/04/23 18:11:43.812 (10.227s)
> Enter [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:43.812
< Exit [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:44.056 (244ms)
-
-
- > Enter [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:44.057
< Exit [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:52.078 (8.021s)
> Enter [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:37 @ 04/04/23 18:11:52.078
< Exit [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:37 @ 04/04/23 18:11:54.141 (2.063s)
> Enter [It] should add stream-snippet and drop annotations per admin config - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:85 @ 04/04/23 18:11:54.141
< Exit [It] should add stream-snippet and drop annotations per admin config - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:85 @ 04/04/23 18:12:23.359 (29.218s)
> Enter [AfterEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:23.359
< Exit [AfterEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:23.53 (171ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:23.53
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:30.423 (6.893s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:12:30.423
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:12:34.455 (4.032s)
> Enter [It] should not set secure in cookie with provided false annotation on http - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:435 @ 04/04/23 18:12:34.455
< Exit [It] should not set secure in cookie with provided false annotation on http - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:435 @ 04/04/23 18:12:44.621 (10.166s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:44.621
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:44.832 (211ms)
-
-
- > Enter [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:44.833
< Exit [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:52.267 (7.434s)
> Enter [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:42 @ 04/04/23 18:12:52.267
< Exit [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:42 @ 04/04/23 18:12:52.272 (5ms)
> Enter [It] should expose an ExternalName TCP service - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:80 @ 04/04/23 18:12:52.272
< Exit [It] should expose an ExternalName TCP service - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:80 @ 04/04/23 18:12:55.617 (3.345s)
> Enter [AfterEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:55.617
< Exit [AfterEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:55.87 (253ms)
-
-
- > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:55.871
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:02.782 (6.911s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:13:02.782
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:13:06.807 (4.025s)
> Enter [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 04/04/23 18:13:06.807
STEP: configuring certificate_by_lua and skipping Nginx configuration of the new certificate - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:128 @ 04/04/23 18:13:23.944
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:136 @ 04/04/23 18:13:32.097
< Exit [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 04/04/23 18:13:32.106 (25.299s)
> Enter [It] removes HTTPS configuration when we delete TLS spec - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:233 @ 04/04/23 18:13:32.106
< Exit [It] removes HTTPS configuration when we delete TLS spec - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:233 @ 04/04/23 18:13:37.112 (5.005s)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:37.112
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:37.281 (169ms)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:37.281
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:45.19 (7.908s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:13:45.19
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:13:49.209 (4.019s)
> Enter [It] should not exists opentracing_location_operation_name directive when is empty - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:130 @ 04/04/23 18:13:49.209
< Exit [It] should not exists opentracing_location_operation_name directive when is empty - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:130 @ 04/04/23 18:14:06.443 (17.233s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:06.443
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:06.621 (178ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:14:06.621
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:14:06.621 (0s)
-
-
- > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:06.621
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:13.543 (6.921s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:14:13.543
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:14:17.569 (4.026s)
> Enter [It] picks up the certificate when we add TLS spec to existing ingress - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:45 @ 04/04/23 18:14:17.569
< Exit [It] picks up the certificate when we add TLS spec to existing ingress - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:45 @ 04/04/23 18:14:33.037 (15.469s)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:33.037
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:33.234 (196ms)
-
-
- > Enter [BeforeEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:98 @ 04/04/23 18:14:33.234
< Exit [BeforeEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:98 @ 04/04/23 18:14:35.237 (2.003s)
> Enter [It] fails when using root directive - /go/src/k8s.io/ingress-nginx/test/e2e/nginx/nginx.go:124 @ 04/04/23 18:14:35.237
< Exit [It] fails when using root directive - /go/src/k8s.io/ingress-nginx/test/e2e/nginx/nginx.go:124 @ 04/04/23 18:15:35.27 (1m0.034s)
> Enter [AfterEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:99 @ 04/04/23 18:15:35.27
< Exit [AfterEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:99 @ 04/04/23 18:15:35.272 (2ms)
-
-
- > Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:35.273
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:43.177 (7.905s)
> Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 04/04/23 18:15:43.177
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 04/04/23 18:15:45.196 (2.019s)
> Enter [It] should fail to use longest match for documented warning - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:158 @ 04/04/23 18:15:45.196
STEP: creating a regular ingress definition - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:161 @ 04/04/23 18:15:45.196
STEP: creating an ingress definition with the use-regex annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:165 @ 04/04/23 18:15:52.212
STEP: check that '/foo/bar/bar' does not match the longest exact path - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:179 @ 04/04/23 18:16:02.371
< Exit [It] should fail to use longest match for documented warning - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:158 @ 04/04/23 18:16:02.374 (17.178s)
> Enter [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:02.374
< Exit [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:02.58 (206ms)
-
-
- > Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:02.581
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:12.465 (9.885s)
> Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 04/04/23 18:16:12.465
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 04/04/23 18:16:16.495 (4.03s)
> Enter [It] should not exists opentelemetry_operation_name directive when is empty - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:89 @ 04/04/23 18:16:16.495
< Exit [It] should not exists opentelemetry_operation_name directive when is empty - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:89 @ 04/04/23 18:16:33.975 (17.48s)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:33.975
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:34.598 (623ms)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 04/04/23 18:16:34.598
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 04/04/23 18:16:34.598 (0s)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:34.603
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:41.474 (6.871s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:16:41.474
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:16:43.493 (2.019s)
> Enter [It] should disable modsecurity using 'modsecurity off;' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:132 @ 04/04/23 18:16:43.493
< Exit [It] should disable modsecurity using 'modsecurity off;' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:132 @ 04/04/23 18:17:00.623 (17.13s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:00.623
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:00.822 (199ms)
-
-
- > Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:00.823
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:07.712 (6.89s)
> Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:17:07.712
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:17:18.751 (11.038s)
> Enter [It] should set the request count to upstream server through one keep alive connection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:86 @ 04/04/23 18:17:18.751
< Exit [It] should set the request count to upstream server through one keep alive connection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:86 @ 04/04/23 18:17:28.957 (10.206s)
> Enter [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:28.957
< Exit [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:29.194 (237ms)
-
-
- > Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:29.195
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:39.14 (9.946s)
> Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:17:39.14
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:17:50.186 (11.045s)
> Enter [It] should set keepalive_requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:48 @ 04/04/23 18:17:50.186
< Exit [It] should set keepalive_requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:48 @ 04/04/23 18:18:00.312 (10.127s)
> Enter [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:00.312
< Exit [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:00.496 (184ms)
-
-
- > Enter [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:00.496
< Exit [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:07.399 (6.903s)
> Enter [It] should set gzip_comp_level to 4 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:56 @ 04/04/23 18:18:07.399
< Exit [It] should set gzip_comp_level to 4 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:56 @ 04/04/23 18:18:24.593 (17.194s)
> Enter [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:24.593
< Exit [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:24.792 (199ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:24.793
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:31.73 (6.937s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:18:31.73
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:18:35.753 (4.023s)
> Enter [It] should set sticky cookie SERVERID - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:42 @ 04/04/23 18:18:35.753
< Exit [It] should set sticky cookie SERVERID - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:42 @ 04/04/23 18:18:45.94 (10.187s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:45.94
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:46.161 (221ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:46.161
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:54.022 (7.861s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:18:54.022
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:18:58.047 (4.025s)
> Enter [It] should allow - missing origins (should allow all origins) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:571 @ 04/04/23 18:18:58.047
< Exit [It] should allow - missing origins (should allow all origins) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:571 @ 04/04/23 18:19:05.106 (7.059s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:05.106
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:05.287 (181ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:05.287
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:13.171 (7.884s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:19:13.171
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:19:17.198 (4.027s)
> Enter [It] should not set affinity across all server locations when using separate ingresses - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:320 @ 04/04/23 18:19:17.198
< Exit [It] should not set affinity across all server locations when using separate ingresses - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:320 @ 04/04/23 18:19:34.328 (17.129s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:34.328
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:34.564 (236ms)
-
-
- > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:34.564
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:42.455 (7.891s)
> Enter [It] should return 200 for service type=ExternalName without a port defined - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:95 @ 04/04/23 18:19:42.455
< Exit [It] should return 200 for service type=ExternalName without a port defined - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:95 @ 04/04/23 18:19:52.995 (10.54s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:52.995
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:53.197 (202ms)
-
-
-
- > Enter [BeforeEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:53.198
< Exit [BeforeEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:00.144 (6.946s)
> Enter [It] enables access logging for default backend - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:88 @ 04/04/23 18:20:00.144
[SKIPPED] enable-access-log-for-default-backend
In [It] at: /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:90 @ 04/04/23 18:20:00.144
< Exit [It] enables access logging for default backend - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:88 @ 04/04/23 18:20:00.144 (0s)
> Enter [AfterEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:00.144
< Exit [AfterEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:00.767 (622ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:00.767
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:09.884 (9.117s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:20:09.884
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:20:13.952 (4.068s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:20:13.952
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:20:28.231 (14.28s)
> Enter [It] should overwrite Foo header with auth response - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:529 @ 04/04/23 18:20:28.231
< Exit [It] should overwrite Foo header with auth response - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:529 @ 04/04/23 18:20:32.452 (4.22s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:32.452
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:32.657 (205ms)
-
-
- > Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:32.657
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:39.572 (6.914s)
> Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 04/04/23 18:20:39.572
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 04/04/23 18:20:43.594 (4.022s)
> Enter [It] should use ~* location modifier if regex annotation is present - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:111 @ 04/04/23 18:20:43.594
STEP: creating a regular ingress definition - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:114 @ 04/04/23 18:20:43.594
STEP: creating an ingress definition with the use-regex amd rewrite-target annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:123 @ 04/04/23 18:20:53.786
STEP: ensuring '/foo' matches '~* ^/foo' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:137 @ 04/04/23 18:21:03.945
STEP: ensuring '/foo/bar' matches '~* ^/foo.+' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:147 @ 04/04/23 18:21:03.953
< Exit [It] should use ~* location modifier if regex annotation is present - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:111 @ 04/04/23 18:21:03.959 (20.365s)
> Enter [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:03.959
< Exit [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:04.173 (214ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:04.173
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:12.085 (7.912s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:21:12.085
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:21:16.104 (4.019s)
> Enter [It] should return status code 401 when authentication is configured but Authorization header is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:89 @ 04/04/23 18:21:16.104
< Exit [It] should return status code 401 when authentication is configured but Authorization header is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:89 @ 04/04/23 18:21:27.134 (11.029s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:27.134
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:27.321 (187ms)
-
-
- > Enter [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:27.321
< Exit [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:34.238 (6.917s)
> Enter [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:32 @ 04/04/23 18:21:34.238
< Exit [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:32 @ 04/04/23 18:21:38.265 (4.026s)
> Enter [It] should disable mirror-request-body - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:67 @ 04/04/23 18:21:38.265
< Exit [It] should disable mirror-request-body - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:67 @ 04/04/23 18:21:48.462 (10.197s)
> Enter [AfterEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:48.462
< Exit [AfterEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:48.677 (215ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:48.677
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:55.595 (6.918s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:21:55.595
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:21:59.616 (4.02s)
> Enter [BeforeEach] with invalid auth-url should deny whole location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:866 @ 04/04/23 18:21:59.616
< Exit [BeforeEach] with invalid auth-url should deny whole location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:866 @ 04/04/23 18:22:09.78 (10.165s)
> Enter [It] should return 503 (location was denied) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:879 @ 04/04/23 18:22:09.78
< Exit [It] should return 503 (location was denied) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:879 @ 04/04/23 18:22:09.787 (6ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:09.787
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:10.018 (231ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:10.018
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:17.91 (7.892s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:22:17.91
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:22:21.937 (4.027s)
> Enter [It] should setup proxy cookies - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:215 @ 04/04/23 18:22:21.937
< Exit [It] should setup proxy cookies - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:215 @ 04/04/23 18:22:32.141 (10.205s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:32.141
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:32.312 (170ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:32.312
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:39.246 (6.934s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:22:39.246
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:22:43.274 (4.028s)
> Enter [BeforeEach] Without IngressClass Cluster scoped Permission - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:587 @ 04/04/23 18:22:43.274
< Exit [BeforeEach] Without IngressClass Cluster scoped Permission - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:587 @ 04/04/23 18:22:50.32 (7.047s)
> Enter [It] should ignore Ingress with only IngressClassName - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:652 @ 04/04/23 18:22:50.32
< Exit [It] should ignore Ingress with only IngressClassName - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:652 @ 04/04/23 18:23:00.536 (10.216s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:00.536
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:00.771 (235ms)
-
-
- > Enter [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:00.772
< Exit [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:07.648 (6.876s)
> Enter [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:39 @ 04/04/23 18:23:07.648
< Exit [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:39 @ 04/04/23 18:23:18.858 (11.21s)
> Enter [It] should enable ssl-passthrough-proxy-port on a different port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:56 @ 04/04/23 18:23:18.858
< Exit [It] should enable ssl-passthrough-proxy-port on a different port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:56 @ 04/04/23 18:23:30.073 (11.215s)
> Enter [AfterEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:30.073
< Exit [AfterEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:30.267 (194ms)
-
-
- > Enter [BeforeEach] [Default Backend] change default settings - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:30.267
< Exit [BeforeEach] [Default Backend] change default settings - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:37.168 (6.901s)
> Enter [BeforeEach] [Default Backend] change default settings - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/with_hosts.go:34 @ 04/04/23 18:23:37.168
< Exit [BeforeEach] [Default Backend] change default settings - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/with_hosts.go:34 @ 04/04/23 18:23:41.193 (4.024s)
> Enter [It] should apply the annotation to the default backend - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/with_hosts.go:38 @ 04/04/23 18:23:41.193
< Exit [It] should apply the annotation to the default backend - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/with_hosts.go:38 @ 04/04/23 18:23:51.36 (10.167s)
> Enter [AfterEach] [Default Backend] change default settings - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:51.36
< Exit [AfterEach] [Default Backend] change default settings - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:51.551 (192ms)
-
-
- > Enter [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:51.552
< Exit [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:58.412 (6.86s)
> Enter [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:42 @ 04/04/23 18:23:58.412
< Exit [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:42 @ 04/04/23 18:24:02.44 (4.027s)
> Enter [It] should include geoip2 line in config when enabled and db file exists - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:46 @ 04/04/23 18:24:02.44
Apr 4 18:24:11.771: INFO: Connecting to github.com (140.82.113.4:443)
Connecting to github.com (140.82.113.4:443)
Connecting to raw.githubusercontent.com (185.199.108.133:443)
saving to '/etc/nginx/geoip/GeoLite2-Country.mmdb'
GeoLite2-Country.mmd 100%!|(MISSING)********************************| 17952 0:00:00 ETA
'/etc/nginx/geoip/GeoLite2-Country.mmdb' saved
< Exit [It] should include geoip2 line in config when enabled and db file exists - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:46 @ 04/04/23 18:24:22.088 (19.648s)
> Enter [AfterEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:22.088
< Exit [AfterEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:22.674 (586ms)
-
-
- > Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:22.675
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:30.572 (7.897s)
> Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 04/04/23 18:24:30.572
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 04/04/23 18:24:34.603 (4.031s)
> Enter [It] should allow for custom rewrite parameters - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:190 @ 04/04/23 18:24:34.603
STEP: creating an ingress definition with the use-regex annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:193 @ 04/04/23 18:24:34.603
STEP: check that '/foo/bar/bar' redirects to custom rewrite - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:206 @ 04/04/23 18:24:44.755
< Exit [It] should allow for custom rewrite parameters - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:190 @ 04/04/23 18:24:44.757 (10.154s)
> Enter [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:44.757
< Exit [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:44.959 (202ms)
-
-
- > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:44.96
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:53.864 (8.905s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:24:53.864
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:25:04.899 (11.035s)
> Enter [It] should set server_names_hash_bucket_size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:40 @ 04/04/23 18:25:04.899
< Exit [It] should set server_names_hash_bucket_size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:40 @ 04/04/23 18:25:15.061 (10.162s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:15.061
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:15.316 (255ms)
-
-
- > Enter [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:15.316
< Exit [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:39.846 (24.53s)
> Enter [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:38 @ 04/04/23 18:25:39.846
< Exit [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:38 @ 04/04/23 18:25:47.041 (7.195s)
> Enter [It] should set X-Forwarded-Port header to 443 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:70 @ 04/04/23 18:25:47.041
< Exit [It] should set X-Forwarded-Port header to 443 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:70 @ 04/04/23 18:25:59.374 (12.333s)
> Enter [AfterEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:59.374
< Exit [AfterEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:59.585 (211ms)
-
-
- > Enter [BeforeEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:59.585
< Exit [BeforeEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:06.445 (6.86s)
> Enter [It] should create sync events (default) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_sync_events.go:35 @ 04/04/23 18:26:06.445
< Exit [It] should create sync events (default) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_sync_events.go:35 @ 04/04/23 18:26:20.681 (14.236s)
> Enter [AfterEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:20.681
< Exit [AfterEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:20.877 (196ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:20.877
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:27.751 (6.874s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:26:27.751
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:26:31.787 (4.036s)
> Enter [It] should not allow - unmatching origin with wildcard origin (2 subdomains) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:468 @ 04/04/23 18:26:31.787
< Exit [It] should not allow - unmatching origin with wildcard origin (2 subdomains) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:468 @ 04/04/23 18:26:38.82 (7.032s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:38.82
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:39.022 (203ms)
-
-
- > Enter [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:39.023
< Exit [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:46.929 (7.906s)
> Enter [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:32 @ 04/04/23 18:26:46.929
< Exit [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:32 @ 04/04/23 18:26:50.949 (4.02s)
> Enter [It] should not set invalid proxy send timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:52 @ 04/04/23 18:26:50.949
< Exit [It] should not set invalid proxy send timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:52 @ 04/04/23 18:27:08.052 (17.103s)
> Enter [AfterEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:08.052
< Exit [AfterEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:08.24 (188ms)
-
-
- > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:08.24
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:16.131 (7.891s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:27:16.131
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:27:27.187 (11.056s)
> Enter [It] should set server_names_hash_max_size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:48 @ 04/04/23 18:27:27.187
< Exit [It] should set server_names_hash_max_size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:48 @ 04/04/23 18:27:37.411 (10.224s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:37.411
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:37.656 (245ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:37.657
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:44.535 (6.879s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:27:44.535
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:27:48.555 (4.02s)
> Enter [It] should set proxy client-max-body-size to 8m - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:85 @ 04/04/23 18:27:48.555
< Exit [It] should set proxy client-max-body-size to 8m - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:85 @ 04/04/23 18:27:58.71 (10.155s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:58.71
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:58.954 (244ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:58.955
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:06.864 (7.909s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:28:06.864
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:28:10.897 (4.033s)
> Enter [It] should not break functionality with extra domain - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:314 @ 04/04/23 18:28:10.897
< Exit [It] should not break functionality with extra domain - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:314 @ 04/04/23 18:28:17.933 (7.036s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:17.933
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:18.142 (209ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:18.142
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:26.105 (7.963s)
> Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 04/04/23 18:28:26.105
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 04/04/23 18:28:28.133 (2.028s)
> Enter [It] proxy-ssl-location-only flag should change the nginx config server part - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:150 @ 04/04/23 18:28:28.133
< Exit [It] proxy-ssl-location-only flag should change the nginx config server part - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:150 @ 04/04/23 18:29:01.214 (33.081s)
> Enter [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:01.214
< Exit [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:01.431 (217ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:01.431
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:19.232 (2m17.801s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:31:19.232
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:31:23.279 (4.047s)
> Enter [BeforeEach] with invalid auth-url should deny whole location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:866 @ 04/04/23 18:31:23.279
< Exit [BeforeEach] with invalid auth-url should deny whole location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:866 @ 04/04/23 18:31:33.459 (10.18s)
> Enter [It] should add error to the config - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:887 @ 04/04/23 18:31:33.459
< Exit [It] should add error to the config - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:887 @ 04/04/23 18:31:36.583 (3.124s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:36.583
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:36.807 (224ms)
-
-
- > Enter [BeforeEach] [Default Backend] SSL - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:36.808
< Exit [BeforeEach] [Default Backend] SSL - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:43.735 (6.927s)
> Enter [It] should return a self generated SSL certificate - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/ssl.go:29 @ 04/04/23 18:31:43.735
STEP: checking SSL Certificate using the NGINX IP address - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/ssl.go:30 @ 04/04/23 18:31:43.735
STEP: checking SSL Certificate using the NGINX catch all server - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/ssl.go:45 @ 04/04/23 18:31:48.771
< Exit [It] should return a self generated SSL certificate - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/ssl.go:29 @ 04/04/23 18:31:48.798 (5.063s)
> Enter [AfterEach] [Default Backend] SSL - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:48.798
< Exit [AfterEach] [Default Backend] SSL - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:49.002 (204ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:49.002
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:55.884 (6.881s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:31:55.884
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:31:59.898 (4.014s)
> Enter [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 04/04/23 18:31:59.898
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 04/04/23 18:32:04.919
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 04/04/23 18:32:15.067
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 04/04/23 18:32:25.279
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 04/04/23 18:32:35.453
< Exit [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 04/04/23 18:32:50.643 (50.746s)
> Enter [It] should return status code 200 when signed in after auth backend is deleted - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:772 @ 04/04/23 18:32:50.643
< Exit [It] should return status code 200 when signed in after auth backend is deleted - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:772 @ 04/04/23 18:32:57.666 (7.022s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:57.666
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:57.876 (210ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:57.876
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:04.793 (6.917s)
> Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 04/04/23 18:33:04.793
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 04/04/23 18:33:08.814 (4.021s)
> Enter [It] should set valid proxy-ssl-secret, proxy-ssl-protocols - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:122 @ 04/04/23 18:33:08.814
< Exit [It] should set valid proxy-ssl-secret, proxy-ssl-protocols - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:122 @ 04/04/23 18:33:19.338 (10.524s)
> Enter [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:19.338
< Exit [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:19.552 (213ms)
-
-
- > Enter [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:19.552
< Exit [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:26.442 (6.89s)
> Enter [It] should be disabled by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:32 @ 04/04/23 18:33:26.442
< Exit [It] should be disabled by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:32 @ 04/04/23 18:33:29.606 (3.164s)
> Enter [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:29.606
< Exit [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:29.78 (174ms)
-
-
- > Enter [BeforeEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:29.78
< Exit [BeforeEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:36.668 (6.887s)
> Enter [It] Balanced affinity mode should balance - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinitymode.go:34 @ 04/04/23 18:33:36.668
< Exit [It] Balanced affinity mode should balance - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinitymode.go:34 @ 04/04/23 18:33:54.927 (18.259s)
> Enter [AfterEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:54.927
< Exit [AfterEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:55.127 (200ms)
-
-
- > Enter [BeforeEach] [Setting] proxy-next-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:55.128
< Exit [BeforeEach] [Setting] proxy-next-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:03.016 (7.888s)
> Enter [BeforeEach] [Setting] proxy-next-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_next_upstream.go:32 @ 04/04/23 18:34:03.016
< Exit [BeforeEach] [Setting] proxy-next-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_next_upstream.go:32 @ 04/04/23 18:34:07.036 (4.021s)
> Enter [It] should build proxy next upstream using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_next_upstream.go:36 @ 04/04/23 18:34:07.036
< Exit [It] should build proxy next upstream using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_next_upstream.go:36 @ 04/04/23 18:34:24.255 (17.219s)
> Enter [AfterEach] [Setting] proxy-next-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:24.255
< Exit [AfterEach] [Setting] proxy-next-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:24.485 (230ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:24.485
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:31.385 (6.9s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:34:31.385
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:34:35.427 (4.042s)
> Enter [It] should set proxy_redirect to off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:36 @ 04/04/23 18:34:35.427
< Exit [It] should set proxy_redirect to off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:36 @ 04/04/23 18:34:45.603 (10.176s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:45.603
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:45.78 (178ms)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:45.781
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:52.66 (6.879s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:34:52.66
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:34:56.689 (4.029s)
> Enter [It] should not exists opentracing_operation_name directive when is empty - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:100 @ 04/04/23 18:34:56.689
< Exit [It] should not exists opentracing_operation_name directive when is empty - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:100 @ 04/04/23 18:35:13.844 (17.155s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:13.844
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:14.078 (234ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:35:14.078
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:35:14.078 (0s)
-
-
- > Enter [BeforeEach] [Annotations] influxdb-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:14.078
< Exit [BeforeEach] [Annotations] influxdb-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:22.011 (7.933s)
> Enter [BeforeEach] [Annotations] influxdb-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/influxdb.go:42 @ 04/04/23 18:35:22.011
< Exit [BeforeEach] [Annotations] influxdb-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/influxdb.go:42 @ 04/04/23 18:35:38.056 (16.045s)
> Enter [It] should send the request metric to the influxdb server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/influxdb.go:48 @ 04/04/23 18:35:38.056
< Exit [It] should send the request metric to the influxdb server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/influxdb.go:48 @ 04/04/23 18:35:59.417 (21.362s)
> Enter [AfterEach] [Annotations] influxdb-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:59.417
< Exit [AfterEach] [Annotations] influxdb-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:59.632 (215ms)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:59.632
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:06.509 (6.876s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:36:06.509
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:36:10.532 (4.023s)
> Enter [It] should enable opentracing using datadog - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:241 @ 04/04/23 18:36:10.532
< Exit [It] should enable opentracing using datadog - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:241 @ 04/04/23 18:36:30.574 (20.042s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:30.574
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:30.81 (237ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:36:30.81
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:36:30.81 (0s)
-
-
- > Enter [BeforeEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:30.811
< Exit [BeforeEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:37.689 (6.878s)
> Enter [It] should set ingress details variables for ingresses without a host - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/without_host.go:34 @ 04/04/23 18:36:37.689
< Exit [It] should set ingress details variables for ingresses without a host - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/without_host.go:34 @ 04/04/23 18:36:51.912 (14.223s)
> Enter [AfterEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:51.912
< Exit [AfterEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:52.088 (176ms)
-
-
- > Enter [BeforeEach] [Setting] main-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:52.088
< Exit [BeforeEach] [Setting] main-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:59.999 (7.911s)
> Enter [It] should add value of main-snippet setting to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/main_snippet.go:31 @ 04/04/23 18:36:59.999
< Exit [It] should add value of main-snippet setting to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/main_snippet.go:31 @ 04/04/23 18:37:10.187 (10.188s)
> Enter [AfterEach] [Setting] main-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:10.187
< Exit [AfterEach] [Setting] main-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:10.413 (225ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:10.413
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:17.279 (6.866s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:37:17.279
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:37:21.337 (4.058s)
> Enter [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:532 @ 04/04/23 18:37:21.337
STEP: routing requests to the mainline upstream when header is set to 'DoCananry' and header-value is 'DoCanary' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:557 @ 04/04/23 18:37:38.545
< Exit [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:532 @ 04/04/23 18:37:38.552 (17.215s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:38.552
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:38.772 (219ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:38.772
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:45.664 (6.892s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:37:45.664
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:37:49.681 (4.017s)
> Enter [It] should serve Ingress when class is added - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:257 @ 04/04/23 18:37:49.681
< Exit [It] should serve Ingress when class is added - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:257 @ 04/04/23 18:38:15.087 (25.406s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:15.087
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:15.266 (179ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:15.266
< Exit [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:23.144 (7.877s)
> Enter [It] should return OK for service with backend protocol GRPCS - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:199 @ 04/04/23 18:38:23.144
< Exit [It] should return OK for service with backend protocol GRPCS - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:199 @ 04/04/23 18:38:39.406 (16.262s)
> Enter [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:39.406
< Exit [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:39.613 (207ms)
-
-
- > Enter [BeforeEach] [Annotations] annotation-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:39.613
< Exit [BeforeEach] [Annotations] annotation-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:46.507 (6.894s)
> Enter [BeforeEach] [Annotations] annotation-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/globalratelimit.go:34 @ 04/04/23 18:38:46.507
< Exit [BeforeEach] [Annotations] annotation-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/globalratelimit.go:34 @ 04/04/23 18:38:50.531 (4.023s)
> Enter [It] generates correct configuration - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/globalratelimit.go:38 @ 04/04/23 18:38:50.531
STEP: regenerating the correct configuration after update - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/globalratelimit.go:65 @ 04/04/23 18:39:12.735
< Exit [It] generates correct configuration - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/globalratelimit.go:38 @ 04/04/23 18:39:23.972 (33.441s)
> Enter [AfterEach] [Annotations] annotation-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:23.972
< Exit [AfterEach] [Annotations] annotation-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:24.525 (553ms)
-
-
- > Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:24.526
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:32.928 (8.402s)
> Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 04/04/23 18:39:32.928
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 04/04/23 18:39:36.954 (4.026s)
> Enter [It] [BAD_ANNOTATIONS] should drop an ingress if there is a forbidden word in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:67 @ 04/04/23 18:39:36.954
< Exit [It] [BAD_ANNOTATIONS] should drop an ingress if there is a forbidden word in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:67 @ 04/04/23 18:40:09.289 (32.335s)
> Enter [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:09.289
< Exit [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:09.487 (198ms)
-
-
- > Enter [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:09.487
< Exit [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:16.38 (6.893s)
> Enter [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:31 @ 04/04/23 18:40:16.38
< Exit [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:31 @ 04/04/23 18:40:20.419 (4.039s)
> Enter [It] should not add X-Forwarded-Prefix if the annotation value is empty - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:57 @ 04/04/23 18:40:20.419
< Exit [It] should not add X-Forwarded-Prefix if the annotation value is empty - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:57 @ 04/04/23 18:40:30.626 (10.207s)
> Enter [AfterEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:30.626
< Exit [AfterEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:30.822 (196ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:30.822
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:37.735 (6.913s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:40:37.735
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:40:41.759 (4.024s)
> Enter [It] should ignore Ingress without IngressClass configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:164 @ 04/04/23 18:40:41.759
< Exit [It] should ignore Ingress without IngressClass configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:164 @ 04/04/23 18:40:58.984 (17.225s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:58.984
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:59.238 (254ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:19.257
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:26.759 (7.502s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:04:26.759
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:04:38.804 (12.045s)
> Enter [It] should set cookie with domain - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:225 @ 04/04/23 18:04:38.804
< Exit [It] should set cookie with domain - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:225 @ 04/04/23 18:04:49.017 (10.213s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:04:49.017
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:04:49.223 (207ms)
-
-
- > Enter [BeforeEach] [Service] Nil Service Backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:49.225
< Exit [BeforeEach] [Service] Nil Service Backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:57.104 (7.879s)
> Enter [BeforeEach] [Service] Nil Service Backend - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_nil_backend.go:34 @ 04/04/23 18:04:57.104
< Exit [BeforeEach] [Service] Nil Service Backend - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_nil_backend.go:34 @ 04/04/23 18:05:01.132 (4.029s)
> Enter [It] should return 404 when backend service is nil - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_nil_backend.go:38 @ 04/04/23 18:05:01.132
STEP: setting an ingress with a nil backend - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_nil_backend.go:39 @ 04/04/23 18:05:01.132
< Exit [It] should return 404 when backend service is nil - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_nil_backend.go:38 @ 04/04/23 18:05:18.375 (17.242s)
> Enter [AfterEach] [Service] Nil Service Backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:18.375
< Exit [AfterEach] [Service] Nil Service Backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:18.574 (200ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:18.575
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:25.47 (6.895s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:05:25.47
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:05:29.501 (4.031s)
> Enter [It] should set the path to /something on the generated cookie - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:99 @ 04/04/23 18:05:29.501
< Exit [It] should set the path to /something on the generated cookie - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:99 @ 04/04/23 18:05:39.685 (10.184s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:39.685
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:39.886 (201ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:39.886
< Exit [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:46.798 (6.912s)
> Enter [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:33 @ 04/04/23 18:05:46.798
< Exit [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:33 @ 04/04/23 18:05:57.853 (11.055s)
> Enter [It] should block CIDRs defined in the ConfigMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:38 @ 04/04/23 18:05:57.853
< Exit [It] should block CIDRs defined in the ConfigMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:38 @ 04/04/23 18:06:08.065 (10.213s)
> Enter [AfterEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:08.065
< Exit [AfterEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:08.304 (239ms)
-
-
- > Enter [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:08.304
< Exit [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:15.196 (6.891s)
> Enter [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:32 @ 04/04/23 18:06:15.196
< Exit [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:32 @ 04/04/23 18:06:19.22 (4.024s)
> Enter [It] should set valid proxy read timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:36 @ 04/04/23 18:06:19.22
< Exit [It] should set valid proxy read timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:36 @ 04/04/23 18:06:36.431 (17.211s)
> Enter [AfterEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:36.431
< Exit [AfterEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:36.678 (246ms)
-
-
- > Enter [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:36.678
< Exit [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:43.562 (6.884s)
> Enter [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:32 @ 04/04/23 18:06:43.562
< Exit [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:32 @ 04/04/23 18:06:47.588 (4.026s)
> Enter [It] should set valid proxy send timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:36 @ 04/04/23 18:06:47.588
< Exit [It] should set valid proxy send timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:36 @ 04/04/23 18:07:04.782 (17.194s)
> Enter [AfterEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:04.782
< Exit [AfterEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:04.961 (179ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:04.961
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:12.853 (7.892s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:07:12.853
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:07:20.912 (8.059s)
> Enter [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:426 @ 04/04/23 18:07:20.912
STEP: routing requests to the canary upstream when header is set to 'DoCanary' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:451 @ 04/04/23 18:07:38.088
STEP: routing requests to the mainline upstream when header is set to 'always' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:460 @ 04/04/23 18:07:38.092
STEP: routing requests to the mainline upstream when header is set to 'never' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:469 @ 04/04/23 18:07:38.097
STEP: routing requests to the mainline upstream when header is set to anything else - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:478 @ 04/04/23 18:07:38.101
< Exit [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:426 @ 04/04/23 18:07:38.105 (17.192s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:38.105
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:38.312 (208ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:38.313
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:45.57 (7.258s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:07:45.57
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:07:49.597 (4.027s)
> Enter [BeforeEach] when external authentication is configured with a custom redirect param - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:651 @ 04/04/23 18:07:49.597
< Exit [BeforeEach] when external authentication is configured with a custom redirect param - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:651 @ 04/04/23 18:08:17.835 (28.238s)
> Enter [It] keeps processing new ingresses even if one of the existing ingresses is misconfigured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:698 @ 04/04/23 18:08:17.835
< Exit [It] keeps processing new ingresses even if one of the existing ingresses is misconfigured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:698 @ 04/04/23 18:08:29.028 (11.193s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:29.028
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:29.254 (225ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:29.254
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:37.146 (7.892s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:08:37.146
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:08:45.193 (8.047s)
> Enter [It] should route requests to the correct upstream if mainline ingress is created after the canary ingress - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:206 @ 04/04/23 18:08:45.193
STEP: routing requests destined for the mainline ingress to the mainelin upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:231 @ 04/04/23 18:09:02.324
STEP: routing requests destined for the canary ingress to the canary upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:240 @ 04/04/23 18:09:02.332
< Exit [It] should route requests to the correct upstream if mainline ingress is created after the canary ingress - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:206 @ 04/04/23 18:09:02.337 (17.144s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:02.337
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:02.545 (208ms)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:02.545
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:09.432 (6.887s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:09:09.432
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:09:13.454 (4.022s)
> Enter [It] should enable modsecurity with snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:91 @ 04/04/23 18:09:13.454
< Exit [It] should enable modsecurity with snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:91 @ 04/04/23 18:09:23.682 (10.227s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:23.682
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:09:23.867 (185ms)
-
-
- > Enter [BeforeEach] [Setting] settings-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:09:23.867
< Exit [BeforeEach] [Setting] settings-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:41.632 (2m17.765s)
> Enter [BeforeEach] [Setting] settings-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/settings/globalratelimit.go:34 @ 04/04/23 18:11:41.632
< Exit [BeforeEach] [Setting] settings-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/settings/globalratelimit.go:34 @ 04/04/23 18:11:45.686 (4.054s)
> Enter [It] generates correct NGINX configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/globalratelimit.go:38 @ 04/04/23 18:11:45.686
STEP: generating correct defaults - /go/src/k8s.io/ingress-nginx/test/e2e/settings/globalratelimit.go:43 @ 04/04/23 18:11:52.711
STEP: applying customizations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/globalratelimit.go:61 @ 04/04/23 18:11:55.865
< Exit [It] generates correct NGINX configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/globalratelimit.go:38 @ 04/04/23 18:12:06.074 (20.388s)
> Enter [AfterEach] [Setting] settings-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:06.074
< Exit [AfterEach] [Setting] settings-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:06.248 (175ms)
-
-
- > Enter [BeforeEach] [Setting] [Load Balancer] EWMA - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:06.248
< Exit [BeforeEach] [Setting] [Load Balancer] EWMA - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:13.645 (7.397s)
> Enter [BeforeEach] [Setting] [Load Balancer] EWMA - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/ewma.go:34 @ 04/04/23 18:12:13.645
< Exit [BeforeEach] [Setting] [Load Balancer] EWMA - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/ewma.go:34 @ 04/04/23 18:12:24.689 (11.044s)
> Enter [It] does not fail requests - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/ewma.go:42 @ 04/04/23 18:12:24.689
Apr 4 18:12:39.085: INFO: Request distribution: map[echo-7b6bf466cc-4gqhv:16 echo-7b6bf466cc-kbjqx:9 echo-7b6bf466cc-scqj9:5]
< Exit [It] does not fail requests - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/ewma.go:42 @ 04/04/23 18:12:39.085 (14.396s)
> Enter [AfterEach] [Setting] [Load Balancer] EWMA - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:39.085
< Exit [AfterEach] [Setting] [Load Balancer] EWMA - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:39.295 (210ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:39.295
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:47.18 (7.884s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:12:47.18
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:12:51.204 (4.024s)
> Enter [It] should expose headers for cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:153 @ 04/04/23 18:12:51.204
< Exit [It] should expose headers for cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:153 @ 04/04/23 18:13:01.392 (10.189s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:01.392
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:01.572 (180ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:01.573
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:08.45 (6.878s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:13:08.45
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:13:16.493 (8.042s)
> Enter [It] always routes traffic to canary if first request was affinitized to canary (default behavior) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:943 @ 04/04/23 18:13:16.493
< Exit [It] always routes traffic to canary if first request was affinitized to canary (default behavior) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:943 @ 04/04/23 18:13:42.089 (25.596s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:42.089
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:42.311 (222ms)
-
-
- > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:42.312
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:49.227 (6.915s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:13:49.227
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:14:00.268 (11.041s)
> Enter [It] should disable the log-format-escape-none - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:71 @ 04/04/23 18:14:00.268
< Exit [It] should disable the log-format-escape-none - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:71 @ 04/04/23 18:14:10.406 (10.138s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:10.406
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:10.583 (177ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:10.584
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:17.985 (7.402s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:14:17.985
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:14:22.015 (4.03s)
> Enter [It] should set proxy_redirect to default - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:52 @ 04/04/23 18:14:22.015
< Exit [It] should set proxy_redirect to default - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:52 @ 04/04/23 18:14:32.238 (10.222s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:32.238
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:32.409 (172ms)
-
-
- > Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:32.41
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:40.329 (7.92s)
> Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:14:40.329
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:14:51.355 (11.026s)
> Enter [It] should set keepalive connection to upstream server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:59 @ 04/04/23 18:14:51.356
< Exit [It] should set keepalive connection to upstream server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:59 @ 04/04/23 18:15:01.513 (10.157s)
> Enter [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:01.513
< Exit [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:01.717 (204ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:01.717
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:08.628 (6.911s)
> Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:15:08.628
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:15:12.654 (4.026s)
> Enter [It] should set backend protocol to https:// and use proxy_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:34 @ 04/04/23 18:15:12.654
< Exit [It] should set backend protocol to https:// and use proxy_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:34 @ 04/04/23 18:15:22.863 (10.21s)
> Enter [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:22.863
< Exit [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:23.117 (253ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:23.117
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:31.017 (7.9s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:15:31.017
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:15:35.052 (4.035s)
> Enter [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:372 @ 04/04/23 18:15:35.052
STEP: routing requests to the canary upstream when header is set to 'always' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:395 @ 04/04/23 18:15:52.235
STEP: routing requests to the mainline upstream when header is set to 'never' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:404 @ 04/04/23 18:15:52.237
STEP: routing requests to the mainline upstream when header is set to anything else - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:414 @ 04/04/23 18:15:52.239
< Exit [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:372 @ 04/04/23 18:15:52.24 (17.188s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:52.24
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:52.427 (187ms)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:52.428
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:59.303 (6.876s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:15:59.303
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:16:03.326 (4.022s)
> Enter [It] should exists opentracing_location_operation_name directive when is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:145 @ 04/04/23 18:16:03.326
< Exit [It] should exists opentracing_location_operation_name directive when is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:145 @ 04/04/23 18:16:20.959 (17.634s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:20.959
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:22.171 (1.211s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:16:22.171
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:16:22.171 (0s)
-
-
- > Enter [BeforeEach] [Annotations] limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:22.172
< Exit [BeforeEach] [Annotations] limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:31.372 (9.2s)
> Enter [BeforeEach] [Annotations] limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitrate.go:33 @ 04/04/23 18:16:31.372
< Exit [BeforeEach] [Annotations] limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitrate.go:33 @ 04/04/23 18:16:35.41 (4.038s)
> Enter [It] Check limit-rate annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitrate.go:37 @ 04/04/23 18:16:35.41
< Exit [It] Check limit-rate annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitrate.go:37 @ 04/04/23 18:16:49.822 (14.412s)
> Enter [AfterEach] [Annotations] limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:49.822
< Exit [AfterEach] [Annotations] limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:50.037 (215ms)
-
-
- > Enter [BeforeEach] [Setting] configmap stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:50.037
< Exit [BeforeEach] [Setting] configmap stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:57.908 (7.87s)
> Enter [BeforeEach] [Setting] configmap stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/settings/stream_snippet.go:38 @ 04/04/23 18:16:57.908
< Exit [BeforeEach] [Setting] configmap stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/settings/stream_snippet.go:38 @ 04/04/23 18:17:01.931 (4.024s)
> Enter [It] should add value of stream-snippet via config map to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/stream_snippet.go:42 @ 04/04/23 18:17:01.931
< Exit [It] should add value of stream-snippet via config map to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/stream_snippet.go:42 @ 04/04/23 18:17:24.158 (22.227s)
> Enter [AfterEach] [Setting] configmap stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:24.158
< Exit [AfterEach] [Setting] configmap stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:24.349 (191ms)
-
-
- > Enter [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:24.35
< Exit [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:31.239 (6.889s)
> Enter [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:79 @ 04/04/23 18:17:31.239
< Exit [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:79 @ 04/04/23 18:17:39.264 (8.025s)
> Enter [It] should connect to the same pod - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:83 @ 04/04/23 18:17:39.264
< Exit [It] should connect to the same pod - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:83 @ 04/04/23 18:18:09.666 (30.402s)
> Enter [AfterEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:09.666
< Exit [AfterEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:09.903 (237ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:09.904
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:16.786 (6.882s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:18:16.786
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:18:20.804 (4.018s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:18:20.804
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 04/04/23 18:18:35.029 (14.226s)
> Enter [It] should not create additional upstream block when auth-keepalive is set with HTTP/2 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:609 @ 04/04/23 18:18:35.029
< Exit [It] should not create additional upstream block when auth-keepalive is set with HTTP/2 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:609 @ 04/04/23 18:18:41.107 (6.078s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:41.107
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:41.32 (212ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:41.32
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:49.195 (7.875s)
> Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 04/04/23 18:18:49.195
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 04/04/23 18:18:53.217 (4.022s)
> Enter [It] should set valid proxy-ssl-secret - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:37 @ 04/04/23 18:18:53.217
< Exit [It] should set valid proxy-ssl-secret - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:37 @ 04/04/23 18:19:04.077 (10.86s)
> Enter [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:04.077
< Exit [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:04.257 (181ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:04.258
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:12.153 (7.895s)
> Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 04/04/23 18:19:12.153
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 04/04/23 18:19:16.174 (4.021s)
> Enter [It] should set valid proxy-ssl-secret, proxy-ssl-ciphers to HIGH:!AES - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:94 @ 04/04/23 18:19:16.174
< Exit [It] should set valid proxy-ssl-secret, proxy-ssl-ciphers to HIGH:!AES - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:94 @ 04/04/23 18:19:27.319 (11.146s)
> Enter [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:27.32
< Exit [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:27.668 (348ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:27.668
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:34.827 (7.159s)
> Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:19:34.827
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:19:38.85 (4.023s)
> Enter [It] should set backend protocol to '' and use fastcgi_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:94 @ 04/04/23 18:19:38.85
< Exit [It] should set backend protocol to '' and use fastcgi_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:94 @ 04/04/23 18:19:49.066 (10.216s)
> Enter [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:49.066
< Exit [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:49.312 (246ms)
-
-
- > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:49.312
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:57.192 (7.879s)
> Enter [It] should return status 502 for service type=ExternalName with an invalid host - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:153 @ 04/04/23 18:19:57.192
< Exit [It] should return status 502 for service type=ExternalName with an invalid host - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:153 @ 04/04/23 18:20:12.695 (15.504s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:12.695
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:13.536 (840ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:13.536
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:20.628 (7.092s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:20:20.628
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:20:28.704 (8.077s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:20:28.704
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 04/04/23 18:20:28.704
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 04/04/23 18:20:38.882
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 04/04/23 18:20:49.057
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:20:59.272 (30.567s)
> Enter [It] should set request-redirect when global-auth-request-redirect is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:237 @ 04/04/23 18:20:59.272
STEP: Adding a global-auth-request-redirect to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:242 @ 04/04/23 18:20:59.272
< Exit [It] should set request-redirect when global-auth-request-redirect is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:237 @ 04/04/23 18:21:09.45 (10.178s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:09.45
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:09.625 (175ms)
-
-
- > Enter [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:09.625
< Exit [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:16.495 (6.87s)
> Enter [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:36 @ 04/04/23 18:21:16.495
< Exit [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:36 @ 04/04/23 18:21:20.516 (4.021s)
> Enter [It] should not use the Service Cluster IP and Port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:99 @ 04/04/23 18:21:20.516
STEP: checking if the service is reached - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:113 @ 04/04/23 18:21:37.731
STEP: checking if the Service Cluster IP and Port are not used - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:120 @ 04/04/23 18:21:37.737
< Exit [It] should not use the Service Cluster IP and Port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:99 @ 04/04/23 18:21:37.9 (17.384s)
> Enter [AfterEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:37.9
< Exit [AfterEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:21:38.126 (226ms)
-
-
- > Enter [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:38.126
< Exit [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:21:46.024 (7.897s)
> Enter [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:32 @ 04/04/23 18:21:46.024
< Exit [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:32 @ 04/04/23 18:21:50.044 (4.02s)
> Enter [It] should return status code 200 for host 'foo' and 'bar' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:62 @ 04/04/23 18:21:50.044
< Exit [It] should return status code 200 for host 'foo' and 'bar' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:62 @ 04/04/23 18:22:00.233 (10.189s)
> Enter [AfterEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:00.233
< Exit [AfterEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:00.414 (181ms)
-
-
- > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:00.414
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:07.306 (6.892s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:22:07.306
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 04/04/23 18:22:18.341 (11.035s)
> Enter [It] should not configure log-format escape by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:40 @ 04/04/23 18:22:18.341
< Exit [It] should not configure log-format escape by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:40 @ 04/04/23 18:22:21.446 (3.105s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:21.446
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:21.733 (287ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:21.733
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:39.876 (2m18.143s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:24:39.876
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:24:47.956 (8.08s)
> Enter [It] should route requests to the correct upstream if the mainline ingress is modified - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:250 @ 04/04/23 18:24:47.956
STEP: routing requests destined fro the mainline ingress to the mainline upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:288 @ 04/04/23 18:25:09.571
STEP: routing requests destined for the canary ingress to the canary upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:297 @ 04/04/23 18:25:09.578
< Exit [It] should route requests to the correct upstream if the mainline ingress is modified - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:250 @ 04/04/23 18:25:09.586 (21.629s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:09.586
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:09.787 (201ms)
-
-
- > Enter [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:09.787
< Exit [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:16.668 (6.881s)
> Enter [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:79 @ 04/04/23 18:25:16.668
< Exit [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:79 @ 04/04/23 18:25:24.696 (8.028s)
> Enter [It] should connect to the same subset of pods - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:92 @ 04/04/23 18:25:24.696
< Exit [It] should connect to the same subset of pods - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:92 @ 04/04/23 18:25:55.101 (30.405s)
> Enter [AfterEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:55.101
< Exit [AfterEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:55.343 (242ms)
-
-
- > Enter [BeforeEach] [SSL] redirect to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:55.344
< Exit [BeforeEach] [SSL] redirect to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:02.277 (6.934s)
> Enter [BeforeEach] [SSL] redirect to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/http_redirect.go:32 @ 04/04/23 18:26:02.277
< Exit [BeforeEach] [SSL] redirect to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/http_redirect.go:32 @ 04/04/23 18:26:06.299 (4.021s)
> Enter [It] should redirect from HTTP to HTTPS when secret is missing - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/http_redirect.go:36 @ 04/04/23 18:26:06.299
< Exit [It] should redirect from HTTP to HTTPS when secret is missing - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/http_redirect.go:36 @ 04/04/23 18:26:19.516 (13.217s)
> Enter [AfterEach] [SSL] redirect to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:19.516
< Exit [AfterEach] [SSL] redirect to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:19.717 (201ms)
-
-
- > Enter [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:19.718
< Exit [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:26.668 (6.951s)
> Enter [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:31 @ 04/04/23 18:26:26.668
< Exit [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:31 @ 04/04/23 18:26:30.695 (4.027s)
> Enter [It] should add global server-snippet and drop annotations per admin config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:92 @ 04/04/23 18:26:30.695
< Exit [It] should add global server-snippet and drop annotations per admin config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:92 @ 04/04/23 18:27:02.982 (32.287s)
> Enter [AfterEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:02.982
< Exit [AfterEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:03.156 (175ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:03.157
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:11.021 (7.864s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:27:11.021
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:27:15.049 (4.028s)
> Enter [It] should set cookie with expires - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:194 @ 04/04/23 18:27:15.049
< Exit [It] should set cookie with expires - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:194 @ 04/04/23 18:27:25.315 (10.266s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:25.315
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:25.546 (231ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:25.547
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:32.464 (6.917s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:27:32.464
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:27:36.484 (4.02s)
> Enter [It] should allow - matching origin with wildcard origin (2 subdomains) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:425 @ 04/04/23 18:27:36.484
< Exit [It] should allow - matching origin with wildcard origin (2 subdomains) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:425 @ 04/04/23 18:27:43.52 (7.037s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:43.52
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:43.695 (175ms)
-
-
- > Enter [BeforeEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:43.696
< Exit [BeforeEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:50.592 (6.896s)
> Enter [It] should be enabled when set to true - /go/src/k8s.io/ingress-nginx/test/e2e/settings/multi_accept.go:39 @ 04/04/23 18:27:50.592
< Exit [It] should be enabled when set to true - /go/src/k8s.io/ingress-nginx/test/e2e/settings/multi_accept.go:39 @ 04/04/23 18:28:00.821 (10.229s)
> Enter [AfterEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:00.821
< Exit [AfterEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:01.043 (221ms)
-
-
- > Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:01.043
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:08.918 (7.875s)
> Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 04/04/23 18:28:08.918
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 04/04/23 18:28:12.942 (4.024s)
> Enter [It] [BAD_ANNOTATIONS] should allow an ingress if there is a default blocklist config in place - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:102 @ 04/04/23 18:28:12.942
< Exit [It] [BAD_ANNOTATIONS] should allow an ingress if there is a default blocklist config in place - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:102 @ 04/04/23 18:28:31.293 (18.352s)
> Enter [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:31.293
< Exit [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:31.512 (218ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:31.512
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:38.394 (6.882s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:28:38.394
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:28:46.454 (8.06s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:28:46.454
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 04/04/23 18:28:46.454
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 04/04/23 18:28:56.618
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 04/04/23 18:29:06.764
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 04/04/23 18:29:16.991 (30.537s)
> Enter [It] should return status code 200 when request whitelisted (via ingress annotation) service and 401 when request protected service - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:126 @ 04/04/23 18:29:16.991
STEP: Adding an ingress rule for /bar with annotation enable-global-auth = false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:128 @ 04/04/23 18:29:16.991
STEP: Sending a request to protected service /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:140 @ 04/04/23 18:29:21.174
STEP: Sending a request to whitelisted service /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:147 @ 04/04/23 18:29:21.184
< Exit [It] should return status code 200 when request whitelisted (via ingress annotation) service and 401 when request protected service - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:126 @ 04/04/23 18:29:21.191 (4.2s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:21.191
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:21.411 (220ms)
-
-
- > Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:21.411
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:28.853 (7.441s)
> Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 04/04/23 18:29:28.853
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 04/04/23 18:29:43.082 (14.23s)
> Enter [It] handles an annotation change - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:171 @ 04/04/23 18:29:43.082
< Exit [It] handles an annotation change - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:171 @ 04/04/23 18:29:49.435 (6.352s)
> Enter [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:49.435
< Exit [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:49.619 (185ms)
-
-
- > Enter [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:49.62
< Exit [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:56.496 (6.875s)
> Enter [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:34 @ 04/04/23 18:29:56.496
< Exit [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:34 @ 04/04/23 18:30:00.515 (4.019s)
> Enter [It] should exists Server header in the response when is enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:50 @ 04/04/23 18:30:00.515
< Exit [It] should exists Server header in the response when is enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:50 @ 04/04/23 18:30:17.68 (17.166s)
> Enter [AfterEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:17.68
< Exit [AfterEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:17.86 (179ms)
-
-
- > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:17.86
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:24.767 (6.907s)
> Enter [It] works with external name set to incomplete fqdn - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:62 @ 04/04/23 18:30:24.767
< Exit [It] works with external name set to incomplete fqdn - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:62 @ 04/04/23 18:30:38.985 (14.218s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:38.985
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:39.203 (218ms)
-
-
- > Enter [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:39.204
< Exit [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:47.098 (7.895s)
> Enter [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:33 @ 04/04/23 18:30:47.098
< Exit [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:33 @ 04/04/23 18:30:51.122 (4.023s)
> Enter [It] should list the backend servers - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:37 @ 04/04/23 18:30:51.122
< Exit [It] should list the backend servers - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:37 @ 04/04/23 18:31:01.391 (10.269s)
> Enter [AfterEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:01.391
< Exit [AfterEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:01.582 (191ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:01.582
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:08.498 (6.915s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:31:08.498
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:31:16.564 (8.066s)
> Enter [It] does not crash when canary ingress has multiple paths to the same non-matching backend - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:915 @ 04/04/23 18:31:16.564
< Exit [It] does not crash when canary ingress has multiple paths to the same non-matching backend - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:915 @ 04/04/23 18:31:33.8 (17.236s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:33.8
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:34.042 (242ms)
-
-
- > Enter [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:34.042
< Exit [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:40.946 (6.904s)
> Enter [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:36 @ 04/04/23 18:31:40.946
< Exit [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:36 @ 04/04/23 18:31:44.981 (4.035s)
> Enter [It] should use the Service Cluster IP and Port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:41 @ 04/04/23 18:31:44.981
STEP: checking if the service is reached - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:53 @ 04/04/23 18:31:55.094
STEP: checking if the Service Cluster IP and Port are used - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:60 @ 04/04/23 18:31:55.098
< Exit [It] should use the Service Cluster IP and Port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:41 @ 04/04/23 18:31:55.252 (10.271s)
> Enter [AfterEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:55.252
< Exit [AfterEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:31:55.492 (240ms)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:31:55.493
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:02.366 (6.874s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:32:02.366
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:32:06.394 (4.028s)
> Enter [It] should enable modsecurity when enable-owasp-modsecurity-crs is set to true - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:225 @ 04/04/23 18:32:06.394
< Exit [It] should enable modsecurity when enable-owasp-modsecurity-crs is set to true - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:225 @ 04/04/23 18:32:35.569 (29.175s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:35.569
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:35.753 (184ms)
-
-
-
- > Enter [BeforeEach] [Security] Pod Security Policies with volumes - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:35.753
< Exit [BeforeEach] [Security] Pod Security Policies with volumes - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:42.66 (6.907s)
> Enter [It] should be running with a Pod Security Policy - /go/src/k8s.io/ingress-nginx/test/e2e/settings/pod_security_policy_volumes.go:40 @ 04/04/23 18:32:42.66
[SKIPPED] PSP not supported in this version
In [It] at: /go/src/k8s.io/ingress-nginx/test/e2e/settings/pod_security_policy_volumes.go:53 @ 04/04/23 18:32:42.661
< Exit [It] should be running with a Pod Security Policy - /go/src/k8s.io/ingress-nginx/test/e2e/settings/pod_security_policy_volumes.go:40 @ 04/04/23 18:32:42.661 (1ms)
> Enter [AfterEach] [Security] Pod Security Policies with volumes - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:42.661
< Exit [AfterEach] [Security] Pod Security Policies with volumes - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:42.858 (197ms)
-
-
- > Enter [BeforeEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:42.858
< Exit [BeforeEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:32:49.722 (6.864s)
> Enter [It] should respond with a custom redirect code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:61 @ 04/04/23 18:32:49.722
STEP: setting permanent-redirect-code annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:62 @ 04/04/23 18:32:49.722
STEP: sending request to redirected URL path - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:82 @ 04/04/23 18:32:59.899
< Exit [It] should respond with a custom redirect code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:61 @ 04/04/23 18:32:59.901 (10.18s)
> Enter [AfterEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:32:59.901
< Exit [AfterEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:00.105 (203ms)
-
-
- > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:00.105
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:07.991 (7.886s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:33:07.991
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:33:19.06 (11.069s)
> Enter [It] should set proxy-headers-hash-bucket-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:60 @ 04/04/23 18:33:19.06
< Exit [It] should set proxy-headers-hash-bucket-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:60 @ 04/04/23 18:33:29.206 (10.146s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:29.206
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:29.433 (227ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:29.433
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:36.312 (6.878s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:33:36.312
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:33:42.335 (6.023s)
> Enter [It] should allow correct origins - single origin for multiple cors values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:216 @ 04/04/23 18:33:42.335
< Exit [It] should allow correct origins - single origin for multiple cors values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:216 @ 04/04/23 18:33:49.381 (7.046s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:49.381
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:33:49.571 (190ms)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:49.571
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:33:56.527 (6.956s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:33:56.527
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:34:00.557 (4.03s)
> Enter [It] should disable default modsecurity conf setting when modsecurity-snippet is specified - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:347 @ 04/04/23 18:34:00.557
< Exit [It] should disable default modsecurity conf setting when modsecurity-snippet is specified - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:347 @ 04/04/23 18:34:22.694 (22.137s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:22.694
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:22.91 (216ms)
-
-
- > Enter [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:22.91
< Exit [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:29.807 (6.897s)
> Enter [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:42 @ 04/04/23 18:34:29.807
< Exit [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:42 @ 04/04/23 18:34:29.814 (6ms)
> Enter [It] should expose a TCP service - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:46 @ 04/04/23 18:34:29.814
< Exit [It] should expose a TCP service - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:46 @ 04/04/23 18:34:36.97 (7.156s)
> Enter [AfterEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:36.97
< Exit [AfterEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:34:37.169 (200ms)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:37.17
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:34:45.073 (7.903s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:34:45.073
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:34:49.091 (4.018s)
> Enter [It] should enable modsecurity through the config map - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:264 @ 04/04/23 18:34:49.091
< Exit [It] should enable modsecurity through the config map - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:264 @ 04/04/23 18:35:18.316 (29.225s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:18.316
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:18.518 (202ms)
-
-
- > Enter [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:18.518
< Exit [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:25.408 (6.889s)
> Enter [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:32 @ 04/04/23 18:35:25.408
< Exit [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:32 @ 04/04/23 18:35:36.46 (11.052s)
> Enter [It] reuse port should be enabled by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:38 @ 04/04/23 18:35:36.46
< Exit [It] reuse port should be enabled by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:38 @ 04/04/23 18:35:39.652 (3.192s)
> Enter [AfterEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:39.652
< Exit [AfterEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:35:39.91 (258ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:39.91
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:35:46.843 (6.933s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:35:46.843
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:35:50.861 (4.018s)
> Enter [BeforeEach] Without IngressClass Cluster scoped Permission - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:587 @ 04/04/23 18:35:50.861
< Exit [BeforeEach] Without IngressClass Cluster scoped Permission - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:587 @ 04/04/23 18:35:58.882 (8.021s)
> Enter [It] should watch Ingress with correct annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:631 @ 04/04/23 18:35:58.882
< Exit [It] should watch Ingress with correct annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:631 @ 04/04/23 18:36:09.027 (10.145s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:09.027
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:09.241 (213ms)
-
-
- > Enter [BeforeEach] [Ingress] [PathType] prefix checks - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:09.241
< Exit [BeforeEach] [Ingress] [PathType] prefix checks - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:17.143 (7.901s)
> Enter [BeforeEach] [Ingress] [PathType] prefix checks - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_prefix.go:31 @ 04/04/23 18:36:17.143
< Exit [BeforeEach] [Ingress] [PathType] prefix checks - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_prefix.go:31 @ 04/04/23 18:36:21.166 (4.023s)
> Enter [It] should return 404 when prefix /aaa does not match request /aaaccc - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_prefix.go:35 @ 04/04/23 18:36:21.166
< Exit [It] should return 404 when prefix /aaa does not match request /aaaccc - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_prefix.go:35 @ 04/04/23 18:36:31.412 (10.246s)
> Enter [AfterEach] [Ingress] [PathType] prefix checks - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:31.412
< Exit [AfterEach] [Ingress] [PathType] prefix checks - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:32.055 (644ms)
-
-
- > Enter [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:32.057
< Exit [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:39.923 (7.865s)
> Enter [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:32 @ 04/04/23 18:36:39.923
< Exit [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:32 @ 04/04/23 18:36:43.949 (4.026s)
> Enter [It] should set mirror-target to https://test.env.com/$request_uri - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:51 @ 04/04/23 18:36:43.949
< Exit [It] should set mirror-target to https://test.env.com/$request_uri - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:51 @ 04/04/23 18:36:54.141 (10.192s)
> Enter [AfterEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:54.141
< Exit [AfterEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:36:54.342 (200ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:36:54.342
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:01.212 (6.87s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:37:01.212
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:37:07.231 (6.019s)
> Enter [It] should set valid auth-tls-secret, sslVerify to off, and sslVerifyDepth to 2 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:84 @ 04/04/23 18:37:07.231
< Exit [It] should set valid auth-tls-secret, sslVerify to off, and sslVerifyDepth to 2 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:84 @ 04/04/23 18:37:17.855 (10.625s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:17.855
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:18.076 (221ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:18.076
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:25.984 (7.907s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:37:25.984
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:37:30.003 (4.019s)
> Enter [It] should work with use-regex annotation and session-cookie-path - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:270 @ 04/04/23 18:37:30.003
< Exit [It] should work with use-regex annotation and session-cookie-path - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:270 @ 04/04/23 18:37:40.203 (10.201s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:40.203
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:40.453 (250ms)
-
-
- > Enter [BeforeEach] [Setting] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:40.453
< Exit [BeforeEach] [Setting] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:47.317 (6.864s)
> Enter [It] Add ssl ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_ciphers.go:31 @ 04/04/23 18:37:47.317
< Exit [It] Add ssl ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_ciphers.go:31 @ 04/04/23 18:37:57.514 (10.197s)
> Enter [AfterEach] [Setting] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:57.514
< Exit [AfterEach] [Setting] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:37:57.725 (211ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:37:57.725
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:04.608 (6.883s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:38:04.608
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:38:08.636 (4.028s)
> Enter [It] should return status code 200 when authentication is configured and Authorization header is sent - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:172 @ 04/04/23 18:38:08.636
< Exit [It] should return status code 200 when authentication is configured and Authorization header is sent - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:172 @ 04/04/23 18:38:20.58 (11.945s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:20.58
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:20.761 (181ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:20.762
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:27.757 (6.995s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:38:27.757
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:38:31.784 (4.027s)
> Enter [It] should set proxy_redirect to hello.com goodbye.com - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:68 @ 04/04/23 18:38:31.784
< Exit [It] should set proxy_redirect to hello.com goodbye.com - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:68 @ 04/04/23 18:38:41.901 (10.118s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:41.901
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:42.108 (207ms)
-
-
- > Enter [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:42.108
< Exit [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:50.04 (7.932s)
> Enter [It] use the default configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:32 @ 04/04/23 18:38:50.04
< Exit [It] use the default configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:32 @ 04/04/23 18:38:53.238 (3.198s)
> Enter [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:53.238
< Exit [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:38:53.443 (205ms)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:38:53.443
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:00.319 (6.876s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:39:00.319
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:39:04.344 (4.026s)
> Enter [It] should not exists opentracing directive - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:58 @ 04/04/23 18:39:04.344
< Exit [It] should not exists opentracing directive - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:58 @ 04/04/23 18:39:21.438 (17.094s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:21.438
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:21.668 (229ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:39:21.668
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:39:21.668 (0s)
-
-
- > Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:21.67
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:29.901 (8.232s)
> Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 04/04/23 18:39:29.901
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 04/04/23 18:39:40.966 (11.065s)
> Enter [It] should delete Ingress updated to catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:81 @ 04/04/23 18:39:40.966
< Exit [It] should delete Ingress updated to catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:81 @ 04/04/23 18:39:55.23 (14.264s)
> Enter [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:55.23
< Exit [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:39:55.411 (181ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:39:55.412
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:03.291 (7.88s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:40:03.291
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:40:11.34 (8.049s)
> Enter [It] should route requests only to mainline if canary weight is 0 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:705 @ 04/04/23 18:40:11.34
< Exit [It] should route requests only to mainline if canary weight is 0 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:705 @ 04/04/23 18:40:31.758 (20.417s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:31.758
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:40:31.95 (192ms)
-
-
- > Enter [BeforeEach] single ingress - multiple hosts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:31.951
< Exit [BeforeEach] single ingress - multiple hosts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:40:39.859 (7.909s)
> Enter [BeforeEach] single ingress - multiple hosts - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/multiple_rules.go:33 @ 04/04/23 18:40:39.859
< Exit [BeforeEach] single ingress - multiple hosts - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/multiple_rules.go:33 @ 04/04/23 18:40:47.913 (8.054s)
> Enter [It] should set the correct $service_name NGINX variable - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/multiple_rules.go:38 @ 04/04/23 18:40:47.913
< Exit [It] should set the correct $service_name NGINX variable - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/multiple_rules.go:38 @ 04/04/23 18:41:01.214 (13.301s)
> Enter [AfterEach] single ingress - multiple hosts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:41:01.214
< Exit [AfterEach] single ingress - multiple hosts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:41:01.409 (195ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:19.256
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:04:27.796 (8.54s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:04:27.796
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:04:39.83 (12.034s)
> Enter [BeforeEach] With watch-ingress-without-class flag - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:462 @ 04/04/23 18:04:39.83
< Exit [BeforeEach] With watch-ingress-without-class flag - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:462 @ 04/04/23 18:04:46.871 (7.041s)
> Enter [It] should watch Ingress with no class and ignore ingress with a different class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:482 @ 04/04/23 18:04:46.871
< Exit [It] should watch Ingress with no class and ignore ingress with a different class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:482 @ 04/04/23 18:05:04.134 (17.262s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:04.134
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:04.398 (264ms)
-
-
- > Enter [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:04.398
< Exit [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:11.399 (7.001s)
> Enter [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:36 @ 04/04/23 18:05:11.399
< Exit [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:36 @ 04/04/23 18:05:15.426 (4.027s)
> Enter [It] should use the Service Cluster IP and Port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:70 @ 04/04/23 18:05:15.426
STEP: checking if the service is reached - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:82 @ 04/04/23 18:05:32.603
STEP: checking if the Service Cluster IP and Port are used - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:89 @ 04/04/23 18:05:32.612
< Exit [It] should use the Service Cluster IP and Port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:70 @ 04/04/23 18:05:32.783 (17.357s)
> Enter [AfterEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:32.783
< Exit [AfterEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:05:32.966 (182ms)
-
-
- > Enter [BeforeEach] [Flag] disable-service-external-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:32.966
< Exit [BeforeEach] [Flag] disable-service-external-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:05:40.858 (7.892s)
> Enter [BeforeEach] [Flag] disable-service-external-name - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_service_external_name.go:38 @ 04/04/23 18:05:40.858
< Exit [BeforeEach] [Flag] disable-service-external-name - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_service_external_name.go:38 @ 04/04/23 18:05:52.924 (12.066s)
> Enter [It] should ignore services of external-name type - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_service_external_name.go:52 @ 04/04/23 18:05:52.924
< Exit [It] should ignore services of external-name type - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_service_external_name.go:52 @ 04/04/23 18:06:13.273 (20.349s)
> Enter [AfterEach] [Flag] disable-service-external-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:13.273
< Exit [AfterEach] [Flag] disable-service-external-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:13.49 (217ms)
-
-
- > Enter [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:13.49
< Exit [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:20.419 (6.929s)
> Enter [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:38 @ 04/04/23 18:06:20.419
< Exit [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:38 @ 04/04/23 18:06:24.447 (4.029s)
> Enter [It] should configure satisfy directive correctly - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:42 @ 04/04/23 18:06:24.447
< Exit [It] should configure satisfy directive correctly - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:42 @ 04/04/23 18:06:41.792 (17.345s)
> Enter [AfterEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:41.792
< Exit [AfterEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:06:41.98 (187ms)
-
-
- > Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:41.98
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:06:49.854 (7.874s)
> Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:06:49.854
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 04/04/23 18:07:00.907 (11.052s)
> Enter [It] should set keep alive connection timeout to upstream server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:68 @ 04/04/23 18:07:00.907
< Exit [It] should set keep alive connection timeout to upstream server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:68 @ 04/04/23 18:07:11.072 (10.166s)
> Enter [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:11.073
< Exit [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:11.276 (203ms)
-
-
- > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:11.277
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:19.172 (7.895s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:07:19.172
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:07:28.212 (9.04s)
> Enter [It] should set vmap-hash-bucket-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:100 @ 04/04/23 18:07:28.212
< Exit [It] should set vmap-hash-bucket-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:100 @ 04/04/23 18:07:38.38 (10.168s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:38.38
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:07:38.612 (232ms)
-
-
- > Enter [BeforeEach] [Setting] [Load Balancer] load-balance - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:38.613
< Exit [BeforeEach] [Setting] [Load Balancer] load-balance - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:07:45.664 (7.051s)
> Enter [BeforeEach] [Setting] [Load Balancer] load-balance - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/configmap.go:31 @ 04/04/23 18:07:45.664
< Exit [BeforeEach] [Setting] [Load Balancer] load-balance - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/configmap.go:31 @ 04/04/23 18:07:49.689 (4.025s)
> Enter [It] should apply the configmap load-balance setting - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/configmap.go:35 @ 04/04/23 18:07:49.689
< Exit [It] should apply the configmap load-balance setting - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/configmap.go:35 @ 04/04/23 18:08:07.048 (17.358s)
> Enter [AfterEach] [Setting] [Load Balancer] load-balance - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:07.048
< Exit [AfterEach] [Setting] [Load Balancer] load-balance - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:08:07.227 (180ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:08:07.228
< Exit [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:25.86 (2m18.633s)
> Enter [It] authorization metadata should be overwritten by external auth response headers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:126 @ 04/04/23 18:10:25.86
< Exit [It] authorization metadata should be overwritten by external auth response headers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:126 @ 04/04/23 18:10:44.166 (18.305s)
> Enter [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:44.166
< Exit [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:10:44.384 (218ms)
-
-
- > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:44.385
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:10:51.27 (6.885s)
> Enter [It] should update the external name after a service update - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:248 @ 04/04/23 18:10:51.27
STEP: checking the service is updated to use eu.httpbin.org - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:304 @ 04/04/23 18:11:06.958
< Exit [It] should update the external name after a service update - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:248 @ 04/04/23 18:11:07.097 (15.827s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:07.097
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:07.302 (205ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:07.302
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:15.212 (7.91s)
> Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 04/04/23 18:11:15.212
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 04/04/23 18:11:19.237 (4.025s)
> Enter [It] should set valid proxy-ssl-secret, proxy-ssl-verify to on, proxy-ssl-verify-depth to 2, and proxy-ssl-server-name to on - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:64 @ 04/04/23 18:11:19.237
< Exit [It] should set valid proxy-ssl-secret, proxy-ssl-verify to on, proxy-ssl-verify-depth to 2, and proxy-ssl-server-name to on - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:64 @ 04/04/23 18:11:30.15 (10.913s)
> Enter [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:30.15
< Exit [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:30.361 (211ms)
-
-
- > Enter [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:30.361
< Exit [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:37.259 (6.898s)
> Enter [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:30 @ 04/04/23 18:11:37.259
< Exit [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:30 @ 04/04/23 18:11:39.287 (2.028s)
> Enter [It] set rewrite_log on - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:49 @ 04/04/23 18:11:39.287
< Exit [It] set rewrite_log on - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:49 @ 04/04/23 18:11:49.482 (10.195s)
> Enter [AfterEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:49.482
< Exit [AfterEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:11:49.703 (222ms)
-
-
- > Enter [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:49.704
< Exit [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:11:56.672 (6.968s)
> Enter [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:32 @ 04/04/23 18:11:56.672
< Exit [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:32 @ 04/04/23 18:12:07.713 (11.041s)
> Enter [It] reuse port should be enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:52 @ 04/04/23 18:12:07.713
< Exit [It] reuse port should be enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:52 @ 04/04/23 18:12:17.909 (10.196s)
> Enter [AfterEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:17.909
< Exit [AfterEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:18.149 (239ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:18.149
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:26.102 (7.953s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:12:26.102
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 04/04/23 18:12:34.143 (8.041s)
> Enter [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:604 @ 04/04/23 18:12:34.143
STEP: routing requests to the canary upstream when header value does not match and cookie is set to 'always' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:630 @ 04/04/23 18:12:51.301
< Exit [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:604 @ 04/04/23 18:12:51.309 (17.166s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:51.309
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:12:51.494 (185ms)
-
-
- > Enter [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:51.494
< Exit [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:12:58.391 (6.897s)
> Enter [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:31 @ 04/04/23 18:12:58.391
< Exit [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:31 @ 04/04/23 18:13:02.411 (4.02s)
> Enter [It] drops server snippet if disabled by the administrator - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:61 @ 04/04/23 18:13:02.411
< Exit [It] drops server snippet if disabled by the administrator - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:61 @ 04/04/23 18:13:31.674 (29.262s)
> Enter [AfterEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:31.674
< Exit [AfterEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:31.873 (199ms)
-
-
- > Enter [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:31.874
< Exit [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:38.753 (6.879s)
> Enter [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:67 @ 04/04/23 18:13:38.753
< Exit [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:67 @ 04/04/23 18:13:48.95 (10.197s)
> Enter [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:48.95
< Exit [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:49.177 (226ms)
-
-
-
- > Enter [BeforeEach] [Security] Pod Security Policies - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:49.177
< Exit [BeforeEach] [Security] Pod Security Policies - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:57.081 (7.904s)
> Enter [It] should be running with a Pod Security Policy - /go/src/k8s.io/ingress-nginx/test/e2e/settings/pod_security_policy.go:44 @ 04/04/23 18:13:57.081
[SKIPPED] PSP not supported in this version
In [It] at: /go/src/k8s.io/ingress-nginx/test/e2e/settings/pod_security_policy.go:56 @ 04/04/23 18:13:57.084
< Exit [It] should be running with a Pod Security Policy - /go/src/k8s.io/ingress-nginx/test/e2e/settings/pod_security_policy.go:44 @ 04/04/23 18:13:57.084 (2ms)
> Enter [AfterEach] [Security] Pod Security Policies - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:57.084
< Exit [AfterEach] [Security] Pod Security Policies - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:13:57.316 (232ms)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:13:57.316
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:04.203 (6.887s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:14:04.203
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:14:08.231 (4.028s)
> Enter [It] should enable modsecurity with snippet and block requests - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:153 @ 04/04/23 18:14:08.231
< Exit [It] should enable modsecurity with snippet and block requests - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:153 @ 04/04/23 18:14:30.484 (22.253s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:30.484
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:14:30.708 (223ms)
-
-
- > Enter [BeforeEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:30.708
< Exit [BeforeEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:14:37.628 (6.92s)
> Enter [It] should not create sync events - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_sync_events.go:80 @ 04/04/23 18:14:37.628
< Exit [It] should not create sync events - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_sync_events.go:80 @ 04/04/23 18:15:00.832 (23.203s)
> Enter [AfterEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:00.832
< Exit [AfterEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:01.031 (199ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:01.031
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:07.953 (6.922s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:15:07.953
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 04/04/23 18:15:11.978 (4.025s)
> Enter [It] should validate auth-tls-verify-client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:206 @ 04/04/23 18:15:11.978
< Exit [It] should validate auth-tls-verify-client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:206 @ 04/04/23 18:15:26.888 (14.91s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:26.888
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:27.083 (195ms)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:27.083
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:34.978 (7.895s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:15:34.978
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 04/04/23 18:15:39.01 (4.032s)
> Enter [It] should enable opentracing using zipkin - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:160 @ 04/04/23 18:15:39.01
< Exit [It] should enable opentracing using zipkin - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:160 @ 04/04/23 18:15:59.042 (20.032s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:59.042
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:15:59.301 (259ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:15:59.301
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 04/04/23 18:15:59.301 (0s)
-
-
- > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:15:59.302
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:06.324 (7.022s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:16:06.324
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 04/04/23 18:16:10.352 (4.028s)
> Enter [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 04/04/23 18:16:10.352
STEP: configuring certificate_by_lua and skipping Nginx configuration of the new certificate - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:128 @ 04/04/23 18:16:28.235
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:136 @ 04/04/23 18:16:36.64
< Exit [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 04/04/23 18:16:36.649 (26.297s)
> Enter [It] picks up a non-certificate only change - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:218 @ 04/04/23 18:16:36.649
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:229 @ 04/04/23 18:16:41.653
< Exit [It] picks up a non-certificate only change - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:218 @ 04/04/23 18:16:41.686 (5.038s)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:41.686
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:16:41.905 (219ms)
-
-
- > Enter [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:41.905
< Exit [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:16:48.792 (6.887s)
> Enter [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:35 @ 04/04/23 18:16:48.792
< Exit [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:35 @ 04/04/23 18:16:59.851 (11.059s)
> Enter [It] should not trust X-Forwarded-For header when setting is false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:78 @ 04/04/23 18:16:59.851
< Exit [It] should not trust X-Forwarded-For header when setting is false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:78 @ 04/04/23 18:17:17.088 (17.237s)
> Enter [AfterEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:17.088
< Exit [AfterEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:17.268 (179ms)
-
-
- > Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:17.268
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:25.143 (7.875s)
> Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 04/04/23 18:17:25.143
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 04/04/23 18:17:39.338 (14.195s)
> Enter [It] configures balancer Lua middleware correctly - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:50 @ 04/04/23 18:17:39.338
< Exit [It] configures balancer Lua middleware correctly - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:50 @ 04/04/23 18:17:45.709 (6.371s)
> Enter [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:45.709
< Exit [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:17:45.895 (186ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:45.896
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:17:52.77 (6.874s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:17:52.77
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 04/04/23 18:18:00.824 (8.054s)
> Enter [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:301 @ 04/04/23 18:18:00.824
< Exit [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:301 @ 04/04/23 18:18:29.039 (28.216s)
> Enter [It] user does not retain cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:337 @ 04/04/23 18:18:29.039
< Exit [It] user does not retain cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:337 @ 04/04/23 18:18:29.048 (9ms)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:29.048
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:29.27 (222ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:29.27
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:36.638 (7.367s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:18:36.638
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:18:40.656 (4.018s)
> Enter [It] should allow - single origin with required port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:358 @ 04/04/23 18:18:40.656
< Exit [It] should allow - single origin with required port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:358 @ 04/04/23 18:18:47.695 (7.04s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:47.695
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:18:47.919 (224ms)
-
-
- > Enter [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:47.919
< Exit [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:18:54.793 (6.873s)
> Enter [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:31 @ 04/04/23 18:18:54.793
< Exit [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:31 @ 04/04/23 18:18:58.818 (4.026s)
> Enter [It] drops snippet "more_set_headers "Foo1: Bar1";" in all locations if disabled by admin" - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:58 @ 04/04/23 18:18:58.818
< Exit [It] drops snippet "more_set_headers "Foo1: Bar1";" in all locations if disabled by admin" - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:58 @ 04/04/23 18:19:28.082 (29.263s)
> Enter [AfterEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:28.082
< Exit [AfterEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:28.561 (479ms)
-
-
- > Enter [BeforeEach] [Annotations] upstream-vhost - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:28.561
< Exit [BeforeEach] [Annotations] upstream-vhost - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:36.485 (7.924s)
> Enter [BeforeEach] [Annotations] upstream-vhost - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamvhost.go:30 @ 04/04/23 18:19:36.485
< Exit [BeforeEach] [Annotations] upstream-vhost - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamvhost.go:30 @ 04/04/23 18:19:40.514 (4.029s)
> Enter [It] set host to upstreamvhost.bar.com - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamvhost.go:34 @ 04/04/23 18:19:40.514
< Exit [It] set host to upstreamvhost.bar.com - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamvhost.go:34 @ 04/04/23 18:19:50.715 (10.201s)
> Enter [AfterEach] [Annotations] upstream-vhost - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:50.715
< Exit [AfterEach] [Annotations] upstream-vhost - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:19:50.928 (213ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:50.928
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:19:59.376 (8.447s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:19:59.376
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 04/04/23 18:20:03.412 (4.036s)
> Enter [It] should turn on proxy-buffering - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:157 @ 04/04/23 18:20:03.412
< Exit [It] should turn on proxy-buffering - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:157 @ 04/04/23 18:20:13.859 (10.448s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:13.859
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:20:15.468 (1.608s)
-
-
- > Enter [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:20:15.468
< Exit [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:32.896 (2m17.428s)
> Enter [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:42 @ 04/04/23 18:22:32.896
< Exit [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:42 @ 04/04/23 18:22:32.905 (9ms)
> Enter [It] should reload after an update in the configuration - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:169 @ 04/04/23 18:22:32.905
STEP: setting up a first deployment - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:171 @ 04/04/23 18:22:32.905
STEP: updating the tcp service to a second deployment - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:196 @ 04/04/23 18:22:40.099
< Exit [It] should reload after an update in the configuration - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:169 @ 04/04/23 18:22:50.31 (17.405s)
> Enter [AfterEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:50.31
< Exit [AfterEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:22:50.534 (224ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:50.534
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:22:57.402 (6.868s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:22:57.402
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:23:01.417 (4.015s)
> Enter [It] should not break functionality - without `*` - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:291 @ 04/04/23 18:23:01.417
< Exit [It] should not break functionality - without `*` - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:291 @ 04/04/23 18:23:08.429 (7.012s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:08.429
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:08.611 (182ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:08.611
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:15.499 (6.888s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:23:15.499
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:23:19.526 (4.026s)
> Enter [It] should set secure in cookie with provided false annotation on https - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:458 @ 04/04/23 18:23:19.526
< Exit [It] should set secure in cookie with provided false annotation on https - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:458 @ 04/04/23 18:23:29.716 (10.19s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:29.716
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:29.948 (233ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:29.949
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:36.837 (6.888s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:23:36.837
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:23:40.864 (4.027s)
> Enter [It] should return status code 401 when authentication is configured and Authorization header is sent with invalid credentials - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:116 @ 04/04/23 18:23:40.864
< Exit [It] should return status code 401 when authentication is configured and Authorization header is sent with invalid credentials - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:116 @ 04/04/23 18:23:51.976 (11.112s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:51.976
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:23:52.182 (206ms)
-
-
- > Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:23:52.183
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:00.596 (8.414s)
> Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 04/04/23 18:24:00.596
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 04/04/23 18:24:04.625 (4.028s)
> Enter [It] should exists opentelemetry_operation_name directive when is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:104 @ 04/04/23 18:24:04.625
< Exit [It] should exists opentelemetry_operation_name directive when is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:104 @ 04/04/23 18:24:21.864 (17.239s)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:21.864
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:22.288 (424ms)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 04/04/23 18:24:22.288
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 04/04/23 18:24:22.288 (0s)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:22.289
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:30.179 (7.89s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:24:30.179
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 04/04/23 18:24:32.201 (2.022s)
> Enter [It] should set cache_key when external auth cache is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:322 @ 04/04/23 18:24:32.201
< Exit [It] should set cache_key when external auth cache is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:322 @ 04/04/23 18:24:42.391 (10.19s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:42.391
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:24:42.559 (169ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:42.559
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:24:49.462 (6.902s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:24:49.462
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 04/04/23 18:24:55.483 (6.021s)
> Enter [It] should work with server-alias annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:372 @ 04/04/23 18:24:55.483
< Exit [It] should work with server-alias annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:372 @ 04/04/23 18:25:05.677 (10.194s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:05.677
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:05.892 (215ms)
-
-
- > Enter [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:05.892
< Exit [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:12.767 (6.875s)
> Enter [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:54 @ 04/04/23 18:25:12.767
< Exit [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:54 @ 04/04/23 18:25:22.853 (10.086s)
> Enter [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:22.853
< Exit [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:23.038 (186ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:23.039
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:30.928 (7.889s)
> Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:25:30.928
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 04/04/23 18:25:34.955 (4.027s)
> Enter [It] should set backend protocol to $scheme:// and use proxy_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:49 @ 04/04/23 18:25:34.955
< Exit [It] should set backend protocol to $scheme:// and use proxy_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:49 @ 04/04/23 18:25:45.122 (10.167s)
> Enter [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:45.122
< Exit [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:25:45.378 (256ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:45.378
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:25:52.259 (6.88s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:25:52.259
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 04/04/23 18:25:56.284 (4.026s)
> Enter [BeforeEach] With ingress-class-by-name flag - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:518 @ 04/04/23 18:25:56.284
< Exit [BeforeEach] With ingress-class-by-name flag - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:518 @ 04/04/23 18:26:05.326 (9.041s)
> Enter [It] should watch Ingress that uses the class name even if spec is different - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:539 @ 04/04/23 18:26:05.326
< Exit [It] should watch Ingress that uses the class name even if spec is different - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:539 @ 04/04/23 18:26:29.579 (24.254s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:29.579
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:29.795 (215ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:29.795
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:36.671 (6.876s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:26:36.671
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 04/04/23 18:26:40.694 (4.023s)
> Enter [It] should not match - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:338 @ 04/04/23 18:26:40.694
< Exit [It] should not match - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:338 @ 04/04/23 18:26:47.715 (7.021s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:47.715
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:26:47.897 (182ms)
-
-
- > Enter [BeforeEach] [Setting] Configmap change - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:47.898
< Exit [BeforeEach] [Setting] Configmap change - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:26:54.79 (6.892s)
> Enter [BeforeEach] [Setting] Configmap change - /go/src/k8s.io/ingress-nginx/test/e2e/settings/configmap_change.go:32 @ 04/04/23 18:26:54.79
< Exit [BeforeEach] [Setting] Configmap change - /go/src/k8s.io/ingress-nginx/test/e2e/settings/configmap_change.go:32 @ 04/04/23 18:26:58.813 (4.023s)
> Enter [It] should reload after an update in the configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/configmap_change.go:36 @ 04/04/23 18:26:58.813
STEP: adding a whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/settings/configmap_change.go:42 @ 04/04/23 18:27:05.828
STEP: changing error-log-level - /go/src/k8s.io/ingress-nginx/test/e2e/settings/configmap_change.go:61 @ 04/04/23 18:27:16.071
< Exit [It] should reload after an update in the configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/configmap_change.go:36 @ 04/04/23 18:27:29.359 (30.546s)
> Enter [AfterEach] [Setting] Configmap change - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:29.359
< Exit [AfterEach] [Setting] Configmap change - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:29.558 (198ms)
-
-
- > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:29.558
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:36.431 (6.873s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:27:36.431
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 04/04/23 18:27:47.466 (11.035s)
> Enter [It] should set variables-hash-bucket-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:80 @ 04/04/23 18:27:47.466
< Exit [It] should set variables-hash-bucket-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:80 @ 04/04/23 18:27:57.638 (10.172s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:57.638
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:27:57.835 (197ms)
-
-
- > Enter [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:27:57.835
< Exit [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:04.708 (6.873s)
> Enter [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:40 @ 04/04/23 18:28:04.708
< Exit [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:40 @ 04/04/23 18:28:20.208 (15.5s)
> Enter [It] uses default ssl certificate for catch-all ingress - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:64 @ 04/04/23 18:28:20.208
STEP: making sure new ingress is deployed - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:68 @ 04/04/23 18:28:27.228
STEP: making sure new ingress is responding - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:74 @ 04/04/23 18:28:30.423
STEP: making sure the configured default ssl certificate is being used - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:76 @ 04/04/23 18:28:30.423
< Exit [It] uses default ssl certificate for catch-all ingress - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:64 @ 04/04/23 18:28:32.435 (12.227s)
> Enter [AfterEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:32.435
< Exit [AfterEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:32.615 (181ms)
-
-
- > Enter [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:32.616
< Exit [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:39.497 (6.882s)
> Enter [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:42 @ 04/04/23 18:28:39.497
< Exit [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:42 @ 04/04/23 18:28:49.668 (10.171s)
> Enter [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:49.669
< Exit [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:28:49.884 (215ms)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:49.884
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:28:56.783 (6.899s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:28:56.783
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 04/04/23 18:29:00.81 (4.027s)
> Enter [It] should enable modsecurity - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:35 @ 04/04/23 18:29:00.81
< Exit [It] should enable modsecurity - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:35 @ 04/04/23 18:29:10.998 (10.189s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:10.998
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:29:11.21 (212ms)
-
-
- > Enter [BeforeEach] [Shutdown] Grace period shutdown - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:11.211
< Exit [BeforeEach] [Shutdown] Grace period shutdown - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:29:19.1 (7.89s)
> Enter [It] /healthz should return status code 500 during shutdown grace period - /go/src/k8s.io/ingress-nginx/test/e2e/gracefulshutdown/grace_period.go:35 @ 04/04/23 18:29:19.1
< Exit [It] /healthz should return status code 500 during shutdown grace period - /go/src/k8s.io/ingress-nginx/test/e2e/gracefulshutdown/grace_period.go:35 @ 04/04/23 18:30:30.168 (1m11.068s)
> Enter [AfterEach] [Shutdown] Grace period shutdown - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:30.168
< Exit [AfterEach] [Shutdown] Grace period shutdown - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:30.345 (177ms)
-
-
- > Enter [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:30.345
< Exit [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:37.278 (6.932s)
> Enter [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:32 @ 04/04/23 18:30:37.278
< Exit [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:32 @ 04/04/23 18:30:41.303 (4.025s)
> Enter [It] should return status code 200 for host 'foo' and 404 for 'bar' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:36 @ 04/04/23 18:30:41.303
< Exit [It] should return status code 200 for host 'foo' and 404 for 'bar' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:36 @ 04/04/23 18:30:51.481 (10.178s)
> Enter [AfterEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:51.481
< Exit [AfterEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:30:51.683 (202ms)
-
-
- > Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:51.684
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 04/04/23 18:30:58.618 (6.934s)
> Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 04/04/23 18:30:58.618
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 04/04/23 18:31:09.663 (11.045s)
> Enter [It] should enable PROXY Protocol for TCP - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:155 @ 04/04/23 18:31:09.663
Automatically polling progress:
[Setting] use-proxy-protocol should enable PROXY Protocol for TCP (Spec Runtime: 3m17.98s)
/go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:155
In [It] (Node Runtime: 3m0.001s)
/go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:155
Spec Goroutine
goroutine 2932 [IO wait, 3 minutes]
internal/poll.runtime_pollWait(0x7f9e883a91b8, 0x72)
/usr/local/go/src/runtime/netpoll.go:306
internal/poll.(*pollDesc).wait(0xc0000de300?, 0xc00098a926?, 0x0)
/usr/local/go/src/internal/poll/fd_poll_runtime.go:84
internal/poll.(*pollDesc).waitRead(...)
/usr/local/go/src/internal/poll/fd_poll_runtime.go:89
internal/poll.(*FD).Read(0xc0000de300, {0xc00098a926, 0x15a, 0x15a})
/usr/local/go/src/internal/poll/fd_unix.go:167
net.(*netFD).Read(0xc0000de300, {0xc00098a926?, 0x453656?, 0x380?})
/usr/local/go/src/net/fd_posix.go:55
net.(*conn).Read(0xc000516660, {0xc00098a926?, 0x19913c0?, 0xc00098a700?})
/usr/local/go/src/net/net.go:183
io.ReadAll({0x1f62de0, 0xc000516660})
/usr/local/go/src/io/io.go:701
> k8s.io/ingress-nginx/test/e2e/settings.glob..func38.5()
/go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:211
github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func3({0xa0558e, 0xc000300a80})
/go/src/k8s.io/ingress-nginx/.modcache/github.com/onsi/ginkgo/v2@v2.9.0/internal/node.go:463
github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3()
/go/src/k8s.io/ingress-nginx/.modcache/github.com/onsi/ginkgo/v2@v2.9.0/internal/suite.go:863
github.com/onsi/ginkgo/v2/internal.(*Suite).runNode
/go/src/k8s.io/ingress-nginx/.modcache/github.com/onsi/ginkgo/v2@v2.9.0/internal/suite.go:850
< Exit [It] should enable PROXY Protocol for TCP - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:155 @ 04/04/23 18:41:24.726 (10m15.064s)
> Enter [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:41:24.726
< Exit [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 04/04/23 18:41:24.943 (217ms)
+
+ > Enter [BeforeEach] [CGroups] cgroups - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 17:53:35.472
< Exit [BeforeEach] [CGroups] cgroups - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 17:53:42.61 (7.137s)
> Enter [BeforeEach] [CGroups] cgroups - /go/src/k8s.io/ingress-nginx/test/e2e/cgroups/cgroups_linux.go:37 @ 07/16/23 17:53:42.61
< Exit [BeforeEach] [CGroups] cgroups - /go/src/k8s.io/ingress-nginx/test/e2e/cgroups/cgroups_linux.go:37 @ 07/16/23 17:53:54.745 (12.135s)
> Enter [It] detects if cgroups is avaliable - /go/src/k8s.io/ingress-nginx/test/e2e/cgroups/cgroups_linux.go:42 @ 07/16/23 17:53:54.745
< Exit [It] detects if cgroups is avaliable - /go/src/k8s.io/ingress-nginx/test/e2e/cgroups/cgroups_linux.go:42 @ 07/16/23 17:53:54.745 (0s)
> Enter [AfterEach] [CGroups] cgroups - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 17:53:54.745
< Exit [AfterEach] [CGroups] cgroups - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 17:53:55.145 (400ms)
\ No newline at end of file
From 0f4d054c0766cacc3e4fde487f8ac0439f1cd0ac Mon Sep 17 00:00:00 2001
From: Nicholas Orlowsky
Date: Sun, 16 Jul 2023 23:47:43 -0400
Subject: [PATCH 021/283] gofmt
---
pkg/util/runtime/cpu_notlinux.go | 2 +-
test/e2e/cgroups/cgroups_linux.go | 30 +++++++++++++++---------------
2 files changed, 16 insertions(+), 16 deletions(-)
diff --git a/pkg/util/runtime/cpu_notlinux.go b/pkg/util/runtime/cpu_notlinux.go
index 0441af957..2a1b48252 100644
--- a/pkg/util/runtime/cpu_notlinux.go
+++ b/pkg/util/runtime/cpu_notlinux.go
@@ -26,4 +26,4 @@ import (
// NumCPU ...
func NumCPU() int {
return runtime.NumCPU()
-}
\ No newline at end of file
+}
diff --git a/test/e2e/cgroups/cgroups_linux.go b/test/e2e/cgroups/cgroups_linux.go
index 76a18407d..00d077b2b 100644
--- a/test/e2e/cgroups/cgroups_linux.go
+++ b/test/e2e/cgroups/cgroups_linux.go
@@ -28,8 +28,8 @@ import (
"k8s.io/ingress-nginx/test/e2e/framework"
- "path/filepath"
"k8s.io/ingress-nginx/pkg/util/runtime"
+ "path/filepath"
libcontainercgroups "github.com/opencontainers/runc/libcontainer/cgroups"
)
@@ -48,29 +48,29 @@ var _ = framework.IngressNginxDescribeSerial("[CGroups] cgroups", func() {
log.Fatal(err)
}
- quotaFile, err := os.Create(filepath.Join(cgroupPath,"cpu.cfs_quota_us"))
+ quotaFile, err := os.Create(filepath.Join(cgroupPath, "cpu.cfs_quota_us"))
if err != nil {
log.Fatal(err)
}
- periodFile, err := os.Create(filepath.Join(cgroupPath,"cpu.cfs_period_us"))
+ periodFile, err := os.Create(filepath.Join(cgroupPath, "cpu.cfs_period_us"))
if err != nil {
log.Fatal(err)
}
- quotaFile.WriteString("4");
- quotaFile.Sync();
+ quotaFile.WriteString("4")
+ quotaFile.Sync()
- periodFile.WriteString("2");
- periodFile.Sync();
-
- assert.Equal(ginkgo.GinkgoT(), runtime.GetCgroupVersion(), int64(1))
+ periodFile.WriteString("2")
+ periodFile.Sync()
+
+ assert.Equal(ginkgo.GinkgoT(), runtime.GetCgroupVersion(), int64(1))
assert.Equal(ginkgo.GinkgoT(), runtime.NumCPU(), 2)
- os.Remove(filepath.Join(cgroupPath,"cpu.cfs_quota_us"))
- os.Remove(filepath.Join(cgroupPath,"cpu.cfs_period_us"))
+ os.Remove(filepath.Join(cgroupPath, "cpu.cfs_quota_us"))
+ os.Remove(filepath.Join(cgroupPath, "cpu.cfs_period_us"))
})
ginkgo.It("detect cgroups version v2", func() {
@@ -85,10 +85,10 @@ var _ = framework.IngressNginxDescribeSerial("[CGroups] cgroups", func() {
log.Fatal(err)
}
- file.WriteString("4 2");
- file.Sync();
-
- assert.Equal(ginkgo.GinkgoT(), runtime.GetCgroupVersion(), int64(2))
+ file.WriteString("4 2")
+ file.Sync()
+
+ assert.Equal(ginkgo.GinkgoT(), runtime.GetCgroupVersion(), int64(2))
assert.Equal(ginkgo.GinkgoT(), runtime.NumCPU(), 2)
os.Remove("/sys/fs/cgroup/cpu.max")
From b270b4a8bf108dd210b209b1babb61a6bf5b840d Mon Sep 17 00:00:00 2001
From: Nicholas Orlowsky
Date: Sun, 16 Jul 2023 23:53:42 -0400
Subject: [PATCH 022/283] remove build flags and rename cgroups_linux.go
---
.../cgroups/{cgroups_linux.go => cgroups.go} | 3 -
test/e2e/e2e.go | 1 +
test/junitreports/report-e2e-test-suite.xml | 1311 +++++++++++++++++
3 files changed, 1312 insertions(+), 3 deletions(-)
rename test/e2e/cgroups/{cgroups_linux.go => cgroups.go} (98%)
create mode 100644 test/junitreports/report-e2e-test-suite.xml
diff --git a/test/e2e/cgroups/cgroups_linux.go b/test/e2e/cgroups/cgroups.go
similarity index 98%
rename from test/e2e/cgroups/cgroups_linux.go
rename to test/e2e/cgroups/cgroups.go
index 00d077b2b..6ad8558df 100644
--- a/test/e2e/cgroups/cgroups_linux.go
+++ b/test/e2e/cgroups/cgroups.go
@@ -1,6 +1,3 @@
-//go:build linux
-// +build linux
-
/*
Copyright 2020 The Kubernetes Authors.
diff --git a/test/e2e/e2e.go b/test/e2e/e2e.go
index 57b047230..6a9cb21f8 100644
--- a/test/e2e/e2e.go
+++ b/test/e2e/e2e.go
@@ -49,6 +49,7 @@ import (
_ "k8s.io/ingress-nginx/test/e2e/ssl"
_ "k8s.io/ingress-nginx/test/e2e/status"
_ "k8s.io/ingress-nginx/test/e2e/tcpudp"
+ _ "k8s.io/ingress-nginx/test/e2e/cgroups"
)
// RunE2ETests checks configuration parameters (specified through flags) and then runs
diff --git a/test/junitreports/report-e2e-test-suite.xml b/test/junitreports/report-e2e-test-suite.xml
new file mode 100644
index 000000000..43f6f3233
--- /dev/null
+++ b/test/junitreports/report-e2e-test-suite.xml
@@ -0,0 +1,1311 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ > Enter [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:07:34.215
< Exit [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:07:47.677 (13.462s)
> Enter [It] should use grpc_pass in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:43 @ 07/16/23 23:07:47.677
< Exit [It] should use grpc_pass in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:43 @ 07/16/23 23:08:11.636 (23.993s)
> Enter [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:11.636
< Exit [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:12.72 (1.084s)
+
+
+ > Enter [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:12.728
< Exit [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:26.952 (14.224s)
> Enter [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:32 @ 07/16/23 23:08:26.952
< Exit [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:32 @ 07/16/23 23:08:40.053 (13.136s)
> Enter [It] reuse port should be disabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:44 @ 07/16/23 23:08:40.053
< Exit [It] reuse port should be disabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:44 @ 07/16/23 23:08:50.288 (10.235s)
> Enter [AfterEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:50.289
< Exit [AfterEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:50.915 (626ms)
+
+
+ > Enter [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:50.916
< Exit [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:00.386 (9.47s)
> Enter [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:32 @ 07/16/23 23:09:00.386
< Exit [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:32 @ 07/16/23 23:09:11.506 (11.154s)
> Enter [It] reuse port should be enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:52 @ 07/16/23 23:09:11.506
< Exit [It] reuse port should be enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:52 @ 07/16/23 23:09:21.824 (10.319s)
> Enter [AfterEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:21.824
< Exit [AfterEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:22.594 (769ms)
+
+
+ > Enter [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:22.602
< Exit [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:31.342 (8.739s)
> Enter [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:32 @ 07/16/23 23:09:31.342
< Exit [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:32 @ 07/16/23 23:09:42.441 (11.134s)
> Enter [It] reuse port should be enabled by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:38 @ 07/16/23 23:09:42.441
< Exit [It] reuse port should be enabled by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:38 @ 07/16/23 23:09:45.658 (3.217s)
> Enter [AfterEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:45.658
< Exit [AfterEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:46.07 (411ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:46.071
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:55.04 (8.969s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 07/16/23 23:09:55.04
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 07/16/23 23:09:59.124 (4.084s)
> Enter [It] should pass URL-encoded certificate to upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:161 @ 07/16/23 23:09:59.124
< Exit [It] should pass URL-encoded certificate to upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:161 @ 07/16/23 23:10:13.448 (14.358s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:13.448
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:13.998 (550ms)
+
+
+ > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:13.999
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:22.738 (8.738s)
> Enter [It] should return 200 for service type=ExternalName with a port defined - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:129 @ 07/16/23 23:10:22.738
< Exit [It] should return 200 for service type=ExternalName with a port defined - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:129 @ 07/16/23 23:10:33.094 (10.391s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:33.094
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:33.676 (582ms)
+
+
+ > Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:33.688
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:42.391 (8.703s)
> Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 07/16/23 23:10:42.391
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 07/16/23 23:10:53.541 (11.15s)
> Enter [It] should enable PROXY Protocol for HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:112 @ 07/16/23 23:10:53.541
< Exit [It] should enable PROXY Protocol for HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:112 @ 07/16/23 23:12:26.01 (1m32.617s)
> Enter [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:26.01
< Exit [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:26.827 (817ms)
+
+
+ > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:26.829
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:35.094 (8.299s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:12:35.094
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:12:39.241 (4.147s)
> Enter [It] should enable modsecurity through the config map but ignore snippet as disabled by admin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:305 @ 07/16/23 23:12:39.241
< Exit [It] should enable modsecurity through the config map but ignore snippet as disabled by admin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:305 @ 07/16/23 23:13:08.762 (29.555s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:08.762
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:09.288 (526ms)
+
+
+ > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:09.289
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:17.226 (7.936s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:13:17.226
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:13:21.294 (4.068s)
> Enter [It] should not set cookie without domain annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:248 @ 07/16/23 23:13:21.294
< Exit [It] should not set cookie without domain annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:248 @ 07/16/23 23:13:31.492 (10.198s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:31.492
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:32.119 (661ms)
+
+
+
+ > Enter [BeforeEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:32.123
< Exit [BeforeEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:40.759 (8.636s)
> Enter [It] enables access logging for default backend - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:88 @ 07/16/23 23:13:40.759
[SKIPPED] enable-access-log-for-default-backend
In [It] at: /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:90 @ 07/16/23 23:13:40.759
< Exit [It] enables access logging for default backend - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:88 @ 07/16/23 23:13:40.759 (0s)
> Enter [AfterEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:40.76
< Exit [AfterEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:41.293 (534ms)
+
+
+ > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:41.296
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:50.342 (9.046s)
> Enter [It] should return status 502 for service type=ExternalName with an invalid host - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:153 @ 07/16/23 23:13:50.342
< Exit [It] should return status 502 for service type=ExternalName with an invalid host - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:153 @ 07/16/23 23:14:00.578 (10.237s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:00.578
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:01.204 (626ms)
+
+
+ > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:01.205
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:09.622 (8.451s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:14:09.622
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:14:13.746 (4.123s)
> Enter [It] should set secure in cookie with provided false annotation on https - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:458 @ 07/16/23 23:14:13.746
< Exit [It] should set secure in cookie with provided false annotation on https - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:458 @ 07/16/23 23:14:24.227 (10.481s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:24.227
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:24.72 (493ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:24.722
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:35.239 (10.552s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:14:35.239
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:14:43.596 (8.357s)
> Enter [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:383 @ 07/16/23 23:14:43.596
< Exit [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:383 @ 07/16/23 23:15:05.851 (22.289s)
> Enter [It] user retains cookie by default - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:411 @ 07/16/23 23:15:05.851
< Exit [It] user retains cookie by default - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:411 @ 07/16/23 23:15:05.862 (11ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:05.862
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:06.276 (414ms)
+
+
+ > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:06.278
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:14.855 (8.577s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 07/16/23 23:15:14.855
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 07/16/23 23:15:25.98 (11.125s)
> Enter [It] should set proxy-headers-hash-bucket-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:60 @ 07/16/23 23:15:25.98
< Exit [It] should set proxy-headers-hash-bucket-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:60 @ 07/16/23 23:15:36.182 (10.236s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:36.182
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:36.652 (469ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:36.653
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:45.163 (8.51s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:15:45.163
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:15:51.277 (6.114s)
> Enter [It] should disable cors allow credentials - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:94 @ 07/16/23 23:15:51.277
< Exit [It] should disable cors allow credentials - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:94 @ 07/16/23 23:16:01.482 (10.205s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:01.482
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:02.018 (570ms)
+
+
+ > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:02.019
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:09.556 (7.537s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:16:09.556
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:16:13.642 (4.085s)
> Enter [It] should serve Ingress when class is added - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:257 @ 07/16/23 23:16:13.642
< Exit [It] should serve Ingress when class is added - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:257 @ 07/16/23 23:16:39.138 (25.531s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:39.138
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:39.697 (559ms)
+
+
+ > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:39.736
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:47.471 (7.735s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:16:47.471
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:16:51.578 (4.107s)
> Enter [It] should delete Ingress when class is removed - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:192 @ 07/16/23 23:16:51.578
< Exit [It] should delete Ingress when class is removed - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:192 @ 07/16/23 23:17:17.178 (25.634s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:17.178
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:17.695 (517ms)
+
+
+ > Enter [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:17.697
< Exit [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:26.222 (8.525s)
> Enter [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:42 @ 07/16/23 23:17:26.222
< Exit [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:42 @ 07/16/23 23:17:30.293 (4.071s)
> Enter [It] should include geoip2 line in config when enabled and db file exists - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:46 @ 07/16/23 23:17:30.293
Jul 16 23:17:39.506: INFO: Connecting to github.com (140.82.113.3:443)
Connecting to github.com (140.82.113.3:443)
Connecting to raw.githubusercontent.com (185.199.111.133:443)
saving to '/etc/nginx/geoip/GeoLite2-Country.mmdb'
GeoLite2-Country.mmd 100%!|(MISSING)********************************| 17952 0:00:00 ETA
'/etc/nginx/geoip/GeoLite2-Country.mmdb' saved
< Exit [It] should include geoip2 line in config when enabled and db file exists - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:46 @ 07/16/23 23:17:49.758 (19.499s)
> Enter [AfterEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:49.758
< Exit [AfterEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:50.446 (688ms)
+
+
+ > Enter [BeforeEach] [Status] status update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:50.448
< Exit [BeforeEach] [Status] status update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:59.09 (8.642s)
> Enter [It] should update status field after client-go reconnection - /go/src/k8s.io/ingress-nginx/test/e2e/status/update.go:43 @ 07/16/23 23:17:59.09
Jul 16 23:17:59.090: INFO: Asynchronously running '/bin/bash -c /usr/local/bin/kubectl proxy --accept-hosts=.* --address=0.0.0.0 --port=0'
Jul 16 23:18:19.484: INFO: waiting for leader election and initial status update
Jul 16 23:18:59.486: INFO: Asynchronously running '/bin/bash -c /usr/local/bin/kubectl proxy --accept-hosts=.* --address=0.0.0.0 --port=36979'
< Exit [It] should update status field after client-go reconnection - /go/src/k8s.io/ingress-nginx/test/e2e/status/update.go:43 @ 07/16/23 23:19:09.559 (1m10.572s)
> Enter [AfterEach] [Status] status update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:09.559
< Exit [AfterEach] [Status] status update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:10.072 (512ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:10.074
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:18.758 (8.683s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:19:18.758
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:19:22.852 (4.094s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:19:22.852
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:19:37.243 (14.425s)
> Enter [It] should overwrite Foo header with auth response - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:529 @ 07/16/23 23:19:37.243
< Exit [It] should overwrite Foo header with auth response - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:529 @ 07/16/23 23:19:41.445 (4.202s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:41.446
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:42.051 (605ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:42.053
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:50.431 (8.379s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:19:50.432
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:19:54.495 (4.064s)
> Enter [It] should return status code 200 when authentication is configured with a map and Authorization header is sent - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:199 @ 07/16/23 23:19:54.495
< Exit [It] should return status code 200 when authentication is configured with a map and Authorization header is sent - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:199 @ 07/16/23 23:20:06.914 (12.453s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:06.914
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:07.67 (756ms)
+
+
+ > Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:07.684
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:16.699 (9.015s)
> Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 07/16/23 23:20:16.699
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 07/16/23 23:20:20.747 (4.048s)
> Enter [It] should set backend protocol to https:// and use proxy_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:34 @ 07/16/23 23:20:20.747
< Exit [It] should set backend protocol to https:// and use proxy_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:34 @ 07/16/23 23:20:31.134 (10.387s)
> Enter [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:31.134
< Exit [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:31.656 (556ms)
+
+
+ > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:31.657
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:40.453 (8.796s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:20:40.453
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:20:44.53 (4.077s)
> Enter [It] should enable modsecurity globally and with modsecurity-snippet block requests - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:189 @ 07/16/23 23:20:44.53
< Exit [It] should enable modsecurity globally and with modsecurity-snippet block requests - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:189 @ 07/16/23 23:21:13.79 (29.294s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:13.79
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:14.395 (605ms)
+
+
+ > Enter [BeforeEach] [Default Backend] change default settings - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:14.4
< Exit [BeforeEach] [Default Backend] change default settings - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:23.168 (8.768s)
> Enter [BeforeEach] [Default Backend] change default settings - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/with_hosts.go:34 @ 07/16/23 23:21:23.168
< Exit [BeforeEach] [Default Backend] change default settings - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/with_hosts.go:34 @ 07/16/23 23:21:27.261 (4.093s)
> Enter [It] should apply the annotation to the default backend - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/with_hosts.go:38 @ 07/16/23 23:21:27.261
< Exit [It] should apply the annotation to the default backend - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/with_hosts.go:38 @ 07/16/23 23:21:37.483 (10.256s)
> Enter [AfterEach] [Default Backend] change default settings - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:37.483
< Exit [AfterEach] [Default Backend] change default settings - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:38.068 (585ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:38.069
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:45.534 (7.465s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:21:45.534
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:21:49.607 (4.073s)
> Enter [BeforeEach] when external authentication is configured with a custom redirect param - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:651 @ 07/16/23 23:21:49.607
< Exit [BeforeEach] when external authentication is configured with a custom redirect param - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:651 @ 07/16/23 23:22:03.839 (14.266s)
> Enter [It] should return status code 200 when signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:678 @ 07/16/23 23:22:03.84
< Exit [It] should return status code 200 when signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:678 @ 07/16/23 23:22:03.852 (12ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:03.852
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:04.325 (473ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:04.328
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:12.822 (8.494s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:22:12.822
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:22:16.892 (4.07s)
> Enter [It] should return status code 401 when authentication is configured with invalid content and Authorization header is sent - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:227 @ 07/16/23 23:22:16.892
< Exit [It] should return status code 401 when authentication is configured with invalid content and Authorization header is sent - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:227 @ 07/16/23 23:22:27.117 (10.225s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:27.117
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:27.555 (438ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:27.556
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:36.204 (8.682s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:22:36.204
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:22:40.282 (4.078s)
> Enter [It] should return status code 200 when authentication is configured and Authorization header is sent - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:172 @ 07/16/23 23:22:40.283
< Exit [It] should return status code 200 when authentication is configured and Authorization header is sent - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:172 @ 07/16/23 23:22:52.486 (12.203s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:52.486
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:52.861 (375ms)
+
+
+ > Enter [BeforeEach] [Setting] settings-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:52.864
< Exit [BeforeEach] [Setting] settings-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:00.437 (7.573s)
> Enter [BeforeEach] [Setting] settings-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/settings/globalratelimit.go:34 @ 07/16/23 23:23:00.437
< Exit [BeforeEach] [Setting] settings-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/settings/globalratelimit.go:34 @ 07/16/23 23:23:04.507 (4.105s)
> Enter [It] generates correct NGINX configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/globalratelimit.go:38 @ 07/16/23 23:23:04.507
STEP: generating correct defaults - /go/src/k8s.io/ingress-nginx/test/e2e/settings/globalratelimit.go:43 @ 07/16/23 23:23:11.537
STEP: applying customizations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/globalratelimit.go:61 @ 07/16/23 23:23:14.706
< Exit [It] generates correct NGINX configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/globalratelimit.go:38 @ 07/16/23 23:23:25.01 (20.503s)
> Enter [AfterEach] [Setting] settings-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:25.01
< Exit [AfterEach] [Setting] settings-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:25.724 (714ms)
+
+
+ > Enter [BeforeEach] [Annotations] limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:25.726
< Exit [BeforeEach] [Annotations] limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:34.135 (8.443s)
> Enter [BeforeEach] [Annotations] limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitrate.go:33 @ 07/16/23 23:23:34.135
< Exit [BeforeEach] [Annotations] limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitrate.go:33 @ 07/16/23 23:23:38.193 (4.058s)
> Enter [It] Check limit-rate annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitrate.go:37 @ 07/16/23 23:23:38.193
< Exit [It] Check limit-rate annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitrate.go:37 @ 07/16/23 23:23:52.705 (14.512s)
> Enter [AfterEach] [Annotations] limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:52.707
< Exit [AfterEach] [Annotations] limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:53.193 (486ms)
+
+
+ > Enter [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:53.194
< Exit [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:02.76 (9.601s)
> Enter [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:34 @ 07/16/23 23:24:02.76
< Exit [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:34 @ 07/16/23 23:24:13.875 (11.115s)
> Enter [It] Add a custom header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:40 @ 07/16/23 23:24:13.875
< Exit [It] Add a custom header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:40 @ 07/16/23 23:24:24.131 (10.255s)
> Enter [AfterEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:24.131
< Exit [AfterEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:24.572 (441ms)
+
+
+ > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:24.573
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:33.002 (8.463s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:24:33.003
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:24:37.063 (4.061s)
> Enter [It] should enable modsecurity with transaction ID and OWASP rules - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:53 @ 07/16/23 23:24:37.063
< Exit [It] should enable modsecurity with transaction ID and OWASP rules - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:53 @ 07/16/23 23:24:47.308 (10.245s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:47.308
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:47.843 (535ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:47.845
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:56.211 (8.367s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:24:56.212
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:25:04.311 (8.134s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:25:04.312
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 07/16/23 23:25:04.312
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 07/16/23 23:25:14.551
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 07/16/23 23:25:24.781
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:25:34.923 (30.646s)
> Enter [It] should return status code 200 when request whitelisted (via no-auth-locations) service and 401 when request protected service - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:102 @ 07/16/23 23:25:34.923
STEP: Adding a no-auth-locations for /bar to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:104 @ 07/16/23 23:25:34.924
STEP: Sending a request to protected service /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:111 @ 07/16/23 23:25:45.117
STEP: Sending a request to whitelisted service /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:118 @ 07/16/23 23:25:45.136
< Exit [It] should return status code 200 when request whitelisted (via no-auth-locations) service and 401 when request protected service - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:102 @ 07/16/23 23:25:45.155 (10.231s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:45.155
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:45.792 (637ms)
+
+
+ > Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:45.799
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:53.394 (7.595s)
> Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 07/16/23 23:25:53.394
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 07/16/23 23:25:57.447 (4.052s)
> Enter [It] should write rewrite logs - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:37 @ 07/16/23 23:25:57.447
STEP: setting enable-rewrite-log annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:38 @ 07/16/23 23:25:57.447
< Exit [It] should write rewrite logs - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:37 @ 07/16/23 23:26:10.67 (13.258s)
> Enter [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:10.67
< Exit [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:11.462 (792ms)
+
+
+ > Enter [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:11.466
< Exit [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:19.994 (8.529s)
> Enter [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:36 @ 07/16/23 23:26:19.994
< Exit [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:36 @ 07/16/23 23:26:24.057 (4.063s)
> Enter [It] should use the Service Cluster IP and Port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:41 @ 07/16/23 23:26:24.057
STEP: checking if the service is reached - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:53 @ 07/16/23 23:26:34.26
STEP: checking if the Service Cluster IP and Port are used - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:60 @ 07/16/23 23:26:34.268
< Exit [It] should use the Service Cluster IP and Port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:41 @ 07/16/23 23:26:34.424 (10.402s)
> Enter [AfterEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:34.424
< Exit [AfterEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:34.943 (519ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:34.948
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:43.595 (8.647s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:26:43.595
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:26:47.667 (4.072s)
> Enter [It] should allow - single origin with required port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:358 @ 07/16/23 23:26:47.667
< Exit [It] should allow - single origin with required port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:358 @ 07/16/23 23:26:54.707 (7.04s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:54.707
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:55.197 (490ms)
+
+
+ > Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:55.199
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:02.431 (7.267s)
> Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 07/16/23 23:27:02.431
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 07/16/23 23:27:06.577 (4.146s)
> Enter [It] should not set client_body_buffer_size to invalid 1b - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:145 @ 07/16/23 23:27:06.577
< Exit [It] should not set client_body_buffer_size to invalid 1b - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:145 @ 07/16/23 23:27:16.86 (10.283s)
> Enter [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:16.86
< Exit [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:17.6 (740ms)
+
+
+ > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:17.603
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:29.242 (11.639s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:27:29.242
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:27:33.297 (4.089s)
> Enter [It] should accept both Ingresses with default IngressClassName and IngressClass annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:132 @ 07/16/23 23:27:33.297
< Exit [It] should accept both Ingresses with default IngressClassName and IngressClass annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:132 @ 07/16/23 23:27:50.62 (17.323s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:50.62
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:51.396 (777ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:51.398
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:59.848 (8.45s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:27:59.848
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:28:07.927 (8.114s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:28:07.927
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 07/16/23 23:28:07.927
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 07/16/23 23:28:18.108
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 07/16/23 23:28:28.311
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:28:38.594 (30.701s)
> Enter [It] should proxy_method method when global-auth-method is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:197 @ 07/16/23 23:28:38.594
STEP: Adding a global-auth-method to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:202 @ 07/16/23 23:28:38.594
< Exit [It] should proxy_method method when global-auth-method is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:197 @ 07/16/23 23:28:48.849 (10.255s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:48.849
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:49.496 (647ms)
+
+
+ > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:49.498
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:58.133 (8.635s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 07/16/23 23:28:58.133
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 07/16/23 23:29:00.195 (2.062s)
> Enter [It] should not use ports during the HTTP to HTTPS redirection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:187 @ 07/16/23 23:29:00.195
< Exit [It] should not use ports during the HTTP to HTTPS redirection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:187 @ 07/16/23 23:29:09.273 (9.111s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:09.273
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:09.693 (420ms)
+
+
+ > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:09.696
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:18.525 (8.83s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:29:18.525
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:29:22.595 (4.069s)
> Enter [It] should warn user when use-regex is true and session-cookie-path is not set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:294 @ 07/16/23 23:29:22.595
< Exit [It] should warn user when use-regex is true and session-cookie-path is not set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:294 @ 07/16/23 23:29:35.79 (13.229s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:35.79
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:36.912 (1.123s)
+
+
+ > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:36.914
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:45.266 (8.352s)
> Enter [It] should update the external name after a service update - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:248 @ 07/16/23 23:29:45.266
STEP: checking the service is updated to use eu.httpbin.org - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:304 @ 07/16/23 23:30:01.037
< Exit [It] should update the external name after a service update - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:248 @ 07/16/23 23:30:01.219 (15.992s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:30:01.219
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:30:01.675 (455ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:30:01.676
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:30:09.223 (7.547s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:30:09.223
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:30:17.344 (8.121s)
> Enter [It] should route requests to the correct upstream if the canary ingress is modified - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:307 @ 07/16/23 23:30:17.344
STEP: routing requests destined for the mainline ingress to the mainline upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:351 @ 07/16/23 23:30:44.8
STEP: routing requests destined for the canary ingress to the canary upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:360 @ 07/16/23 23:30:44.834
< Exit [It] should route requests to the correct upstream if the canary ingress is modified - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:307 @ 07/16/23 23:30:44.863 (27.584s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:30:44.863
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:30:51.061 (6.197s)
+
+
+ > Enter [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:30:51.215
< Exit [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:08.914 (17.737s)
> Enter [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:40 @ 07/16/23 23:31:08.914
< Exit [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:40 @ 07/16/23 23:31:24.729 (15.815s)
> Enter [It] uses default ssl certificate for host based ingress when configured certificate does not match host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:80 @ 07/16/23 23:31:24.729
STEP: making sure new ingress is deployed - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:90 @ 07/16/23 23:31:33.588
STEP: making sure the configured default ssl certificate is being used - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:96 @ 07/16/23 23:31:36.75
< Exit [It] uses default ssl certificate for host based ingress when configured certificate does not match host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:80 @ 07/16/23 23:31:38.764 (14.071s)
> Enter [AfterEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:38.764
< Exit [AfterEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:39.22 (456ms)
+
+
+ > Enter [BeforeEach] [Setting] Configmap - limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:39.221
< Exit [BeforeEach] [Setting] Configmap - limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:47.492 (8.271s)
> Enter [BeforeEach] [Setting] Configmap - limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/settings/limit_rate.go:32 @ 07/16/23 23:31:47.492
< Exit [BeforeEach] [Setting] Configmap - limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/settings/limit_rate.go:32 @ 07/16/23 23:31:51.545 (4.053s)
> Enter [It] Check limit-rate config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/limit_rate.go:36 @ 07/16/23 23:31:51.545
< Exit [It] Check limit-rate config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/limit_rate.go:36 @ 07/16/23 23:32:22.076 (30.566s)
> Enter [AfterEach] [Setting] Configmap - limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:22.076
< Exit [AfterEach] [Setting] Configmap - limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:22.569 (493ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:22.57
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:30.865 (8.329s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:32:30.865
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:32:34.935 (4.071s)
> Enter [It] should allow - missing origins (should allow all origins) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:571 @ 07/16/23 23:32:34.936
< Exit [It] should allow - missing origins (should allow all origins) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:571 @ 07/16/23 23:32:42.001 (7.066s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:42.001
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:42.52 (519ms)
+
+
+ > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:42.522
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:49.858 (7.336s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 07/16/23 23:32:49.859
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 07/16/23 23:33:00.922 (11.098s)
> Enter [It] should set server_names_hash_max_size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:48 @ 07/16/23 23:33:00.922
< Exit [It] should set server_names_hash_max_size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:48 @ 07/16/23 23:33:11.133 (10.211s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:11.133
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:11.499 (366ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:11.501
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:19.977 (8.476s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 07/16/23 23:33:19.977
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 07/16/23 23:33:24.088 (4.111s)
> Enter [It] should return 200 using auth-tls-match-cn where atleast one of the regex options matches CN from client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:324 @ 07/16/23 23:33:24.088
< Exit [It] should return 200 using auth-tls-match-cn where atleast one of the regex options matches CN from client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:324 @ 07/16/23 23:33:34.766 (10.712s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:34.766
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:35.346 (580ms)
+
+
+ > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:35.349
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:43.804 (8.455s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 07/16/23 23:33:43.804
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 07/16/23 23:33:54.894 (11.09s)
> Enter [It] should set variables-hash-bucket-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:80 @ 07/16/23 23:33:54.894
< Exit [It] should set variables-hash-bucket-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:80 @ 07/16/23 23:34:05.028 (10.168s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:05.028
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:05.552 (523ms)
+
+
+ > Enter [BeforeEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:05.554
< Exit [BeforeEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:14.153 (8.6s)
> Enter [It] should be disabled when set to false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/multi_accept.go:49 @ 07/16/23 23:34:14.153
< Exit [It] should be disabled when set to false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/multi_accept.go:49 @ 07/16/23 23:34:24.357 (10.204s)
> Enter [AfterEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:24.358
< Exit [AfterEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:24.84 (482ms)
+
+
+ > Enter [BeforeEach] single ingress - multiple hosts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:24.841
< Exit [BeforeEach] single ingress - multiple hosts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:33.146 (8.339s)
> Enter [BeforeEach] single ingress - multiple hosts - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/multiple_rules.go:33 @ 07/16/23 23:34:33.146
< Exit [BeforeEach] single ingress - multiple hosts - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/multiple_rules.go:33 @ 07/16/23 23:34:47.325 (14.18s)
> Enter [It] should set the correct $service_name NGINX variable - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/multiple_rules.go:38 @ 07/16/23 23:34:47.325
< Exit [It] should set the correct $service_name NGINX variable - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/multiple_rules.go:38 @ 07/16/23 23:35:00.678 (13.387s)
> Enter [AfterEach] single ingress - multiple hosts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:00.678
< Exit [AfterEach] single ingress - multiple hosts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:01.088 (411ms)
+
+
+ > Enter [BeforeEach] [Annotations] app-root - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:01.09
< Exit [BeforeEach] [Annotations] app-root - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:09.717 (8.628s)
> Enter [BeforeEach] [Annotations] app-root - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/approot.go:31 @ 07/16/23 23:35:09.717
< Exit [BeforeEach] [Annotations] app-root - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/approot.go:31 @ 07/16/23 23:35:13.774 (4.056s)
> Enter [It] should redirect to /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/approot.go:35 @ 07/16/23 23:35:13.774
< Exit [It] should redirect to /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/approot.go:35 @ 07/16/23 23:35:24.001 (10.227s)
> Enter [AfterEach] [Annotations] app-root - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:24.001
< Exit [AfterEach] [Annotations] app-root - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:24.542 (541ms)
+
+
+ > Enter [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:24.545
< Exit [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:32.804 (8.293s)
> Enter [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:39 @ 07/16/23 23:35:32.804
< Exit [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:39 @ 07/16/23 23:35:45.013 (12.209s)
> Enter [It] should enable ssl-passthrough-proxy-port on a different port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:56 @ 07/16/23 23:35:45.013
< Exit [It] should enable ssl-passthrough-proxy-port on a different port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:56 @ 07/16/23 23:35:56.305 (11.292s)
> Enter [AfterEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:56.305
< Exit [AfterEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:57.119 (814ms)
+
+
+ > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:57.124
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:06.657 (9.567s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:36:06.657
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:36:10.742 (4.085s)
> Enter [It] should work with use-regex annotation and session-cookie-path - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:270 @ 07/16/23 23:36:10.742
< Exit [It] should work with use-regex annotation and session-cookie-path - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:270 @ 07/16/23 23:36:20.937 (10.195s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:20.937
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:21.453 (516ms)
+
+
+ > Enter [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:21.455
< Exit [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:31.124 (9.704s)
> Enter [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:36 @ 07/16/23 23:36:31.124
< Exit [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:36 @ 07/16/23 23:36:35.265 (4.141s)
> Enter [It] should return the fake SSL certificate if the secret is invalid - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:82 @ 07/16/23 23:36:35.265
< Exit [It] should return the fake SSL certificate if the secret is invalid - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:82 @ 07/16/23 23:36:48.617 (13.352s)
> Enter [AfterEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:48.617
< Exit [AfterEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:49.062 (444ms)
+
+
+ > Enter [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:49.063
< Exit [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:57.626 (8.563s)
> Enter [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:79 @ 07/16/23 23:36:57.626
< Exit [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:79 @ 07/16/23 23:37:05.661 (8.069s)
> Enter [It] should connect to the same pod - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:83 @ 07/16/23 23:37:05.661
< Exit [It] should connect to the same pod - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:83 @ 07/16/23 23:37:36.037 (30.41s)
> Enter [AfterEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:36.037
< Exit [AfterEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:36.473 (436ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:36.475
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:45.324 (8.85s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:37:45.324
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:37:57.596 (12.271s)
> Enter [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:301 @ 07/16/23 23:37:57.596
< Exit [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:301 @ 07/16/23 23:38:25.91 (28.348s)
> Enter [It] user with global-auth-always-set-cookie key in configmap retains cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:348 @ 07/16/23 23:38:25.91
< Exit [It] user with global-auth-always-set-cookie key in configmap retains cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:348 @ 07/16/23 23:38:32.91 (7.035s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:32.91
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:33.401 (490ms)
+
+
+ > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:33.402
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:42.01 (8.609s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 07/16/23 23:38:42.01
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 07/16/23 23:38:55.207 (13.196s)
> Enter [It] should not configure log-format escape by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:40 @ 07/16/23 23:38:55.207
< Exit [It] should not configure log-format escape by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:40 @ 07/16/23 23:38:58.375 (3.169s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:58.375
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:58.773 (398ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:58.777
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:07.045 (8.302s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:39:07.045
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:39:11.141 (4.096s)
> Enter [BeforeEach] when external authentication is configured with a custom redirect param - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:651 @ 07/16/23 23:39:11.141
< Exit [BeforeEach] when external authentication is configured with a custom redirect param - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:651 @ 07/16/23 23:39:25.521 (14.38s)
> Enter [It] keeps processing new ingresses even if one of the existing ingresses is misconfigured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:698 @ 07/16/23 23:39:25.521
< Exit [It] keeps processing new ingresses even if one of the existing ingresses is misconfigured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:698 @ 07/16/23 23:39:36.735 (11.248s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:36.735
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:37.352 (617ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:37.354
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:47.228 (9.874s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:39:47.228
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:39:55.38 (8.152s)
> Enter [It] should return 404 status for requests to the canary if no matching ingress is found - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:80 @ 07/16/23 23:39:55.38
< Exit [It] should return 404 status for requests to the canary if no matching ingress is found - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:80 @ 07/16/23 23:40:02.395 (7.05s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:02.395
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:02.942 (547ms)
+
+
+ > Enter [BeforeEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:02.952
< Exit [BeforeEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:14.181 (11.229s)
> Enter [It] should have worker_rlimit_nofile option - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_options.go:31 @ 07/16/23 23:40:14.181
< Exit [It] should have worker_rlimit_nofile option - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_options.go:31 @ 07/16/23 23:40:17.314 (3.133s)
> Enter [AfterEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:17.314
< Exit [AfterEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:17.708 (394ms)
+
+
+ > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:17.709
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:26.08 (8.371s)
> Enter [It] should sync ingress on external name service addition/deletion - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:311 @ 07/16/23 23:40:26.08
< Exit [It] should sync ingress on external name service addition/deletion - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:311 @ 07/16/23 23:40:46.867 (20.821s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:46.867
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:47.244 (376ms)
+
+
+ I0716 23:41:15.732712 21 request.go:690] Waited for 1.1995168s due to client-side throttling, not priority and fairness, request: GET:https://10.96.0.1:443/api/v1/namespaces/e2e-tests-limit-connections-1689550847245898400-wb8ks/services/nginx-ingress-controller
+ > Enter [BeforeEach] [Annotations] Annotation - limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:47.245
< Exit [BeforeEach] [Annotations] Annotation - limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:56.079 (8.834s)
> Enter [BeforeEach] [Annotations] Annotation - limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitconnections.go:34 @ 07/16/23 23:40:56.079
< Exit [BeforeEach] [Annotations] Annotation - limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitconnections.go:34 @ 07/16/23 23:41:00.171 (4.127s)
> Enter [It] should limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitconnections.go:38 @ 07/16/23 23:41:00.171
< Exit [It] should limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitconnections.go:38 @ 07/16/23 23:41:24.568 (24.396s)
> Enter [AfterEach] [Annotations] Annotation - limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:24.568
< Exit [AfterEach] [Annotations] Annotation - limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:25.344 (776ms)
+
+
+ > Enter [BeforeEach] [Shutdown] Grace period shutdown - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:41:25.36
< Exit [BeforeEach] [Shutdown] Grace period shutdown - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:41:32.695 (7.368s)
> Enter [It] /healthz should return status code 500 during shutdown grace period - /go/src/k8s.io/ingress-nginx/test/e2e/gracefulshutdown/grace_period.go:35 @ 07/16/23 23:41:32.695
< Exit [It] /healthz should return status code 500 during shutdown grace period - /go/src/k8s.io/ingress-nginx/test/e2e/gracefulshutdown/grace_period.go:35 @ 07/16/23 23:42:45.785 (1m13.158s)
> Enter [AfterEach] [Shutdown] Grace period shutdown - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:42:45.785
< Exit [AfterEach] [Shutdown] Grace period shutdown - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:42:46.185 (401ms)
+
+
+ > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:42:46.188
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:43:12.099 (25.945s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:43:12.099
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:43:20.23 (8.131s)
> Enter [It] should return an error if there is an invalid value in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:136 @ 07/16/23 23:43:20.23
< Exit [It] should return an error if there is an invalid value in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:136 @ 07/16/23 23:43:27.268 (7.037s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:43:27.268
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:43:27.784 (516ms)
+
+
+ > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:43:27.785
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:43:58.24 (30.49s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:43:58.24
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:44:06.339 (8.133s)
> Enter [It] reject ingress with global-rate-limit annotations when memcached is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:43 @ 07/16/23 23:44:06.339
STEP: rejects ingress when memcached is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:52 @ 07/16/23 23:44:06.339
STEP: accepts ingress when memcached is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:57 @ 07/16/23 23:44:06.349
< Exit [It] reject ingress with global-rate-limit annotations when memcached is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:43 @ 07/16/23 23:44:16.599 (10.26s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:44:16.599
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:44:17.054 (455ms)
+
+
+ > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:44:17.055
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:44:36.36 (19.339s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:44:36.36
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:44:44.488 (8.128s)
> Enter [It] should not return an error for an invalid Ingress when it has unknown class - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:207 @ 07/16/23 23:44:44.488
< Exit [It] should not return an error for an invalid Ingress when it has unknown class - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:207 @ 07/16/23 23:44:44.642 (153ms)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:44:44.642
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:44:45.068 (426ms)
+
+
+ > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:44:45.07
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:45:03.441 (18.405s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:45:03.441
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:45:11.572 (8.131s)
> Enter [It] should not allow overlaps of host and paths without canary annotations - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:70 @ 07/16/23 23:45:11.572
< Exit [It] should not allow overlaps of host and paths without canary annotations - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:70 @ 07/16/23 23:45:14.768 (3.197s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:45:14.768
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:45:15.19 (422ms)
+
+
+ > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:45:15.191
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:45:33.55 (18.393s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:45:33.55
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:45:41.706 (8.156s)
> Enter [It] should return an error if the Ingress V1 definition contains invalid annotations - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:196 @ 07/16/23 23:45:41.706
< Exit [It] should return an error if the Ingress V1 definition contains invalid annotations - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:196 @ 07/16/23 23:45:41.879 (173ms)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:45:41.879
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:45:42.315 (436ms)
+
+
+ > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:45:42.316
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:46:05.628 (23.347s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:46:05.629
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:46:13.77 (8.142s)
> Enter [It] should not return an error if the Ingress V1 definition is valid with IngressClass annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:180 @ 07/16/23 23:46:13.77
< Exit [It] should not return an error if the Ingress V1 definition is valid with IngressClass annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:180 @ 07/16/23 23:46:19.093 (5.323s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:46:19.093
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:46:19.553 (460ms)
+
+
+ > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:46:19.554
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:46:38.748 (19.229s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:46:38.748
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:46:46.903 (8.154s)
> Enter [It] should return an error if there is a forbidden value in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:150 @ 07/16/23 23:46:46.903
< Exit [It] should return an error if there is a forbidden value in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:150 @ 07/16/23 23:46:53.94 (7.037s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:46:53.94
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:46:54.36 (420ms)
+
+
+ > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:46:54.361
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:47:21.846 (27.52s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:47:21.846
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:47:29.967 (8.139s)
> Enter [It] should not return an error if the Ingress V1 definition is valid with Ingress Class - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:164 @ 07/16/23 23:47:29.967
< Exit [It] should not return an error if the Ingress V1 definition is valid with Ingress Class - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:164 @ 07/16/23 23:47:33.332 (3.365s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:47:33.332
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:47:33.801 (469ms)
+
+
+ > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:47:33.802
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:48:03.021 (29.226s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:48:03.021
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:48:11.191 (8.17s)
> Enter [It] should block ingress with invalid path - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:108 @ 07/16/23 23:48:11.191
< Exit [It] should block ingress with invalid path - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:108 @ 07/16/23 23:48:14.438 (3.246s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:48:14.438
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:48:15.015 (577ms)
+
+
+ > Enter [BeforeEach] [TopologyHints] topology aware routing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:48:15.017
< Exit [BeforeEach] [TopologyHints] topology aware routing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:48:22.38 (7.363s)
> Enter [BeforeEach] [TopologyHints] topology aware routing - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/topology.go:39 @ 07/16/23 23:48:22.38
< Exit [BeforeEach] [TopologyHints] topology aware routing - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/topology.go:39 @ 07/16/23 23:48:26.446 (4.066s)
> Enter [It] should return 200 when service has topology hints - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/topology.go:43 @ 07/16/23 23:48:26.446
STEP: checking if the service is reached - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/topology.go:53 @ 07/16/23 23:48:36.588
< Exit [It] should return 200 when service has topology hints - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/topology.go:43 @ 07/16/23 23:48:36.76 (10.343s)
> Enter [AfterEach] [TopologyHints] topology aware routing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:48:36.76
< Exit [AfterEach] [TopologyHints] topology aware routing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:48:37.218 (459ms)
+
+
+ > Enter [BeforeEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:48:37.219
< Exit [BeforeEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:49:01.506 (24.32s)
> Enter [BeforeEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/settings/namespace_selector.go:51 @ 07/16/23 23:49:01.506
< Exit [BeforeEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/settings/namespace_selector.go:51 @ 07/16/23 23:49:27.706 (26.2s)
> Enter [It] should ingore Ingress of namespace without label foo=bar and accept those of namespace with label foo=bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/namespace_selector.go:63 @ 07/16/23 23:49:27.706
< Exit [It] should ingore Ingress of namespace without label foo=bar and accept those of namespace with label foo=bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/namespace_selector.go:63 @ 07/16/23 23:49:34.037 (6.365s)
> Enter [AfterEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:49:34.037
< Exit [AfterEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:49:34.43 (393ms)
> Enter [AfterEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/settings/namespace_selector.go:56 @ 07/16/23 23:49:34.43
< Exit [AfterEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/settings/namespace_selector.go:56 @ 07/16/23 23:49:34.447 (17ms)
+
+
+ > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:49:34.449
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:49:53.407 (18.958s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:49:53.407
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:50:01.525 (8.152s)
> Enter [It] should allow overlaps of host and paths with canary annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:87 @ 07/16/23 23:50:01.525
< Exit [It] should allow overlaps of host and paths with canary annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:87 @ 07/16/23 23:50:06.787 (5.263s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:50:06.787
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:50:07.247 (459ms)
+
+
+ > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:50:07.248
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:50:26.543 (19.295s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:50:26.543
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:50:34.647 (8.138s)
> Enter [It] should return an error if there is an error validating the ingress definition - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:125 @ 07/16/23 23:50:34.647
< Exit [It] should return an error if there is an error validating the ingress definition - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:125 @ 07/16/23 23:50:34.688 (42ms)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:50:34.688
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:50:35.093 (404ms)
+
+
+ > Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:07:34.275
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:07:48.02 (13.746s)
> Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 07/16/23 23:07:48.02
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 07/16/23 23:08:02.283 (14.262s)
> Enter [It] should allow for custom rewrite parameters - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:190 @ 07/16/23 23:08:02.283
STEP: creating an ingress definition with the use-regex annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:193 @ 07/16/23 23:08:02.283
STEP: check that '/foo/bar/bar' redirects to custom rewrite - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:206 @ 07/16/23 23:08:12.679
< Exit [It] should allow for custom rewrite parameters - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:190 @ 07/16/23 23:08:12.703 (10.454s)
> Enter [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:12.703
< Exit [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:13.572 (869ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:13.576
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:28.615 (15.039s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:08:28.615
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:08:36.764 (8.184s)
> Enter [It] should route requests to the correct upstream if mainline ingress is created after the canary ingress - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:206 @ 07/16/23 23:08:36.765
STEP: routing requests destined for the mainline ingress to the mainelin upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:231 @ 07/16/23 23:08:54.047
STEP: routing requests destined for the canary ingress to the canary upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:240 @ 07/16/23 23:08:54.056
< Exit [It] should route requests to the correct upstream if mainline ingress is created after the canary ingress - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:206 @ 07/16/23 23:08:54.065 (17.301s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:54.065
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:54.538 (473ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:54.54
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:05.022 (10.516s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 07/16/23 23:09:05.022
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 07/16/23 23:09:09.106 (4.084s)
> Enter [It] should set sslClientCertificate, sslVerifyClient and sslVerifyDepth with auth-tls-secret - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:36 @ 07/16/23 23:09:09.106
< Exit [It] should set sslClientCertificate, sslVerifyClient and sslVerifyDepth with auth-tls-secret - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:36 @ 07/16/23 23:09:25.238 (16.132s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:25.238
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:25.913 (675ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:25.915
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:34.419 (8.538s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:09:34.419
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:09:42.592 (8.174s)
> Enter [It] routes traffic to either mainline or canary backend (legacy behavior) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:1058 @ 07/16/23 23:09:42.592
< Exit [It] routes traffic to either mainline or canary backend (legacy behavior) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:1058 @ 07/16/23 23:10:38.197 (55.673s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:38.197
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:38.587 (391ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:38.589
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:47.213 (8.624s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:10:47.213
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:10:51.275 (4.063s)
> Enter [It] should not allow - single origin for multiple cors values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:196 @ 07/16/23 23:10:51.276
< Exit [It] should not allow - single origin for multiple cors values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:196 @ 07/16/23 23:10:58.316 (7.04s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:58.316
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:58.828 (512ms)
+
+
+ > Enter [BeforeEach] [Annotations] influxdb-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:58.83
< Exit [BeforeEach] [Annotations] influxdb-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:11:06.101 (7.326s)
> Enter [BeforeEach] [Annotations] influxdb-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/influxdb.go:42 @ 07/16/23 23:11:06.101
< Exit [BeforeEach] [Annotations] influxdb-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/influxdb.go:42 @ 07/16/23 23:11:55.28 (49.235s)
> Enter [It] should send the request metric to the influxdb server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/influxdb.go:48 @ 07/16/23 23:11:55.28
< Exit [It] should send the request metric to the influxdb server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/influxdb.go:48 @ 07/16/23 23:12:16.87 (21.626s)
> Enter [AfterEach] [Annotations] influxdb-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:16.87
< Exit [AfterEach] [Annotations] influxdb-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:17.419 (549ms)
+
+
+ > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:17.421
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:26.489 (9.069s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:12:26.49
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:12:30.699 (4.21s)
> Enter [It] should not set invalid proxy timeouts - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:136 @ 07/16/23 23:12:30.699
< Exit [It] should not set invalid proxy timeouts - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:136 @ 07/16/23 23:12:41.026 (10.361s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:41.03
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:41.518 (487ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:41.519
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:50.636 (9.117s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:12:50.636
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:12:54.712 (4.076s)
> Enter [It] should allow correct origins - single origin for multiple cors values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:216 @ 07/16/23 23:12:54.712
< Exit [It] should allow correct origins - single origin for multiple cors values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:216 @ 07/16/23 23:13:01.787 (7.076s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:01.787
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:02.426 (673ms)
+
+
+ > Enter [BeforeEach] [Ingress] [PathType] mix Exact and Prefix paths - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:02.429
< Exit [BeforeEach] [Ingress] [PathType] mix Exact and Prefix paths - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:11.216 (8.787s)
> Enter [BeforeEach] [Ingress] [PathType] mix Exact and Prefix paths - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:33 @ 07/16/23 23:13:11.217
< Exit [BeforeEach] [Ingress] [PathType] mix Exact and Prefix paths - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:33 @ 07/16/23 23:13:15.424 (4.207s)
> Enter [It] should choose the correct location - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:39 @ 07/16/23 23:13:15.424
STEP: Checking exact request to / - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:63 @ 07/16/23 23:13:32.733
STEP: Checking prefix request to /bar - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:76 @ 07/16/23 23:13:32.756
STEP: Checking exact request to /foo - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:109 @ 07/16/23 23:13:50.333
STEP: Checking prefix request to /foo/bar - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:122 @ 07/16/23 23:13:50.341
STEP: Checking prefix request to /foobar - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:134 @ 07/16/23 23:13:50.351
< Exit [It] should choose the correct location - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:39 @ 07/16/23 23:13:50.359 (34.97s)
> Enter [AfterEach] [Ingress] [PathType] mix Exact and Prefix paths - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:50.36
< Exit [AfterEach] [Ingress] [PathType] mix Exact and Prefix paths - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:50.91 (550ms)
+
+
+ > Enter [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:50.913
< Exit [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:58.322 (7.409s)
> Enter [It] should set gzip_comp_level to 4 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:56 @ 07/16/23 23:13:58.322
< Exit [It] should set gzip_comp_level to 4 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:56 @ 07/16/23 23:14:15.594 (17.306s)
> Enter [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:15.594
< Exit [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:16.06 (466ms)
+
+
+ > Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:16.061
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:24.013 (7.951s)
> Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 07/16/23 23:14:24.013
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 07/16/23 23:14:28.134 (4.121s)
> Enter [It] should set valid proxy-ssl-secret - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:37 @ 07/16/23 23:14:28.134
< Exit [It] should set valid proxy-ssl-secret - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:37 @ 07/16/23 23:14:47.036 (18.936s)
> Enter [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:47.036
< Exit [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:53.943 (6.907s)
+
+
+ > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:53.945
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:04.186 (10.275s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:15:04.186
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:15:08.271 (4.085s)
> Enter [It] should change the default proxy HTTP version - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:233 @ 07/16/23 23:15:08.271
< Exit [It] should change the default proxy HTTP version - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:233 @ 07/16/23 23:15:18.477 (10.206s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:18.477
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:18.878 (401ms)
+
+
+ > Enter [BeforeEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:18.88
< Exit [BeforeEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:27.307 (8.428s)
> Enter [It] should respond with a custom redirect code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:61 @ 07/16/23 23:15:27.307
STEP: setting permanent-redirect-code annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:62 @ 07/16/23 23:15:27.307
STEP: sending request to redirected URL path - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:82 @ 07/16/23 23:15:37.505
< Exit [It] should respond with a custom redirect code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:61 @ 07/16/23 23:15:37.513 (10.24s)
> Enter [AfterEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:37.513
< Exit [AfterEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:38.004 (491ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:38.014
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:47.066 (9.052s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:15:47.066
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:15:57.188 (10.122s)
> Enter [It] should routes to mainline upstream when the given Regex causes error - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:566 @ 07/16/23 23:15:57.188
STEP: routing requests to the mainline upstream when the given Regex causes error - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:591 @ 07/16/23 23:16:14.422
< Exit [It] should routes to mainline upstream when the given Regex causes error - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:566 @ 07/16/23 23:16:14.445 (17.291s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:14.445
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:15.095 (650ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:15.112
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:23.549 (8.437s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:16:23.549
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:16:27.629 (4.08s)
> Enter [It] should set snippet "proxy_set_header My-Custom-Header 42;" when external auth is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:266 @ 07/16/23 23:16:27.629
< Exit [It] should set snippet "proxy_set_header My-Custom-Header 42;" when external auth is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:266 @ 07/16/23 23:16:37.862 (10.268s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:37.862
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:38.445 (583ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:38.446
< Exit [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:49.042 (10.596s)
> Enter [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:33 @ 07/16/23 23:16:49.042
< Exit [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:33 @ 07/16/23 23:17:00.129 (11.087s)
> Enter [It] should block User-Agents defined in the ConfigMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:55 @ 07/16/23 23:17:00.129
< Exit [It] should block User-Agents defined in the ConfigMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:55 @ 07/16/23 23:17:10.352 (10.257s)
> Enter [AfterEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:10.352
< Exit [AfterEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:10.734 (382ms)
+
+
+ > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:10.736
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:19.354 (8.618s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:17:19.354
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:17:23.429 (4.075s)
> Enter [It] should not set secure in cookie with provided false annotation on http - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:435 @ 07/16/23 23:17:23.429
< Exit [It] should not set secure in cookie with provided false annotation on http - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:435 @ 07/16/23 23:17:33.591 (10.197s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:33.591
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:34.089 (497ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:34.09
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:42.368 (8.278s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:17:42.368
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:17:50.549 (8.181s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:17:50.549
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 07/16/23 23:17:50.549
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 07/16/23 23:18:01.043
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 07/16/23 23:18:11.254
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:18:21.423 (30.908s)
> Enter [It] should add auth headers when global-auth-response-headers is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:223 @ 07/16/23 23:18:21.423
STEP: Adding a global-auth-response-headers to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:228 @ 07/16/23 23:18:21.423
< Exit [It] should add auth headers when global-auth-response-headers is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:223 @ 07/16/23 23:18:31.597 (10.208s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:31.597
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:32.129 (532ms)
+
+
+ > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:32.13
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:40.387 (8.257s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:18:40.387
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:18:44.465 (4.078s)
> Enter [It] should set proxy client-max-body-size to 8m - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:85 @ 07/16/23 23:18:44.465
< Exit [It] should set proxy client-max-body-size to 8m - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:85 @ 07/16/23 23:18:54.781 (10.316s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:54.781
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:55.208 (427ms)
+
+
+ > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:55.21
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:03.622 (8.446s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:19:03.622
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:19:07.698 (4.076s)
> Enter [It] should set proxy_redirect to default - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:52 @ 07/16/23 23:19:07.698
< Exit [It] should set proxy_redirect to default - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:52 @ 07/16/23 23:19:17.914 (10.216s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:17.914
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:18.304 (391ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:18.307
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:26.675 (8.368s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:19:26.675
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:19:30.739 (4.064s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:19:30.739
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:19:45.008 (14.304s)
> Enter [It] should create additional upstream block when auth-keepalive is set with HTTP/1.x - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:623 @ 07/16/23 23:19:45.008
< Exit [It] should create additional upstream block when auth-keepalive is set with HTTP/1.x - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:623 @ 07/16/23 23:20:08.248 (23.274s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:08.248
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:08.787 (539ms)
+
+
+ > Enter [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:08.788
< Exit [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:17.73 (8.942s)
> Enter [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:32 @ 07/16/23 23:20:17.73
< Exit [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:32 @ 07/16/23 23:20:21.833 (4.103s)
> Enter [It] should return status code 200 for host 'foo' and 404 for 'bar' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:36 @ 07/16/23 23:20:21.833
< Exit [It] should return status code 200 for host 'foo' and 404 for 'bar' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:36 @ 07/16/23 23:20:32.024 (10.226s)
> Enter [AfterEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:32.024
< Exit [AfterEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:32.522 (498ms)
+
+
+ > Enter [BeforeEach] plugins - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:32.53
< Exit [BeforeEach] plugins - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:40.871 (8.341s)
> Enter [BeforeEach] plugins - /go/src/k8s.io/ingress-nginx/test/e2e/settings/plugins.go:31 @ 07/16/23 23:20:40.871
< Exit [BeforeEach] plugins - /go/src/k8s.io/ingress-nginx/test/e2e/settings/plugins.go:31 @ 07/16/23 23:20:46.94 (6.069s)
> Enter [It] should exist a x-hello-world header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/plugins.go:35 @ 07/16/23 23:20:46.94
< Exit [It] should exist a x-hello-world header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/plugins.go:35 @ 07/16/23 23:21:04.258 (17.351s)
> Enter [AfterEach] plugins - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:04.258
< Exit [AfterEach] plugins - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:04.797 (540ms)
+
+
+ > Enter [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:04.802
< Exit [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:13.19 (8.387s)
> Enter [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:79 @ 07/16/23 23:21:13.19
< Exit [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:79 @ 07/16/23 23:21:19.32 (6.13s)
> Enter [It] should connect to the same subset of pods - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:92 @ 07/16/23 23:21:19.32
< Exit [It] should connect to the same subset of pods - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:92 @ 07/16/23 23:21:49.708 (30.422s)
> Enter [AfterEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:49.708
< Exit [AfterEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:50.139 (431ms)
+
+
+ > Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:50.145
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:58.496 (8.351s)
> Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 07/16/23 23:21:58.496
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 07/16/23 23:22:09.574 (11.112s)
> Enter [It] should set keepalive_requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:48 @ 07/16/23 23:22:09.574
< Exit [It] should set keepalive_requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:48 @ 07/16/23 23:22:19.755 (10.181s)
> Enter [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:19.755
< Exit [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:20.256 (501ms)
+
+
+ > Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:20.257
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:28.894 (8.637s)
> Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 07/16/23 23:22:28.894
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 07/16/23 23:22:43.112 (14.252s)
> Enter [It] handles endpoints only changes (down scaling of replicas) - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:87 @ 07/16/23 23:22:43.112
< Exit [It] handles endpoints only changes (down scaling of replicas) - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:87 @ 07/16/23 23:23:05.645 (22.568s)
> Enter [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:05.645
< Exit [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:06.129 (484ms)
+
+
+ > Enter [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:06.131
< Exit [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:20.599 (14.468s)
> Enter [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:38 @ 07/16/23 23:23:20.6
< Exit [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:38 @ 07/16/23 23:23:27.994 (7.394s)
> Enter [It] should set X-Forwarded-Port header to 443 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:70 @ 07/16/23 23:23:27.994
< Exit [It] should set X-Forwarded-Port header to 443 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:70 @ 07/16/23 23:23:40.522 (12.562s)
> Enter [AfterEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:40.522
< Exit [AfterEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:40.988 (466ms)
+
+
+ > Enter [BeforeEach] [Annotations] upstream-vhost - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:40.989
< Exit [BeforeEach] [Annotations] upstream-vhost - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:49.554 (8.565s)
> Enter [BeforeEach] [Annotations] upstream-vhost - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamvhost.go:30 @ 07/16/23 23:23:49.554
< Exit [BeforeEach] [Annotations] upstream-vhost - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamvhost.go:30 @ 07/16/23 23:23:53.661 (4.107s)
> Enter [It] set host to upstreamvhost.bar.com - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamvhost.go:34 @ 07/16/23 23:23:53.661
< Exit [It] set host to upstreamvhost.bar.com - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamvhost.go:34 @ 07/16/23 23:24:03.928 (10.302s)
> Enter [AfterEach] [Annotations] upstream-vhost - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:03.928
< Exit [AfterEach] [Annotations] upstream-vhost - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:04.364 (435ms)
+
+
+ > Enter [BeforeEach] [Setting] configmap stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:04.366
< Exit [BeforeEach] [Setting] configmap stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:12.746 (8.379s)
> Enter [BeforeEach] [Setting] configmap stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/settings/stream_snippet.go:38 @ 07/16/23 23:24:12.746
< Exit [BeforeEach] [Setting] configmap stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/settings/stream_snippet.go:38 @ 07/16/23 23:24:16.814 (4.069s)
> Enter [It] should add value of stream-snippet via config map to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/stream_snippet.go:42 @ 07/16/23 23:24:16.814
< Exit [It] should add value of stream-snippet via config map to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/stream_snippet.go:42 @ 07/16/23 23:24:39.062 (22.282s)
> Enter [AfterEach] [Setting] configmap stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:39.062
< Exit [AfterEach] [Setting] configmap stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:39.426 (364ms)
+
+
+ > Enter [BeforeEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:39.427
< Exit [BeforeEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:48.131 (8.704s)
> Enter [It] should create sync events (default) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_sync_events.go:35 @ 07/16/23 23:24:48.132
< Exit [It] should create sync events (default) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_sync_events.go:35 @ 07/16/23 23:25:02.405 (14.308s)
> Enter [AfterEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:02.405
< Exit [AfterEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:02.769 (364ms)
+
+
+ > Enter [BeforeEach] [Flag] disable-service-external-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:02.775
< Exit [BeforeEach] [Flag] disable-service-external-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:11.181 (8.406s)
> Enter [BeforeEach] [Flag] disable-service-external-name - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_service_external_name.go:38 @ 07/16/23 23:25:11.181
< Exit [BeforeEach] [Flag] disable-service-external-name - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_service_external_name.go:38 @ 07/16/23 23:25:24.327 (13.145s)
> Enter [It] should ignore services of external-name type - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_service_external_name.go:52 @ 07/16/23 23:25:24.327
< Exit [It] should ignore services of external-name type - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_service_external_name.go:52 @ 07/16/23 23:25:44.763 (20.471s)
> Enter [AfterEach] [Flag] disable-service-external-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:44.763
< Exit [AfterEach] [Flag] disable-service-external-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:45.279 (515ms)
+
+
+ > Enter [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:45.282
< Exit [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:53.726 (8.444s)
> Enter [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:31 @ 07/16/23 23:25:53.726
< Exit [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:31 @ 07/16/23 23:25:57.802 (4.077s)
> Enter [It] drops snippet "more_set_headers "Foo1: Bar1";" in all locations if disabled by admin" - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:58 @ 07/16/23 23:25:57.803
< Exit [It] drops snippet "more_set_headers "Foo1: Bar1";" in all locations if disabled by admin" - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:58 @ 07/16/23 23:26:27.099 (29.331s)
> Enter [AfterEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:27.099
< Exit [AfterEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:27.643 (544ms)
+
+
+ > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:27.646
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:36.154 (8.542s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 07/16/23 23:26:36.154
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 07/16/23 23:26:40.235 (4.081s)
> Enter [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 07/16/23 23:26:40.235
Jul 16 23:26:49.946: INFO: Unexpected TLS error: tls: failed to verify certificate: x509: certificate is valid for ingress.local, not settings-tls
< Exit [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 07/16/23 23:26:51.943 (11.709s)
> Enter [It] setting max-age parameter - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:111 @ 07/16/23 23:26:51.944
< Exit [It] setting max-age parameter - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:111 @ 07/16/23 23:27:02.135 (10.226s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:02.135
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:02.635 (500ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:02.637
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:10.976 (8.339s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:27:10.976
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:27:15.04 (4.064s)
> Enter [BeforeEach] when external authentication is configured with a custom redirect param - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:651 @ 07/16/23 23:27:15.04
< Exit [BeforeEach] when external authentication is configured with a custom redirect param - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:651 @ 07/16/23 23:27:29.343 (14.303s)
> Enter [It] should redirect to signin url when not signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:687 @ 07/16/23 23:27:29.343
< Exit [It] should redirect to signin url when not signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:687 @ 07/16/23 23:27:29.355 (12ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:29.355
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:29.875 (520ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:29.877
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:37.741 (7.898s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:27:37.741
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:27:45.891 (8.149s)
> Enter [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:604 @ 07/16/23 23:27:45.891
STEP: routing requests to the canary upstream when header value does not match and cookie is set to 'always' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:630 @ 07/16/23 23:28:03.119
< Exit [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:604 @ 07/16/23 23:28:03.125 (17.268s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:03.125
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:03.604 (479ms)
+
+
+ > Enter [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:03.605
< Exit [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:11.902 (8.297s)
> Enter [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:35 @ 07/16/23 23:28:11.902
< Exit [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:35 @ 07/16/23 23:28:23.063 (11.161s)
> Enter [It] should not trust X-Forwarded-For header when setting is false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:78 @ 07/16/23 23:28:23.063
< Exit [It] should not trust X-Forwarded-For header when setting is false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:78 @ 07/16/23 23:28:40.338 (17.309s)
> Enter [AfterEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:40.338
< Exit [AfterEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:40.752 (414ms)
+
+
+ > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:40.754
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:49.068 (8.315s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 07/16/23 23:28:49.068
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 07/16/23 23:28:53.189 (4.121s)
> Enter [It] picks up the previously missing secret for a given ingress without reloading - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:70 @ 07/16/23 23:28:53.189
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:94 @ 07/16/23 23:29:10.345
STEP: skipping Nginx reload - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:101 @ 07/16/23 23:29:13.397
< Exit [It] picks up the previously missing secret for a given ingress without reloading - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:70 @ 07/16/23 23:29:13.425 (20.27s)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:13.425
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:13.959 (534ms)
+
+
+ > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:13.961
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:22.387 (8.427s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:29:22.387
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:29:26.497 (4.11s)
> Enter [BeforeEach] With watch-ingress-without-class flag - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:462 @ 07/16/23 23:29:26.497
< Exit [BeforeEach] With watch-ingress-without-class flag - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:462 @ 07/16/23 23:29:34.509 (8.047s)
> Enter [It] should watch Ingress with no class and ignore ingress with a different class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:482 @ 07/16/23 23:29:34.509
< Exit [It] should watch Ingress with no class and ignore ingress with a different class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:482 @ 07/16/23 23:29:51.844 (17.335s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:51.844
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:52.449 (605ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:52.451
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:30:02.775 (10.363s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:30:02.775
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:30:08.866 (6.091s)
> Enter [It] should allow - matching origin+port with wildcard origin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:488 @ 07/16/23 23:30:08.866
< Exit [It] should allow - matching origin+port with wildcard origin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:488 @ 07/16/23 23:30:15.919 (7.053s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:30:15.919
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:30:16.435 (515ms)
+
+
+ > Enter [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:30:16.437
< Exit [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:30:40.742 (24.37s)
> Enter [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:38 @ 07/16/23 23:30:40.742
< Exit [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:38 @ 07/16/23 23:30:57.46 (16.718s)
> Enter [It] should set the X-Forwarded-Port header to 443 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:100 @ 07/16/23 23:30:57.46
< Exit [It] should set the X-Forwarded-Port header to 443 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:100 @ 07/16/23 23:31:14.185 (16.763s)
> Enter [AfterEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:14.185
< Exit [AfterEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:14.687 (502ms)
+
+
+
+ > Enter [BeforeEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:14.689
< Exit [BeforeEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:23.074 (8.386s)
> Enter [It] disables access logging for default backend - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:105 @ 07/16/23 23:31:23.074
[SKIPPED] enable-access-log-for-default-backend
In [It] at: /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:107 @ 07/16/23 23:31:23.075
< Exit [It] disables access logging for default backend - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:105 @ 07/16/23 23:31:23.075 (0s)
> Enter [AfterEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:23.075
< Exit [AfterEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:23.495 (420ms)
+
+
+ > Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:23.497
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:32.125 (8.663s)
> Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 07/16/23 23:31:32.125
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 07/16/23 23:31:46.863 (14.738s)
> Enter [It] handles endpoints only changes consistently (down scaling of replicas vs. empty service) - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:125 @ 07/16/23 23:31:46.863
< Exit [It] handles endpoints only changes consistently (down scaling of replicas vs. empty service) - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:125 @ 07/16/23 23:32:13.132 (26.303s)
> Enter [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:13.132
< Exit [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:13.542 (410ms)
+
+
+ > Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:13.543
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:21.845 (8.301s)
> Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 07/16/23 23:32:21.845
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 07/16/23 23:32:32.94 (11.13s)
> Enter [It] should allow Ingress with rules - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:123 @ 07/16/23 23:32:32.94
< Exit [It] should allow Ingress with rules - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:123 @ 07/16/23 23:32:43.229 (10.289s)
> Enter [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:43.229
< Exit [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:43.683 (454ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:43.686
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:52.383 (8.697s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 07/16/23 23:32:52.383
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 07/16/23 23:32:56.466 (4.083s)
> Enter [It] should validate auth-tls-verify-client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:206 @ 07/16/23 23:32:56.466
< Exit [It] should validate auth-tls-verify-client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:206 @ 07/16/23 23:33:11.547 (15.115s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:11.547
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:11.984 (436ms)
+
+
+ > Enter [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:11.986
< Exit [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:20.45 (8.464s)
> Enter [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:39 @ 07/16/23 23:33:20.45
< Exit [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:39 @ 07/16/23 23:33:32.659 (12.244s)
> Enter [It] should pass unknown traffic to default backend and handle known traffic - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:79 @ 07/16/23 23:33:32.659
Jul 16 23:34:02.788: INFO: Unexpected TLS error: tls: failed to verify certificate: x509: certificate is valid for ingress.local, not noannotationnopassthrough.com
< Exit [It] should pass unknown traffic to default backend and handle known traffic - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:79 @ 07/16/23 23:34:08.035 (35.41s)
> Enter [AfterEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:08.036
< Exit [AfterEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:08.724 (688ms)
+
+
+ > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:08.73
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:16.88 (8.151s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:34:16.881
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:34:20.959 (4.078s)
> Enter [It] should enable modsecurity - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:35 @ 07/16/23 23:34:20.959
< Exit [It] should enable modsecurity - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:35 @ 07/16/23 23:34:31.272 (10.348s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:31.272
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:31.691 (419ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:31.694
< Exit [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:41.1 (9.407s)
> Enter [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:43 @ 07/16/23 23:34:41.1
< Exit [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:43 @ 07/16/23 23:35:00.246 (19.146s)
> Enter [It] should return status code 401 when accessing '/' unauthentication - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:54 @ 07/16/23 23:35:00.246
< Exit [It] should return status code 401 when accessing '/' unauthentication - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:54 @ 07/16/23 23:35:03.378 (3.166s)
> Enter [AfterEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:03.378
< Exit [AfterEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:03.897 (519ms)
+
+
+ > Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:03.899
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:12.446 (8.548s)
> Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 07/16/23 23:35:12.446
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 07/16/23 23:35:16.511 (4.065s)
> Enter [It] proxy-ssl-location-only flag should change the nginx config server part - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:150 @ 07/16/23 23:35:16.511
< Exit [It] proxy-ssl-location-only flag should change the nginx config server part - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:150 @ 07/16/23 23:35:49.692 (33.215s)
> Enter [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:49.692
< Exit [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:50.092 (400ms)
+
+
+ > Enter [BeforeEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:98 @ 07/16/23 23:35:50.093
< Exit [BeforeEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:98 @ 07/16/23 23:35:52.103 (2.01s)
> Enter [It] fails when using alias directive - /go/src/k8s.io/ingress-nginx/test/e2e/nginx/nginx.go:115 @ 07/16/23 23:35:52.103
< Exit [It] fails when using alias directive - /go/src/k8s.io/ingress-nginx/test/e2e/nginx/nginx.go:115 @ 07/16/23 23:36:52.175 (1m0.14s)
> Enter [AfterEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:99 @ 07/16/23 23:36:52.175
< Exit [AfterEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:99 @ 07/16/23 23:36:52.185 (10ms)
+
+
+ > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:52.186
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:02.922 (10.77s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:37:02.922
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:37:07.012 (4.09s)
> Enter [It] should ignore Ingress with different controller class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:104 @ 07/16/23 23:37:07.012
< Exit [It] should ignore Ingress with different controller class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:104 @ 07/16/23 23:37:24.253 (17.242s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:24.253
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:24.676 (423ms)
+
+
+ > Enter [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:24.678
< Exit [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:32.973 (8.329s)
> Enter [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:30 @ 07/16/23 23:37:32.973
< Exit [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:30 @ 07/16/23 23:37:37.052 (4.079s)
> Enter [It] set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:34 @ 07/16/23 23:37:37.052
< Exit [It] set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:34 @ 07/16/23 23:37:47.815 (10.762s)
> Enter [AfterEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:47.815
< Exit [AfterEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:48.335 (520ms)
+
+
+ > Enter [BeforeEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:48.336
< Exit [BeforeEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:58.16 (9.824s)
> Enter [It] should return 503 when all backend service endpoints are unavailable - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_backend.go:54 @ 07/16/23 23:37:58.16
< Exit [It] should return 503 when all backend service endpoints are unavailable - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_backend.go:54 @ 07/16/23 23:38:08.445 (10.319s)
> Enter [AfterEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:08.445
< Exit [AfterEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:08.913 (468ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:08.914
< Exit [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:16.27 (7.355s)
> Enter [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:33 @ 07/16/23 23:38:16.27
< Exit [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:33 @ 07/16/23 23:38:27.37 (11.1s)
> Enter [It] should block CIDRs defined in the ConfigMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:38 @ 07/16/23 23:38:27.37
< Exit [It] should block CIDRs defined in the ConfigMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:38 @ 07/16/23 23:38:37.659 (10.323s)
> Enter [AfterEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:37.659
< Exit [AfterEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:38.366 (708ms)
+
+
+ > Enter [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:38.369
< Exit [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:50.759 (12.39s)
> Enter [It] authorization metadata should be overwritten by external auth response headers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:126 @ 07/16/23 23:38:50.759
< Exit [It] authorization metadata should be overwritten by external auth response headers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:126 @ 07/16/23 23:39:09.202 (18.477s)
> Enter [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:09.202
< Exit [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:09.666 (464ms)
+
+
+ > Enter [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:09.667
< Exit [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:20.364 (10.697s)
> Enter [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:32 @ 07/16/23 23:39:20.364
< Exit [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:32 @ 07/16/23 23:39:26.451 (6.087s)
> Enter [It] should return status code 200 for host 'foo' and 'bar' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:62 @ 07/16/23 23:39:26.451
< Exit [It] should return status code 200 for host 'foo' and 'bar' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:62 @ 07/16/23 23:39:36.677 (10.26s)
> Enter [AfterEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:36.677
< Exit [AfterEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:37.244 (568ms)
+
+
+ > Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:37.246
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:46.548 (9.301s)
> Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 07/16/23 23:39:46.548
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 07/16/23 23:39:48.593 (2.045s)
> Enter [It] should add fastcgi_param in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:71 @ 07/16/23 23:39:48.593
< Exit [It] should add fastcgi_param in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:71 @ 07/16/23 23:39:58.782 (10.188s)
> Enter [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:58.782
< Exit [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:59.281 (499ms)
+
+
+ > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:59.283
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:09.944 (10.696s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:40:09.944
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:40:14.019 (4.074s)
> Enter [It] should disable default modsecurity conf setting when modsecurity-snippet is specified - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:347 @ 07/16/23 23:40:14.019
< Exit [It] should disable default modsecurity conf setting when modsecurity-snippet is specified - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:347 @ 07/16/23 23:40:36.276 (22.292s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:36.276
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:37.147 (871ms)
+
+
+ > Enter [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:37.158
< Exit [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:45.052 (7.894s)
> Enter [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:80 @ 07/16/23 23:40:45.052
< Exit [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:80 @ 07/16/23 23:40:55.399 (10.347s)
> Enter [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:55.399
< Exit [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:56.086 (686ms)
+
+
+ > Enter [BeforeEach] [Annotations] whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:56.088
< Exit [BeforeEach] [Annotations] whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:41:04.49 (8.436s)
> Enter [BeforeEach] [Annotations] whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipwhitelist.go:30 @ 07/16/23 23:41:04.49
< Exit [BeforeEach] [Annotations] whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipwhitelist.go:30 @ 07/16/23 23:41:08.564 (4.074s)
> Enter [It] should set valid ip whitelist range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipwhitelist.go:34 @ 07/16/23 23:41:08.564
< Exit [It] should set valid ip whitelist range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipwhitelist.go:34 @ 07/16/23 23:41:18.798 (10.233s)
> Enter [AfterEach] [Annotations] whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:18.798
< Exit [AfterEach] [Annotations] whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:19.252 (455ms)
+
+
+ > Enter [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:41:19.254
< Exit [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:41:27.682 (8.428s)
> Enter [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:67 @ 07/16/23 23:41:27.682
< Exit [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:67 @ 07/16/23 23:41:37.904 (10.256s)
> Enter [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:37.904
< Exit [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:38.533 (629ms)
+
+
+ > Enter [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:07:34.181
< Exit [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:07:48.294 (14.113s)
> Enter [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:33 @ 07/16/23 23:07:48.294
< Exit [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:33 @ 07/16/23 23:08:06.535 (18.275s)
> Enter [It] should list the backend servers - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:37 @ 07/16/23 23:08:06.535
< Exit [It] should list the backend servers - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:37 @ 07/16/23 23:08:19.035 (12.5s)
> Enter [AfterEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:19.036
< Exit [AfterEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:22.623 (3.587s)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:22.634
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:33.298 (10.698s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:08:33.298
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:08:41.456 (8.158s)
> Enter [It] does not crash when canary ingress has multiple paths to the same non-matching backend - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:915 @ 07/16/23 23:08:41.456
< Exit [It] does not crash when canary ingress has multiple paths to the same non-matching backend - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:915 @ 07/16/23 23:08:58.789 (17.333s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:58.789
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:59.423 (634ms)
+
+
+ > Enter [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:59.425
< Exit [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:07.036 (7.646s)
> Enter [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:31 @ 07/16/23 23:09:07.036
< Exit [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:31 @ 07/16/23 23:09:11.131 (4.095s)
> Enter [It] only allow explicitly allowed IPs, deny all others - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:86 @ 07/16/23 23:09:11.131
STEP: sending request from an explicitly denied IP range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:115 @ 07/16/23 23:09:28.355
STEP: sending request from an implicitly denied IP - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:123 @ 07/16/23 23:09:28.363
STEP: sending request from an explicitly allowed IP range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:131 @ 07/16/23 23:09:28.369
STEP: sending request from an explicitly allowed IP range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:139 @ 07/16/23 23:09:28.381
< Exit [It] only allow explicitly allowed IPs, deny all others - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:86 @ 07/16/23 23:09:35.394 (24.298s)
> Enter [AfterEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:35.394
< Exit [AfterEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:35.813 (419ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:35.815
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:43.362 (7.548s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:09:43.362
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:09:51.533 (8.17s)
> Enter [It] should not use canary with domain as a server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:891 @ 07/16/23 23:09:51.533
< Exit [It] should not use canary with domain as a server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:891 @ 07/16/23 23:10:08.703 (17.205s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:08.703
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:09.316 (613ms)
+
+
+ > Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:09.318
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:18.473 (9.154s)
> Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 07/16/23 23:10:18.473
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 07/16/23 23:10:29.549 (11.076s)
> Enter [It] should respect port passed by the PROXY Protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:46 @ 07/16/23 23:10:29.549
< Exit [It] should respect port passed by the PROXY Protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:46 @ 07/16/23 23:12:01.67 (1m32.267s)
> Enter [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:01.67
< Exit [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:02.208 (575ms)
+
+
+ > Enter [BeforeEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:02.214
< Exit [BeforeEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:10.539 (8.324s)
> Enter [It] should be enabled by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/multi_accept.go:31 @ 07/16/23 23:12:10.539
< Exit [It] should be enabled by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/multi_accept.go:31 @ 07/16/23 23:12:13.724 (3.185s)
> Enter [AfterEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:13.724
< Exit [AfterEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:14.29 (566ms)
+
+
+ > Enter [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:14.293
< Exit [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:23.098 (8.805s)
> Enter [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:33 @ 07/16/23 23:12:23.098
< Exit [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:33 @ 07/16/23 23:12:27.239 (4.141s)
> Enter [It] should produce valid JSON for /dbg general - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:85 @ 07/16/23 23:12:27.239
< Exit [It] should produce valid JSON for /dbg general - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:85 @ 07/16/23 23:12:34.414 (7.21s)
> Enter [AfterEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:34.414
< Exit [AfterEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:35.005 (591ms)
+
+
+ > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:35.039
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:42.388 (7.349s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 07/16/23 23:12:42.388
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 07/16/23 23:12:46.475 (4.088s)
> Enter [BeforeEach] should configure TLS protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:47 @ 07/16/23 23:12:46.475
Jul 16 23:12:56.021: INFO: Unexpected TLS error: tls: failed to verify certificate: x509: certificate is valid for ingress.local, not settings-tls
< Exit [BeforeEach] should configure TLS protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:47 @ 07/16/23 23:12:58.041 (11.565s)
> Enter [It] setting cipher suite - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:65 @ 07/16/23 23:12:58.041
< Exit [It] setting cipher suite - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:65 @ 07/16/23 23:13:08.414 (10.408s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:08.414
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:08.876 (461ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:08.877
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:18.056 (9.178s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:13:18.056
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:13:22.157 (4.101s)
> Enter [It] should not allow - single origin without port and origin with required port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:405 @ 07/16/23 23:13:22.157
< Exit [It] should not allow - single origin without port and origin with required port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:405 @ 07/16/23 23:13:29.225 (7.069s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:29.225
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:29.887 (662ms)
+
+
+ > Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:29.89
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:39.107 (9.251s)
> Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 07/16/23 23:13:39.107
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 07/16/23 23:13:43.181 (4.074s)
> Enter [It] [BAD_ANNOTATIONS] should drop an ingress if there is an invalid character in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:36 @ 07/16/23 23:13:43.181
< Exit [It] [BAD_ANNOTATIONS] should drop an ingress if there is an invalid character in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:36 @ 07/16/23 23:14:10.942 (27.795s)
> Enter [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:10.942
< Exit [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:11.517 (575ms)
+
+
+ > Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:11.518
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:22.99 (11.472s)
> Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 07/16/23 23:14:22.99
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 07/16/23 23:14:27.23 (4.24s)
> Enter [It] should exists opentelemetry directive when is enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:60 @ 07/16/23 23:14:27.23
< Exit [It] should exists opentelemetry directive when is enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:60 @ 07/16/23 23:14:49.899 (22.703s)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:49.899
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:57.182 (7.283s)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 07/16/23 23:14:57.182
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 07/16/23 23:14:57.182 (0s)
+
+
+ > Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:57.184
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:08.252 (11.102s)
> Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 07/16/23 23:15:08.252
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 07/16/23 23:15:12.39 (4.138s)
> Enter [It] should set backend protocol to grpcs:// and use grpc_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:79 @ 07/16/23 23:15:12.39
< Exit [It] should set backend protocol to grpcs:// and use grpc_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:79 @ 07/16/23 23:15:22.633 (10.243s)
> Enter [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:22.633
< Exit [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:23.102 (469ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:23.104
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:31.984 (8.914s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:15:31.984
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:15:36.044 (4.06s)
> Enter [It] should not break functionality with extra domain - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:314 @ 07/16/23 23:15:36.044
< Exit [It] should not break functionality with extra domain - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:314 @ 07/16/23 23:15:43.084 (7.04s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:43.084
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:43.533 (449ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:43.534
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:53.243 (9.708s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:15:53.243
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:16:01.378 (8.135s)
> Enter [It] should route requests only to canary if canary weight is equal to canary weight total - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:775 @ 07/16/23 23:16:01.378
< Exit [It] should route requests only to canary if canary weight is equal to canary weight total - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:775 @ 07/16/23 23:16:18.568 (17.224s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:18.568
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:19.084 (516ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:19.086
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:27.839 (8.752s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:16:27.839
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:16:31.857 (4.053s)
> Enter [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:383 @ 07/16/23 23:16:31.857
< Exit [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:383 @ 07/16/23 23:16:53.175 (21.318s)
> Enter [It] user with annotated ingress retains cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:433 @ 07/16/23 23:16:53.175
< Exit [It] user with annotated ingress retains cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:433 @ 07/16/23 23:16:58.37 (5.195s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:58.37
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:58.799 (429ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:58.8
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:07.105 (8.339s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:17:07.105
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:17:15.232 (8.127s)
> Enter [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:301 @ 07/16/23 23:17:15.232
< Exit [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:301 @ 07/16/23 23:17:43.549 (28.352s)
> Enter [It] user retains cookie by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:326 @ 07/16/23 23:17:43.549
< Exit [It] user retains cookie by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:326 @ 07/16/23 23:17:43.559 (9ms)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:43.559
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:44.126 (567ms)
+
+
+
+ > Enter [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:44.132
< Exit [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:52.272 (8.14s)
> Enter [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:42 @ 07/16/23 23:17:52.272
< Exit [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:42 @ 07/16/23 23:17:56.337 (4.065s)
> Enter [It] should only allow requests from specific countries - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:70 @ 07/16/23 23:17:56.338
[SKIPPED] GeoIP test are temporarily disabled
In [It] at: /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:71 @ 07/16/23 23:17:56.338
< Exit [It] should only allow requests from specific countries - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:70 @ 07/16/23 23:17:56.338 (0s)
> Enter [AfterEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:56.338
< Exit [AfterEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:56.866 (528ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:56.867
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:05.372 (8.539s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:18:05.372
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:18:09.472 (4.1s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:18:09.472
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:18:23.753 (14.281s)
> Enter [It] keeps processing new ingresses even if one of the existing ingresses is misconfigured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:505 @ 07/16/23 23:18:23.753
< Exit [It] keeps processing new ingresses even if one of the existing ingresses is misconfigured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:505 @ 07/16/23 23:18:35.016 (11.297s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:35.016
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:35.607 (591ms)
+
+
+ > Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:35.609
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:43.138 (7.529s)
> Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 07/16/23 23:18:43.138
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 07/16/23 23:18:54.215 (11.077s)
> Enter [It] should respect proto passed by the PROXY Protocol server port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:79 @ 07/16/23 23:18:54.216
< Exit [It] should respect proto passed by the PROXY Protocol server port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:79 @ 07/16/23 23:20:26.407 (1m32.295s)
> Enter [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:26.407
< Exit [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:26.885 (478ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:26.887
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:37.187 (10.334s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:20:37.187
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:20:45.389 (8.202s)
> Enter [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:532 @ 07/16/23 23:20:45.389
STEP: routing requests to the mainline upstream when header is set to 'DoCananry' and header-value is 'DoCanary' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:557 @ 07/16/23 23:21:02.659
< Exit [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:532 @ 07/16/23 23:21:02.665 (17.31s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:02.665
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:03.083 (418ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:03.085
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:11.612 (8.528s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:21:11.613
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:21:15.676 (4.064s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:21:15.676
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:21:30.005 (14.329s)
> Enter [It] should not create additional upstream block when auth-keepalive is not set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:552 @ 07/16/23 23:21:30.005
< Exit [It] should not create additional upstream block when auth-keepalive is not set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:552 @ 07/16/23 23:21:53.323 (23.352s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:53.323
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:53.812 (489ms)
+
+
+ > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:53.814
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:03.724 (9.944s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:22:03.724
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:22:07.799 (4.075s)
> Enter [It] should setup proxy cookies - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:215 @ 07/16/23 23:22:07.799
< Exit [It] should setup proxy cookies - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:215 @ 07/16/23 23:22:17.991 (10.193s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:17.992
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:18.348 (357ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:18.35
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:25.849 (7.5s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:22:25.849
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:22:29.974 (4.125s)
> Enter [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 07/16/23 23:22:29.975
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 07/16/23 23:22:35.051
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 07/16/23 23:22:45.228
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 07/16/23 23:22:55.444
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 07/16/23 23:23:05.609
< Exit [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 07/16/23 23:23:20.804 (50.898s)
> Enter [It] should redirect to signin url when not signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:849 @ 07/16/23 23:23:20.804
< Exit [It] should redirect to signin url when not signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:849 @ 07/16/23 23:23:20.815 (11ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:20.815
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:21.307 (492ms)
+
+
+ > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:21.309
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:29.836 (8.527s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:23:29.836
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:23:33.883 (4.082s)
> Enter [BeforeEach] Without IngressClass Cluster scoped Permission - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:587 @ 07/16/23 23:23:33.883
< Exit [BeforeEach] Without IngressClass Cluster scoped Permission - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:587 @ 07/16/23 23:23:40.947 (7.064s)
> Enter [It] should watch Ingress with correct annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:631 @ 07/16/23 23:23:40.947
< Exit [It] should watch Ingress with correct annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:631 @ 07/16/23 23:23:51.186 (10.238s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:51.186
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:51.782 (596ms)
+
+
+ > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:51.784
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:01.236 (9.487s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:24:01.236
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:24:07.344 (6.108s)
> Enter [BeforeEach] With specific ingress-class flags - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:392 @ 07/16/23 23:24:07.344
< Exit [BeforeEach] With specific ingress-class flags - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:392 @ 07/16/23 23:24:16.393 (9.049s)
> Enter [It] should ignore Ingress with no class and accept the correctly configured Ingresses - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:413 @ 07/16/23 23:24:16.393
< Exit [It] should ignore Ingress with no class and accept the correctly configured Ingresses - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:413 @ 07/16/23 23:24:40.653 (24.294s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:40.653
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:41.482 (829ms)
+
+
+ > Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:41.484
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:50.125 (8.641s)
> Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 07/16/23 23:24:50.125
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 07/16/23 23:24:54.192 (4.067s)
> Enter [It] should set backend protocol to grpc:// and use grpc_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:64 @ 07/16/23 23:24:54.192
< Exit [It] should set backend protocol to grpc:// and use grpc_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:64 @ 07/16/23 23:25:04.321 (10.163s)
> Enter [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:04.321
< Exit [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:04.923 (601ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:04.925
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:13.199 (8.274s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:25:13.199
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:25:17.26 (4.061s)
> Enter [It] should not break functionality - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:267 @ 07/16/23 23:25:17.26
< Exit [It] should not break functionality - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:267 @ 07/16/23 23:25:24.298 (7.039s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:24.298
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:24.749 (451ms)
+
+
+ > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:24.752
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:33.474 (8.756s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:25:33.474
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:25:37.542 (4.067s)
> Enter [It] should enable modsecurity through the config map - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:264 @ 07/16/23 23:25:37.542
< Exit [It] should enable modsecurity through the config map - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:264 @ 07/16/23 23:26:06.773 (29.265s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:06.773
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:07.274 (502ms)
+
+
+ > Enter [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:07.276
< Exit [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:15.787 (8.511s)
> Enter [It] use the default configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:32 @ 07/16/23 23:26:15.787
< Exit [It] use the default configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:32 @ 07/16/23 23:26:18.987 (3.2s)
> Enter [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:18.987
< Exit [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:19.381 (394ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:19.383
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:27.733 (8.35s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:26:27.733
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:26:31.801 (4.102s)
> Enter [It] should not match - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:338 @ 07/16/23 23:26:31.801
< Exit [It] should not match - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:338 @ 07/16/23 23:26:38.85 (7.05s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:38.85
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:39.478 (628ms)
+
+
+ > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:39.479
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:48.115 (8.636s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 07/16/23 23:26:48.115
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 07/16/23 23:26:59.194 (11.079s)
> Enter [It] log-format-escape-json enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:82 @ 07/16/23 23:26:59.195
< Exit [It] log-format-escape-json enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:82 @ 07/16/23 23:27:12.403 (13.243s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:12.403
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:13.018 (615ms)
+
+
+ > Enter [BeforeEach] [Setting] [Load Balancer] round-robin - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:13.019
< Exit [BeforeEach] [Setting] [Load Balancer] round-robin - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:21.582 (8.563s)
> Enter [BeforeEach] [Setting] [Load Balancer] round-robin - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/round_robin.go:34 @ 07/16/23 23:27:21.582
< Exit [BeforeEach] [Setting] [Load Balancer] round-robin - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/round_robin.go:34 @ 07/16/23 23:27:34.703 (13.156s)
> Enter [It] should evenly distribute requests with round-robin (default algorithm) - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/round_robin.go:39 @ 07/16/23 23:27:34.703
< Exit [It] should evenly distribute requests with round-robin (default algorithm) - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/round_robin.go:39 @ 07/16/23 23:29:42.768 (2m8.202s)
> Enter [AfterEach] [Setting] [Load Balancer] round-robin - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:42.769
< Exit [AfterEach] [Setting] [Load Balancer] round-robin - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:43.223 (454ms)
+
+
+ > Enter [BeforeEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:43.227
< Exit [BeforeEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:53.678 (10.45s)
> Enter [It] Check persistent affinity mode - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinitymode.go:67 @ 07/16/23 23:29:53.678
< Exit [It] Check persistent affinity mode - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinitymode.go:67 @ 07/16/23 23:31:59.236 (2m5.735s)
> Enter [AfterEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:59.236
< Exit [AfterEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:59.608 (372ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:59.609
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:07.878 (8.303s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:32:07.878
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:32:16 (8.122s)
> Enter [It] should route requests to the correct upstream if mainline ingress is created before the canary ingress - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:161 @ 07/16/23 23:32:16
STEP: routing requests destined for the mainline ingress to the maineline upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:185 @ 07/16/23 23:32:33.194
STEP: routing requests destined for the canary ingress to the canary upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:195 @ 07/16/23 23:32:33.2
< Exit [It] should route requests to the correct upstream if mainline ingress is created before the canary ingress - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:161 @ 07/16/23 23:32:33.205 (17.24s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:33.206
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:33.607 (402ms)
+
+
+ > Enter [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:33.609
< Exit [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:42.047 (8.438s)
> Enter [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:32 @ 07/16/23 23:32:42.047
< Exit [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:32 @ 07/16/23 23:32:44.131 (2.084s)
> Enter [It] should return status code 200 for hosts defined in two ingresses, different path with one alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:87 @ 07/16/23 23:32:44.131
< Exit [It] should return status code 200 for hosts defined in two ingresses, different path with one alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:87 @ 07/16/23 23:33:01.382 (17.284s)
> Enter [AfterEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:01.382
< Exit [AfterEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:01.909 (527ms)
+
+
+ > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:01.911
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:09.441 (7.531s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 07/16/23 23:33:09.441
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 07/16/23 23:33:13.505 (4.063s)
> Enter [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 07/16/23 23:33:13.505
STEP: configuring certificate_by_lua and skipping Nginx configuration of the new certificate - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:128 @ 07/16/23 23:33:30.702
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:136 @ 07/16/23 23:33:38.854
< Exit [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 07/16/23 23:33:38.882 (25.412s)
> Enter [It] supports requests with domain with trailing dot - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:145 @ 07/16/23 23:33:38.883
< Exit [It] supports requests with domain with trailing dot - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:145 @ 07/16/23 23:33:38.915 (33ms)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:38.915
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:39.351 (436ms)
+
+
+ > Enter [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:39.353
< Exit [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:47.674 (8.321s)
> Enter [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:34 @ 07/16/23 23:33:47.674
< Exit [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:34 @ 07/16/23 23:33:51.753 (4.079s)
> Enter [It] should redirect from www HTTP to HTTP - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:38 @ 07/16/23 23:33:51.753
STEP: setting up server for redirect from www - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:39 @ 07/16/23 23:33:51.753
STEP: sending request to www.fromtowwwredirect.bar.com - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:55 @ 07/16/23 23:34:01.902
< Exit [It] should redirect from www HTTP to HTTP - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:38 @ 07/16/23 23:34:01.908 (10.19s)
> Enter [AfterEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:01.908
< Exit [AfterEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:02.385 (477ms)
+
+
+ > Enter [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:02.387
< Exit [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:10.798 (8.412s)
> Enter [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:32 @ 07/16/23 23:34:10.798
< Exit [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:32 @ 07/16/23 23:34:14.981 (4.183s)
> Enter [It] should disable mirror-request-body - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:67 @ 07/16/23 23:34:14.981
< Exit [It] should disable mirror-request-body - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:67 @ 07/16/23 23:34:25.139 (10.158s)
> Enter [AfterEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:25.139
< Exit [AfterEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:25.527 (388ms)
+
+
+ > Enter [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:25.529
< Exit [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:34.003 (8.508s)
> Enter [It] should be disabled by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:32 @ 07/16/23 23:34:34.003
< Exit [It] should be disabled by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:32 @ 07/16/23 23:34:37.287 (3.284s)
> Enter [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:37.287
< Exit [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:37.727 (440ms)
+
+
+ > Enter [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:37.729
< Exit [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:46.195 (8.467s)
> Enter [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:36 @ 07/16/23 23:34:46.195
< Exit [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:36 @ 07/16/23 23:34:50.299 (4.103s)
> Enter [It] should use the Service Cluster IP and Port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:70 @ 07/16/23 23:34:50.299
STEP: checking if the service is reached - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:82 @ 07/16/23 23:35:07.674
STEP: checking if the Service Cluster IP and Port are used - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:89 @ 07/16/23 23:35:07.684
< Exit [It] should use the Service Cluster IP and Port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:70 @ 07/16/23 23:35:07.935 (17.671s)
> Enter [AfterEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:07.935
< Exit [AfterEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:08.597 (662ms)
+
+
+ > Enter [BeforeEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:08.599
< Exit [BeforeEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:16.925 (8.326s)
> Enter [It] should have worker_rlimit_nofile option and be independent on amount of worker processes - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_options.go:38 @ 07/16/23 23:35:16.925
< Exit [It] should have worker_rlimit_nofile option and be independent on amount of worker processes - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_options.go:38 @ 07/16/23 23:35:27.115 (10.19s)
> Enter [AfterEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:27.115
< Exit [AfterEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:27.606 (491ms)
+
+
+ > Enter [BeforeEach] [Setting] [Load Balancer] load-balance - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:27.607
< Exit [BeforeEach] [Setting] [Load Balancer] load-balance - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:36.182 (8.609s)
> Enter [BeforeEach] [Setting] [Load Balancer] load-balance - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/configmap.go:31 @ 07/16/23 23:35:36.182
< Exit [BeforeEach] [Setting] [Load Balancer] load-balance - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/configmap.go:31 @ 07/16/23 23:35:40.286 (4.104s)
> Enter [It] should apply the configmap load-balance setting - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/configmap.go:35 @ 07/16/23 23:35:40.286
< Exit [It] should apply the configmap load-balance setting - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/configmap.go:35 @ 07/16/23 23:35:57.881 (17.595s)
> Enter [AfterEach] [Setting] [Load Balancer] load-balance - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:57.882
< Exit [AfterEach] [Setting] [Load Balancer] load-balance - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:58.487 (606ms)
+
+
+ > Enter [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:58.488
< Exit [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:08.838 (10.384s)
> Enter [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:42 @ 07/16/23 23:36:08.838
< Exit [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:42 @ 07/16/23 23:36:08.844 (7ms)
> Enter [It] should expose a TCP service - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:46 @ 07/16/23 23:36:08.844
< Exit [It] should expose a TCP service - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:46 @ 07/16/23 23:36:20.132 (11.288s)
> Enter [AfterEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:20.132
< Exit [AfterEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:20.736 (604ms)
+
+
+ > Enter [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:20.747
< Exit [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:35.265 (14.553s)
> Enter [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:38 @ 07/16/23 23:36:35.265
< Exit [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:38 @ 07/16/23 23:36:40.48 (5.214s)
> Enter [It] should set X-Forwarded-Port headers accordingly when listening on a non-default HTTP port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:48 @ 07/16/23 23:36:40.48
< Exit [It] should set X-Forwarded-Port headers accordingly when listening on a non-default HTTP port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:48 @ 07/16/23 23:36:50.676 (10.196s)
> Enter [AfterEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:50.676
< Exit [AfterEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:51.171 (494ms)
+
+
+ > Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:51.175
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:05.11 (13.969s)
> Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 07/16/23 23:37:05.11
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 07/16/23 23:37:07.17 (2.06s)
> Enter [It] [BAD_ANNOTATIONS] should drop an ingress if there is a forbidden word in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:67 @ 07/16/23 23:37:07.17
< Exit [It] [BAD_ANNOTATIONS] should drop an ingress if there is a forbidden word in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:67 @ 07/16/23 23:37:39.655 (32.519s)
> Enter [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:39.655
< Exit [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:40.653 (998ms)
+
+
+ > Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:40.661
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:51.734 (11.073s)
> Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 07/16/23 23:37:51.734
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 07/16/23 23:38:03.848 (12.148s)
> Enter [It] should ignore catch all Ingress with backend - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:50 @ 07/16/23 23:38:03.849
< Exit [It] should ignore catch all Ingress with backend - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:50 @ 07/16/23 23:38:24.234 (20.386s)
> Enter [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:24.234
< Exit [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:24.679 (445ms)
+
+
+ > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:24.68
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:32.938 (8.292s)
> Enter [It] should return 200 for service type=ExternalName without a port defined - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:95 @ 07/16/23 23:38:32.938
< Exit [It] should return 200 for service type=ExternalName without a port defined - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:95 @ 07/16/23 23:38:43.94 (11.002s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:43.94
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:44.431 (490ms)
+
+
+ > Enter [BeforeEach] [Service] Nil Service Backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:44.432
< Exit [BeforeEach] [Service] Nil Service Backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:52.684 (8.252s)
> Enter [BeforeEach] [Service] Nil Service Backend - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_nil_backend.go:34 @ 07/16/23 23:38:52.684
< Exit [BeforeEach] [Service] Nil Service Backend - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_nil_backend.go:34 @ 07/16/23 23:38:56.739 (4.055s)
> Enter [It] should return 404 when backend service is nil - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_nil_backend.go:38 @ 07/16/23 23:38:56.739
STEP: setting an ingress with a nil backend - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_nil_backend.go:39 @ 07/16/23 23:38:56.739
< Exit [It] should return 404 when backend service is nil - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_nil_backend.go:38 @ 07/16/23 23:39:14.138 (17.433s)
> Enter [AfterEach] [Service] Nil Service Backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:14.138
< Exit [AfterEach] [Service] Nil Service Backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:14.962 (824ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:14.965
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:24.07 (9.105s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:39:24.07
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:39:28.143 (4.073s)
> Enter [It] should allow headers for cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:137 @ 07/16/23 23:39:28.143
< Exit [It] should allow headers for cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:137 @ 07/16/23 23:39:38.36 (10.251s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:38.36
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:39.039 (679ms)
+
+
+ > Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:39.042
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:48.893 (9.851s)
> Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 07/16/23 23:39:48.893
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 07/16/23 23:40:03.237 (14.378s)
> Enter [It] configures balancer Lua middleware correctly - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:50 @ 07/16/23 23:40:03.237
< Exit [It] configures balancer Lua middleware correctly - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:50 @ 07/16/23 23:40:09.71 (6.473s)
> Enter [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:09.71
< Exit [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:10.252 (542ms)
+
+
+ > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:10.253
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:19.088 (8.835s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 07/16/23 23:40:19.088
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 07/16/23 23:40:23.173 (4.085s)
> Enter [It] picks up the certificate when we add TLS spec to existing ingress - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:45 @ 07/16/23 23:40:23.173
< Exit [It] picks up the certificate when we add TLS spec to existing ingress - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:45 @ 07/16/23 23:40:38.779 (15.64s)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:38.779
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:39.307 (527ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:39.308
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:47.706 (8.397s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:40:47.706
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:40:55.919 (8.214s)
> Enter [It] respects always and never values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:643 @ 07/16/23 23:40:55.919
STEP: routing requests to the canary upstream when cookie is set to 'always' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:667 @ 07/16/23 23:41:13.225
STEP: routing requests to the mainline upstream when cookie is set to 'never' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:678 @ 07/16/23 23:41:21.42
STEP: routing requests to the mainline upstream when cookie is set to anything else - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:689 @ 07/16/23 23:41:31.387
< Exit [It] respects always and never values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:643 @ 07/16/23 23:41:41.387 (45.536s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:41.387
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:41.882 (496ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:07:34.174
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:07:47.886 (13.712s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:07:47.886
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:08:05.964 (18.112s)
> Enter [It] should set cors max-age - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:78 @ 07/16/23 23:08:05.964
< Exit [It] should set cors max-age - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:78 @ 07/16/23 23:08:16.513 (10.55s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:16.513
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:18.635 (2.121s)
+
+
+ > Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:18.644
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:33.277 (14.667s)
> Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 07/16/23 23:08:33.277
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 07/16/23 23:08:37.346 (4.069s)
> Enter [It] should add fastcgi_index in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:54 @ 07/16/23 23:08:37.346
< Exit [It] should add fastcgi_index in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:54 @ 07/16/23 23:08:47.641 (10.296s)
> Enter [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:47.641
< Exit [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:48.061 (420ms)
+
+
+
+
+
+ > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:48.065
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:56.738 (8.673s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:08:56.738
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:09:02.831 (6.128s)
> Enter [It] should set proxy_redirect to off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:36 @ 07/16/23 23:09:02.831
< Exit [It] should set proxy_redirect to off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:36 @ 07/16/23 23:09:13.19 (10.358s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:13.19
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:13.879 (690ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:13.881
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:23.851 (9.97s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:09:23.851
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:09:27.921 (4.07s)
> Enter [It] should return status code 503 when authentication is configured with an invalid secret - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:65 @ 07/16/23 23:09:27.921
< Exit [It] should return status code 503 when authentication is configured with an invalid secret - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:65 @ 07/16/23 23:09:38.098 (10.211s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:38.098
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:38.641 (542ms)
+
+
+ > Enter [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:38.642
< Exit [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:47.013 (8.37s)
> Enter [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:32 @ 07/16/23 23:09:47.013
< Exit [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:32 @ 07/16/23 23:09:51.1 (4.087s)
> Enter [It] should set valid proxy send timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:36 @ 07/16/23 23:09:51.1
< Exit [It] should set valid proxy send timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:36 @ 07/16/23 23:10:08.284 (17.218s)
> Enter [AfterEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:08.284
< Exit [AfterEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:08.876 (592ms)
+
+
+ > Enter [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:08.879
< Exit [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:17.058 (8.179s)
> Enter [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:37 @ 07/16/23 23:10:17.058
< Exit [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:37 @ 07/16/23 23:10:21.245 (4.187s)
> Enter [It] should add value of stream-snippet to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:41 @ 07/16/23 23:10:21.245
< Exit [It] should add value of stream-snippet to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:41 @ 07/16/23 23:10:36.438 (15.228s)
> Enter [AfterEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:36.438
< Exit [AfterEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:37.064 (626ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:37.067
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:45.508 (8.441s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:10:45.508
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:10:49.586 (4.077s)
> Enter [It] should set cache_key when external auth cache is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:322 @ 07/16/23 23:10:49.586
< Exit [It] should set cache_key when external auth cache is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:322 @ 07/16/23 23:10:59.919 (10.333s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:59.919
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:11:00.531 (612ms)
+
+
+ > Enter [BeforeEach] [SSL] redirect to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:11:00.533
< Exit [BeforeEach] [SSL] redirect to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:11:09.091 (8.614s)
> Enter [BeforeEach] [SSL] redirect to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/http_redirect.go:32 @ 07/16/23 23:11:09.091
< Exit [BeforeEach] [SSL] redirect to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/http_redirect.go:32 @ 07/16/23 23:11:13.182 (4.091s)
> Enter [It] should redirect from HTTP to HTTPS when secret is missing - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/http_redirect.go:36 @ 07/16/23 23:11:13.182
< Exit [It] should redirect from HTTP to HTTPS when secret is missing - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/http_redirect.go:36 @ 07/16/23 23:11:26.418 (13.236s)
> Enter [AfterEach] [SSL] redirect to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:11:26.418
< Exit [AfterEach] [SSL] redirect to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:11:26.883 (466ms)
+
+
+ > Enter [BeforeEach] [Annotations] custom-http-errors - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:11:26.886
< Exit [BeforeEach] [Annotations] custom-http-errors - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:11:35.167 (8.337s)
> Enter [BeforeEach] [Annotations] custom-http-errors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:37 @ 07/16/23 23:11:35.167
< Exit [BeforeEach] [Annotations] custom-http-errors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:37 @ 07/16/23 23:11:39.249 (4.082s)
> Enter [It] configures Nginx correctly - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:41 @ 07/16/23 23:11:39.249
STEP: turning on proxy_intercept_errors directive - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:59 @ 07/16/23 23:11:49.509
STEP: configuring error_page directive - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:62 @ 07/16/23 23:11:49.509
STEP: creating error locations - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:67 @ 07/16/23 23:11:49.509
STEP: updating configuration when only custom-http-error value changes - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:72 @ 07/16/23 23:11:49.509
STEP: ignoring duplicate values (503 in this case) per server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:90 @ 07/16/23 23:11:55.803
STEP: using the custom default-backend from annotation for upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:102 @ 07/16/23 23:12:06.081
< Exit [It] configures Nginx correctly - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:41 @ 07/16/23 23:12:16.315 (37.103s)
> Enter [AfterEach] [Annotations] custom-http-errors - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:16.315
< Exit [AfterEach] [Annotations] custom-http-errors - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:17.092 (777ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:17.094
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:26.253 (9.159s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:12:26.253
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:12:30.38 (4.127s)
> Enter [BeforeEach] with invalid auth-url should deny whole location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:866 @ 07/16/23 23:12:30.38
< Exit [BeforeEach] with invalid auth-url should deny whole location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:866 @ 07/16/23 23:12:40.55 (10.205s)
> Enter [It] should return 503 (location was denied) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:879 @ 07/16/23 23:12:40.55
< Exit [It] should return 503 (location was denied) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:879 @ 07/16/23 23:12:40.557 (7ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:40.557
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:41.043 (485ms)
+
+
+ > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:41.045
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:49.182 (8.137s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:12:49.182
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:12:53.256 (4.074s)
> Enter [It] should enable modsecurity when enable-owasp-modsecurity-crs is set to true - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:225 @ 07/16/23 23:12:53.256
< Exit [It] should enable modsecurity when enable-owasp-modsecurity-crs is set to true - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:225 @ 07/16/23 23:13:22.75 (29.529s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:22.751
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:23.247 (496ms)
+
+
+ > Enter [BeforeEach] [Setting] OCSP - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:23.249
< Exit [BeforeEach] [Setting] OCSP - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:32.429 (9.214s)
> Enter [BeforeEach] [Setting] OCSP - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:45 @ 07/16/23 23:13:32.429
< Exit [BeforeEach] [Setting] OCSP - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:45 @ 07/16/23 23:13:36.507 (4.079s)
> Enter [It] should enable OCSP and contain stapling information in the connection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:49 @ 07/16/23 23:13:36.507
STEP: running cfssl gencert -initca ca_csr.json | cfssljson -bare ca - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:216 @ 07/16/23 23:13:43.545
STEP: running cfssl gencert -ca ca.pem -ca-key ca-key.pem -config=cfssl_config.json -profile=intermediate intermediate_ca_csr.json | cfssljson -bare intermediate_ca - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:216 @ 07/16/23 23:13:43.952
STEP: running cfssl gencert -ca intermediate_ca.pem -ca-key intermediate_ca-key.pem -config=cfssl_config.json -profile=ocsp ocsp_csr.json | cfssljson -bare ocsp - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:216 @ 07/16/23 23:13:44.496
STEP: running cfssl serve -db-config=db-config.json -ca-key=intermediate_ca-key.pem -ca=intermediate_ca.pem -config=cfssl_config.json -responder=ocsp.pem -responder-key=ocsp-key.pem - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:228 @ 07/16/23 23:13:44.802
STEP: running cfssl gencert -remote=localhost -profile=server leaf_csr.json | cfssljson -bare leaf - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:238 @ 07/16/23 23:13:49.804
STEP: running cfssl ocsprefresh -ca intermediate_ca.pem -responder=ocsp.pem -responder-key=ocsp-key.pem -db-config=db-config.json - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:252 @ 07/16/23 23:13:50.312
< Exit [It] should enable OCSP and contain stapling information in the connection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:49 @ 07/16/23 23:14:19.018 (42.545s)
> Enter [AfterEach] [Setting] OCSP - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:19.019
< Exit [AfterEach] [Setting] OCSP - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:19.766 (748ms)
+
+
+ > Enter [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:19.784
< Exit [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:28.844 (9.06s)
> Enter [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:38 @ 07/16/23 23:14:28.844
< Exit [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:38 @ 07/16/23 23:14:32.923 (4.113s)
> Enter [It] should configure satisfy directive correctly - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:42 @ 07/16/23 23:14:32.923
< Exit [It] should configure satisfy directive correctly - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:42 @ 07/16/23 23:14:58.308 (25.386s)
> Enter [AfterEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:58.309
< Exit [AfterEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:58.898 (590ms)
+
+
+ > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:58.904
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:07.074 (8.204s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:15:07.074
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:15:11.143 (4.069s)
> Enter [It] should enable opentracing using zipkin - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:160 @ 07/16/23 23:15:11.143
< Exit [It] should enable opentracing using zipkin - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:160 @ 07/16/23 23:15:31.188 (20.046s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:31.189
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:31.695 (506ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:15:31.695
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:15:31.695 (0s)
+
+
+ > Enter [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:31.698
< Exit [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:40.015 (8.352s)
> Enter [It] should return OK for service with backend protocol GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:68 @ 07/16/23 23:15:40.015
< Exit [It] should return OK for service with backend protocol GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:68 @ 07/16/23 23:15:56.386 (16.37s)
> Enter [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:56.386
< Exit [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:56.782 (396ms)
+
+
+ > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:56.784
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:04.113 (7.363s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 07/16/23 23:16:04.113
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 07/16/23 23:16:08.211 (4.099s)
> Enter [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 07/16/23 23:16:08.211
STEP: configuring certificate_by_lua and skipping Nginx configuration of the new certificate - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:128 @ 07/16/23 23:16:25.445
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:136 @ 07/16/23 23:16:33.599
< Exit [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 07/16/23 23:16:33.62 (25.443s)
> Enter [It] falls back to using default certificate when secret gets deleted without reloading - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:185 @ 07/16/23 23:16:33.62
STEP: serving the default certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:204 @ 07/16/23 23:16:38.67
STEP: skipping Nginx reload - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:214 @ 07/16/23 23:16:38.72
< Exit [It] falls back to using default certificate when secret gets deleted without reloading - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:185 @ 07/16/23 23:16:38.72 (5.1s)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:38.72
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:39.166 (446ms)
+
+
+ > Enter [BeforeEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:98 @ 07/16/23 23:16:39.168
< Exit [BeforeEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:98 @ 07/16/23 23:16:41.179 (2.011s)
> Enter [It] fails when using root directive - /go/src/k8s.io/ingress-nginx/test/e2e/nginx/nginx.go:124 @ 07/16/23 23:16:41.179
< Exit [It] fails when using root directive - /go/src/k8s.io/ingress-nginx/test/e2e/nginx/nginx.go:124 @ 07/16/23 23:17:41.25 (1m0.14s)
> Enter [AfterEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:99 @ 07/16/23 23:17:41.25
< Exit [AfterEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:99 @ 07/16/23 23:17:41.266 (16ms)
+
+
+ > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:41.269
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:49.268 (7.999s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:17:49.268
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:17:53.439 (4.171s)
> Enter [It] should set proxy_redirect to hello.com goodbye.com - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:68 @ 07/16/23 23:17:53.439
< Exit [It] should set proxy_redirect to hello.com goodbye.com - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:68 @ 07/16/23 23:18:03.611 (10.206s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:03.611
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:04.065 (454ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:04.067
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:11.387 (7.321s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:18:11.387
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:18:15.513 (4.126s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:18:15.513
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:18:29.758 (14.244s)
> Enter [It] should not create additional upstream block when host part of auth-url contains a variable - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:570 @ 07/16/23 23:18:29.758
< Exit [It] should not create additional upstream block when host part of auth-url contains a variable - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:570 @ 07/16/23 23:18:52.938 (23.215s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:52.938
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:53.44 (502ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:53.442
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:01.722 (8.314s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:19:01.722
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:19:05.782 (4.06s)
> Enter [It] should not break functionality - without `*` - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:291 @ 07/16/23 23:19:05.782
< Exit [It] should not break functionality - without `*` - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:291 @ 07/16/23 23:19:12.827 (7.045s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:12.827
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:13.418 (591ms)
+
+
+ > Enter [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:13.419
< Exit [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:21.929 (8.511s)
> Enter [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:31 @ 07/16/23 23:19:21.93
< Exit [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:31 @ 07/16/23 23:19:26.01 (4.081s)
> Enter [It] disable-http-access-log set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:53 @ 07/16/23 23:19:26.011
< Exit [It] disable-http-access-log set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:53 @ 07/16/23 23:19:43.294 (17.318s)
> Enter [AfterEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:43.294
< Exit [AfterEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:43.763 (468ms)
+
+
+ > Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:43.765
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:53.125 (9.36s)
> Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 07/16/23 23:19:53.125
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 07/16/23 23:19:57.249 (4.124s)
> Enter [It] should not exists opentelemetry_operation_name directive when is empty - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:89 @ 07/16/23 23:19:57.249
< Exit [It] should not exists opentelemetry_operation_name directive when is empty - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:89 @ 07/16/23 23:20:14.861 (17.646s)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:14.861
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:15.741 (880ms)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 07/16/23 23:20:15.741
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 07/16/23 23:20:15.741 (0s)
+
+
+ > Enter [BeforeEach] [Ingress] DeepInspection - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:15.743
< Exit [BeforeEach] [Ingress] DeepInspection - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:24.398 (8.655s)
> Enter [BeforeEach] [Ingress] DeepInspection - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/deep_inspection.go:30 @ 07/16/23 23:20:24.398
< Exit [BeforeEach] [Ingress] DeepInspection - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/deep_inspection.go:30 @ 07/16/23 23:20:28.465 (4.067s)
> Enter [It] should drop whole ingress if one path matches invalid regex - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/deep_inspection.go:34 @ 07/16/23 23:20:28.465
< Exit [It] should drop whole ingress if one path matches invalid regex - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/deep_inspection.go:34 @ 07/16/23 23:20:45.696 (17.265s)
> Enter [AfterEach] [Ingress] DeepInspection - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:45.696
< Exit [AfterEach] [Ingress] DeepInspection - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:46.089 (393ms)
+
+
+ > Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:46.09
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:54.488 (8.398s)
> Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 07/16/23 23:20:54.488
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 07/16/23 23:21:05.565 (11.111s)
> Enter [It] should set keep alive connection timeout to upstream server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:68 @ 07/16/23 23:21:05.565
< Exit [It] should set keep alive connection timeout to upstream server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:68 @ 07/16/23 23:21:15.847 (10.282s)
> Enter [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:15.847
< Exit [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:16.528 (681ms)
+
+
+ > Enter [BeforeEach] [Annotations] http2-push-preload - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:16.53
< Exit [BeforeEach] [Annotations] http2-push-preload - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:26.755 (10.225s)
> Enter [BeforeEach] [Annotations] http2-push-preload - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/http2pushpreload.go:30 @ 07/16/23 23:21:26.755
< Exit [BeforeEach] [Annotations] http2-push-preload - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/http2pushpreload.go:30 @ 07/16/23 23:21:30.816 (4.061s)
> Enter [It] enable the http2-push-preload directive - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/http2pushpreload.go:34 @ 07/16/23 23:21:30.816
< Exit [It] enable the http2-push-preload directive - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/http2pushpreload.go:34 @ 07/16/23 23:21:41.003 (10.222s)
> Enter [AfterEach] [Annotations] http2-push-preload - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:41.003
< Exit [AfterEach] [Annotations] http2-push-preload - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:41.534 (531ms)
+
+
+ > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:41.538
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:50.229 (8.691s)
> Enter [It] should return 200 for service type=ExternalName using a port name - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:184 @ 07/16/23 23:21:50.229
< Exit [It] should return 200 for service type=ExternalName using a port name - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:184 @ 07/16/23 23:22:00.623 (10.393s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:00.623
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:00.983 (361ms)
+
+
+ > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:00.985
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:09.37 (8.419s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 07/16/23 23:22:09.37
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 07/16/23 23:22:20.486 (11.116s)
> Enter [It] should set server_names_hash_bucket_size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:40 @ 07/16/23 23:22:20.486
< Exit [It] should set server_names_hash_bucket_size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:40 @ 07/16/23 23:22:30.763 (10.277s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:30.763
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:31.515 (787ms)
+
+
+ > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:31.521
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:40.235 (8.714s)
> Enter [It] works with external name set to incomplete fqdn - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:62 @ 07/16/23 23:22:40.235
< Exit [It] works with external name set to incomplete fqdn - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:62 @ 07/16/23 23:22:54.509 (14.274s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:54.509
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:55.102 (593ms)
+
+
+ > Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:55.104
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:03.655 (8.585s)
> Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 07/16/23 23:23:03.655
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 07/16/23 23:23:14.739 (11.084s)
> Enter [It] should set keepalive connection to upstream server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:59 @ 07/16/23 23:23:14.739
< Exit [It] should set keepalive connection to upstream server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:59 @ 07/16/23 23:23:25.032 (10.292s)
> Enter [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:25.032
< Exit [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:25.8 (768ms)
+
+
+ > Enter [BeforeEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:98 @ 07/16/23 23:23:25.803
< Exit [BeforeEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:98 @ 07/16/23 23:23:27.816 (2.013s)
> Enter [It] start nginx with default configuration - /go/src/k8s.io/ingress-nginx/test/e2e/nginx/nginx.go:102 @ 07/16/23 23:23:27.816
< Exit [It] start nginx with default configuration - /go/src/k8s.io/ingress-nginx/test/e2e/nginx/nginx.go:102 @ 07/16/23 23:23:36.925 (9.144s)
> Enter [AfterEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:99 @ 07/16/23 23:23:36.925
< Exit [AfterEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:99 @ 07/16/23 23:23:36.938 (13ms)
+
+
+ > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:36.94
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:45.412 (8.472s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:23:45.412
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:23:49.52 (4.108s)
> Enter [It] should not set proxy client-max-body-size to incorrect value - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:100 @ 07/16/23 23:23:49.52
< Exit [It] should not set proxy client-max-body-size to incorrect value - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:100 @ 07/16/23 23:23:59.723 (10.203s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:59.723
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:00.261 (538ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:00.263
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:07.782 (7.554s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:24:07.782
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:24:11.858 (4.076s)
> Enter [It] should return status code 200 when no authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:46 @ 07/16/23 23:24:11.858
< Exit [It] should return status code 200 when no authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:46 @ 07/16/23 23:24:22.095 (10.237s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:22.095
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:22.827 (732ms)
+
+
+ > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:22.835
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:31.215 (8.414s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:24:31.215
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:24:33.268 (2.053s)
> Enter [It] should not exists opentracing_location_operation_name directive when is empty - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:130 @ 07/16/23 23:24:33.268
< Exit [It] should not exists opentracing_location_operation_name directive when is empty - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:130 @ 07/16/23 23:24:50.51 (17.242s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:50.51
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:51.166 (657ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:24:51.166
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:24:51.166 (0s)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:51.169
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:00.029 (8.86s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:25:00.029
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:25:08.096 (8.101s)
> Enter [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:490 @ 07/16/23 23:25:08.096
STEP: routing requests to the canary upstream when header pattern is matched - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:514 @ 07/16/23 23:25:25.318
STEP: routing requests to the mainline upstream when header failed to match header value - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:523 @ 07/16/23 23:25:25.328
< Exit [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:490 @ 07/16/23 23:25:25.338 (17.243s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:25.339
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:25.856 (517ms)
+
+
+ > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:25.858
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:34.445 (8.622s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 07/16/23 23:25:34.445
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 07/16/23 23:25:45.53 (11.085s)
> Enter [It] should set vmap-hash-bucket-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:100 @ 07/16/23 23:25:45.53
< Exit [It] should set vmap-hash-bucket-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:100 @ 07/16/23 23:25:55.715 (10.185s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:55.715
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:56.172 (456ms)
+
+
+ > Enter [BeforeEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:56.173
< Exit [BeforeEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:04.819 (8.68s)
> Enter [It] should respond with a standard redirect code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:33 @ 07/16/23 23:26:04.819
STEP: setting permanent-redirect annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:34 @ 07/16/23 23:26:04.819
STEP: sending request to redirected URL path - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:52 @ 07/16/23 23:26:15.073
< Exit [It] should respond with a standard redirect code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:33 @ 07/16/23 23:26:15.081 (10.263s)
> Enter [AfterEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:15.081
< Exit [AfterEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:15.564 (482ms)
+
+
+ > Enter [BeforeEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:15.565
< Exit [BeforeEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:23.961 (8.396s)
> Enter [It] should return 404 sending requests when only a default backend is running - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:33 @ 07/16/23 23:26:23.961
STEP: basic HTTP GET request without host to path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 07/16/23 23:26:28.963
STEP: basic HTTP GET request without host to path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 07/16/23 23:26:28.977
STEP: basic HTTPS GET request without host to path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 07/16/23 23:26:28.992
STEP: basic HTTPS GET request without host to path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 07/16/23 23:26:29.017
STEP: basic HTTP POST request without host to path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 07/16/23 23:26:29.044
STEP: basic HTTP POST request without host to path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 07/16/23 23:26:29.06
STEP: basic HTTPS POST request without host to path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 07/16/23 23:26:29.371
STEP: basic HTTPS POST request without host to path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 07/16/23 23:26:29.776
STEP: basic HTTP GET request to host foo.bar.com and path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 07/16/23 23:26:30.197
STEP: basic HTTP GET request to host foo.bar.com and path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 07/16/23 23:26:30.574
STEP: basic HTTPS GET request to host foo.bar.com and path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 07/16/23 23:26:30.98
STEP: basic HTTPS GET request to host foo.bar.com and path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 07/16/23 23:26:31.34
STEP: basic HTTP POST request to host foo.bar.com and path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 07/16/23 23:26:31.743
STEP: basic HTTP POST request to host foo.bar.com and path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 07/16/23 23:26:32.136
STEP: basic HTTPS POST request to host foo.bar.com and path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 07/16/23 23:26:32.539
STEP: basic HTTPS POST request to host foo.bar.com and path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 07/16/23 23:26:32.97
< Exit [It] should return 404 sending requests when only a default backend is running - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:33 @ 07/16/23 23:26:33.344 (9.418s)
> Enter [AfterEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:33.344
< Exit [AfterEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:33.883 (539ms)
+
+
+ > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:33.885
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:41.697 (7.812s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:26:41.697
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:26:45.787 (4.089s)
> Enter [It] should propagate the w3c header when configured with jaeger - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:197 @ 07/16/23 23:26:45.787
< Exit [It] should propagate the w3c header when configured with jaeger - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:197 @ 07/16/23 23:27:16.141 (30.389s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:16.141
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:16.729 (588ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:27:16.729
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:27:16.729 (0s)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:16.734
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:27.28 (10.546s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:27:27.28
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:27:35.372 (8.127s)
> Enter [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:426 @ 07/16/23 23:27:35.373
STEP: routing requests to the canary upstream when header is set to 'DoCanary' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:451 @ 07/16/23 23:27:52.596
STEP: routing requests to the mainline upstream when header is set to 'always' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:460 @ 07/16/23 23:27:52.607
STEP: routing requests to the mainline upstream when header is set to 'never' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:469 @ 07/16/23 23:27:52.618
STEP: routing requests to the mainline upstream when header is set to anything else - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:478 @ 07/16/23 23:27:52.624
< Exit [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:426 @ 07/16/23 23:27:52.632 (17.259s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:52.632
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:53.184 (552ms)
+
+
+ > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:53.185
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:01.521 (8.37s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:28:01.521
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:28:05.603 (4.082s)
> Enter [It] should exists opentracing_location_operation_name directive when is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:145 @ 07/16/23 23:28:05.603
< Exit [It] should exists opentracing_location_operation_name directive when is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:145 @ 07/16/23 23:28:22.87 (17.267s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:22.87
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:23.292 (422ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:28:23.292
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:28:23.292 (0s)
+
+
+ > Enter [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:23.293
< Exit [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:31.555 (8.296s)
> Enter [It] should set gzip_min_length to 100 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:78 @ 07/16/23 23:28:31.555
< Exit [It] should set gzip_min_length to 100 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:78 @ 07/16/23 23:28:48.825 (17.268s)
> Enter [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:48.825
< Exit [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:49.416 (591ms)
+
+
+ > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:49.42
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:57.983 (8.563s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:28:57.983
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:29:02.021 (4.072s)
> Enter [It] should not exists opentracing_operation_name directive when is empty - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:100 @ 07/16/23 23:29:02.021
< Exit [It] should not exists opentracing_operation_name directive when is empty - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:100 @ 07/16/23 23:29:19.271 (17.25s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:19.271
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:19.996 (725ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:29:19.996
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:29:19.996 (0s)
+
+
+ > Enter [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:19.999
< Exit [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:27.495 (7.496s)
> Enter [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:32 @ 07/16/23 23:29:27.495
< Exit [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:32 @ 07/16/23 23:29:31.525 (4.064s)
> Enter [It] should not set invalid proxy send timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:52 @ 07/16/23 23:29:31.525
< Exit [It] should not set invalid proxy send timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:52 @ 07/16/23 23:29:48.787 (17.262s)
> Enter [AfterEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:48.787
< Exit [AfterEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:49.468 (682ms)
+
+
+ > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:49.475
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:58.075 (8.6s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 07/16/23 23:29:58.075
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 07/16/23 23:30:09.134 (11.098s)
> Enter [It] should set variables-hash-max-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:88 @ 07/16/23 23:30:09.134
< Exit [It] should set variables-hash-max-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:88 @ 07/16/23 23:30:19.281 (10.147s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:30:19.281
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:30:19.775 (494ms)
+
+
+ > Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:30:19.783
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:30:29.478 (9.696s)
> Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 07/16/23 23:30:29.478
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 07/16/23 23:30:33.47 (4.057s)
> Enter [It] should include opentelemetry_trust_incoming_spans on directive when enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:74 @ 07/16/23 23:30:33.471
< Exit [It] should include opentelemetry_trust_incoming_spans on directive when enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:74 @ 07/16/23 23:30:54.972 (21.502s)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:30:54.973
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:00.749 (5.815s)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 07/16/23 23:31:00.749
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 07/16/23 23:31:00.749 (0s)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:00.828
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:08.468 (7.64s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:31:08.468
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:31:16.616 (8.148s)
> Enter [It] always routes traffic to canary if first request was affinitized to canary (explicit sticky behavior) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:1000 @ 07/16/23 23:31:16.616
< Exit [It] always routes traffic to canary if first request was affinitized to canary (explicit sticky behavior) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:1000 @ 07/16/23 23:31:42.294 (25.713s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:42.294
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:42.864 (569ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:42.867
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:51.421 (8.554s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:31:51.421
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:31:55.49 (4.069s)
> Enter [It] should return status code 401 when authentication is configured but Authorization header is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:89 @ 07/16/23 23:31:55.49
< Exit [It] should return status code 401 when authentication is configured but Authorization header is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:89 @ 07/16/23 23:32:06.723 (11.267s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:06.723
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:07.164 (442ms)
+
+
+ > Enter [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:07.168
< Exit [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:14.509 (7.341s)
> Enter [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:35 @ 07/16/23 23:32:14.509
< Exit [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:35 @ 07/16/23 23:32:25.596 (11.087s)
> Enter [It] should not trust X-Forwarded headers when setting is false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:92 @ 07/16/23 23:32:25.596
< Exit [It] should not trust X-Forwarded headers when setting is false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:92 @ 07/16/23 23:32:42.761 (17.199s)
> Enter [AfterEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:42.761
< Exit [AfterEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:43.179 (418ms)
+
+
+ > Enter [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:43.184
< Exit [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:51.238 (8.053s)
> Enter [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:54 @ 07/16/23 23:32:51.238
< Exit [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:54 @ 07/16/23 23:33:01.441 (10.238s)
> Enter [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:01.442
< Exit [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:02.003 (562ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:02.007
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:11.575 (9.568s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:33:11.575
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:33:19.722 (8.147s)
> Enter [It] should route requests split between mainline and canary if canary weight is 100 and weight total is 200 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:834 @ 07/16/23 23:33:19.722
< Exit [It] should route requests split between mainline and canary if canary weight is 100 and weight total is 200 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:834 @ 07/16/23 23:34:15.058 (55.405s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:15.058
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:15.476 (418ms)
+
+
+ > Enter [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:15.477
< Exit [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:23.831 (8.354s)
> Enter [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:32 @ 07/16/23 23:34:23.831
< Exit [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:32 @ 07/16/23 23:34:27.893 (4.061s)
> Enter [It] should set mirror-target to https://test.env.com/$request_uri - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:51 @ 07/16/23 23:34:27.893
< Exit [It] should set mirror-target to https://test.env.com/$request_uri - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:51 @ 07/16/23 23:34:38.318 (10.46s)
> Enter [AfterEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:38.318
< Exit [AfterEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:38.801 (483ms)
+
+
+ > Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:38.803
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:48.547 (9.744s)
> Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 07/16/23 23:34:48.547
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 07/16/23 23:34:52.605 (4.058s)
> Enter [It] should set backend protocol to $scheme:// and use proxy_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:49 @ 07/16/23 23:34:52.605
< Exit [It] should set backend protocol to $scheme:// and use proxy_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:49 @ 07/16/23 23:35:02.751 (10.18s)
> Enter [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:02.751
< Exit [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:03.297 (546ms)
+
+
+ > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:03.312
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:11.68 (8.368s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 07/16/23 23:35:11.68
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 07/16/23 23:35:22.776 (11.096s)
> Enter [It] should disable the log-format-escape-json - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:55 @ 07/16/23 23:35:22.776
< Exit [It] should disable the log-format-escape-json - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:55 @ 07/16/23 23:35:32.97 (10.229s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:32.97
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:33.388 (418ms)
+
+
+ > Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:33.39
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:41.909 (8.519s)
> Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 07/16/23 23:35:41.909
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 07/16/23 23:35:43.975 (2.066s)
> Enter [It] should return OK for service with backend protocol FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:102 @ 07/16/23 23:35:43.975
< Exit [It] should return OK for service with backend protocol FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:102 @ 07/16/23 23:35:54.184 (10.209s)
> Enter [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:54.184
< Exit [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:54.637 (453ms)
+
+
+ > Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:54.638
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:04.492 (9.888s)
> Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 07/16/23 23:36:04.492
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 07/16/23 23:36:10.59 (6.098s)
> Enter [It] should set valid proxy-ssl-secret, proxy-ssl-verify to on, proxy-ssl-verify-depth to 2, and proxy-ssl-server-name to on - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:64 @ 07/16/23 23:36:10.59
< Exit [It] should set valid proxy-ssl-secret, proxy-ssl-verify to on, proxy-ssl-verify-depth to 2, and proxy-ssl-server-name to on - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:64 @ 07/16/23 23:36:21.417 (10.826s)
> Enter [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:21.417
< Exit [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:21.909 (492ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:21.91
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:31.441 (9.565s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:36:31.441
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:36:39.575 (8.135s)
> Enter [It] should route requests only to canary if canary weight is 100 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:743 @ 07/16/23 23:36:39.575
< Exit [It] should route requests only to canary if canary weight is 100 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:743 @ 07/16/23 23:36:56.821 (17.246s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:56.821
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:57.222 (400ms)
+
+
+ > Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:57.223
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:07.971 (10.783s)
> Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 07/16/23 23:37:07.971
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 07/16/23 23:37:19.071 (11.099s)
> Enter [It] should set keepalive time to upstream server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:77 @ 07/16/23 23:37:19.071
< Exit [It] should set keepalive time to upstream server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:77 @ 07/16/23 23:37:29.282 (10.212s)
> Enter [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:29.283
< Exit [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:29.692 (409ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:29.693
< Exit [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:38.006 (8.347s)
> Enter [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:43 @ 07/16/23 23:37:38.006
< Exit [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:43 @ 07/16/23 23:37:58.271 (20.264s)
> Enter [It] should return status code 200 when accessing '/' authentication - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:68 @ 07/16/23 23:37:58.271
< Exit [It] should return status code 200 when accessing '/' authentication - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:68 @ 07/16/23 23:38:02.529 (4.293s)
> Enter [AfterEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:02.529
< Exit [AfterEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:02.964 (434ms)
+
+
+ > Enter [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:02.971
< Exit [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:11.459 (8.488s)
> Enter [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:34 @ 07/16/23 23:38:11.459
< Exit [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:34 @ 07/16/23 23:38:22.582 (11.122s)
> Enter [It] Add multiple custom headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:65 @ 07/16/23 23:38:22.582
< Exit [It] Add multiple custom headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:65 @ 07/16/23 23:38:32.759 (10.211s)
> Enter [AfterEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:32.759
< Exit [AfterEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:33.178 (419ms)
+
+
+ > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:33.18
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:41.812 (8.632s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:38:41.812
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:38:49.899 (8.087s)
> Enter [It] should enable modsecurity without using 'modsecurity on;' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:110 @ 07/16/23 23:38:49.899
< Exit [It] should enable modsecurity without using 'modsecurity on;' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:110 @ 07/16/23 23:39:07.104 (17.239s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:07.104
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:07.608 (504ms)
+
+
+ > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:07.617
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:15.244 (7.627s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 07/16/23 23:39:15.244
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 07/16/23 23:39:21.419 (6.176s)
> Enter [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 07/16/23 23:39:21.42
STEP: configuring certificate_by_lua and skipping Nginx configuration of the new certificate - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:128 @ 07/16/23 23:39:38.597
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:136 @ 07/16/23 23:39:46.821
< Exit [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 07/16/23 23:39:46.84 (25.455s)
> Enter [It] picks up the updated certificate without reloading - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:149 @ 07/16/23 23:39:46.841
STEP: configuring certificate_by_lua and skipping Nginx configuration of the new certificate - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:163 @ 07/16/23 23:39:52.033
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:169 @ 07/16/23 23:39:55.176
STEP: skipping Nginx reload - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:180 @ 07/16/23 23:39:58.206
< Exit [It] picks up the updated certificate without reloading - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:149 @ 07/16/23 23:39:58.206 (11.366s)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:58.206
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:58.754 (548ms)
+
+
+ > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:58.76
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:07.505 (8.774s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:40:07.505
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:40:13.578 (6.073s)
> Enter [It] should exists opentracing directive when is enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:71 @ 07/16/23 23:40:13.578
< Exit [It] should exists opentracing directive when is enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:71 @ 07/16/23 23:40:30.774 (17.231s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:30.774
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:31.257 (483ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:40:31.257
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:40:31.258 (0s)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:31.26
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:39.618 (8.359s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:40:39.619
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:40:45.749 (6.13s)
> Enter [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 07/16/23 23:40:45.749
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 07/16/23 23:40:50.946
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 07/16/23 23:41:01.126
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 07/16/23 23:41:11.35
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 07/16/23 23:41:21.559
< Exit [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 07/16/23 23:41:36.857 (51.177s)
> Enter [It] should return status code 200 when signed in after auth backend is deleted - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:772 @ 07/16/23 23:41:36.857
< Exit [It] should return status code 200 when signed in after auth backend is deleted - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:772 @ 07/16/23 23:41:43.93 (7.073s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:43.93
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:44.372 (442ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:07:34.287
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:07:49.044 (14.757s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:07:49.044
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:08:05.568 (16.559s)
> Enter [It] should route requests only to mainline if canary weight is 0 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:705 @ 07/16/23 23:08:05.569
< Exit [It] should route requests only to mainline if canary weight is 0 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:705 @ 07/16/23 23:08:27.887 (22.318s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:27.887
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:28.576 (689ms)
+
+
+ > Enter [BeforeEach] [Setting] Add no tls redirect locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:28.582
< Exit [BeforeEach] [Setting] Add no tls redirect locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:36.857 (8.309s)
> Enter [It] Check no tls redirect locations config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_tls_redirect_locations.go:31 @ 07/16/23 23:08:36.857
< Exit [It] Check no tls redirect locations config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_tls_redirect_locations.go:31 @ 07/16/23 23:08:57.345 (20.488s)
> Enter [AfterEach] [Setting] Add no tls redirect locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:57.345
< Exit [AfterEach] [Setting] Add no tls redirect locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:57.948 (603ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:57.95
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:06.944 (9.028s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:09:06.944
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:09:25.075 (18.131s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:09:25.075
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 07/16/23 23:09:25.075
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 07/16/23 23:09:35.276
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 07/16/23 23:09:45.533
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:09:55.741 (30.7s)
> Enter [It] should set request-redirect when global-auth-request-redirect is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:237 @ 07/16/23 23:09:55.741
STEP: Adding a global-auth-request-redirect to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:242 @ 07/16/23 23:09:55.741
< Exit [It] should set request-redirect when global-auth-request-redirect is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:237 @ 07/16/23 23:10:05.886 (10.18s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:05.886
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:06.357 (471ms)
+
+
+ > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:06.359
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:15.633 (9.274s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 07/16/23 23:10:15.633
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 07/16/23 23:10:26.724 (11.091s)
> Enter [It] log-format default escape - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:105 @ 07/16/23 23:10:26.724
< Exit [It] log-format default escape - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:105 @ 07/16/23 23:10:40.107 (13.418s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:40.107
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:40.707 (600ms)
+
+
+ > Enter [BeforeEach] [Setting] [Load Balancer] EWMA - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:40.727
< Exit [BeforeEach] [Setting] [Load Balancer] EWMA - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:49.212 (8.485s)
> Enter [BeforeEach] [Setting] [Load Balancer] EWMA - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/ewma.go:34 @ 07/16/23 23:10:49.212
< Exit [BeforeEach] [Setting] [Load Balancer] EWMA - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/ewma.go:34 @ 07/16/23 23:11:00.338 (11.126s)
> Enter [It] does not fail requests - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/ewma.go:42 @ 07/16/23 23:11:00.338
Jul 16 23:11:14.762: INFO: Request distribution: map[echo-7b6bf466cc-k5lq4:6 echo-7b6bf466cc-xhgrs:9 echo-7b6bf466cc-zm2tc:15]
< Exit [It] does not fail requests - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/ewma.go:42 @ 07/16/23 23:11:14.762 (14.48s)
> Enter [AfterEach] [Setting] [Load Balancer] EWMA - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:11:14.762
< Exit [AfterEach] [Setting] [Load Balancer] EWMA - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:11:15.337 (574ms)
+
+
+ > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:11:15.344
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:11:23.899 (8.554s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:11:23.899
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:11:28.014 (4.115s)
> Enter [It] should not set affinity across all server locations when using separate ingresses - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:320 @ 07/16/23 23:11:28.014
< Exit [It] should not set affinity across all server locations when using separate ingresses - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:320 @ 07/16/23 23:11:45.272 (17.315s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:11:45.272
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:11:46.053 (781ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:11:46.055
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:11:54.592 (8.537s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:11:54.592
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:12:02.74 (8.185s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:12:02.741
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 07/16/23 23:12:02.741
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 07/16/23 23:12:12.97
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 07/16/23 23:12:23.365
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:12:33.703 (30.997s)
> Enter [It] should add custom error page when global-auth-signin url is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:210 @ 07/16/23 23:12:33.703
STEP: Adding a global-auth-signin to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:215 @ 07/16/23 23:12:33.703
< Exit [It] should add custom error page when global-auth-signin url is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:210 @ 07/16/23 23:12:43.93 (10.227s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:43.93
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:44.68 (750ms)
+
+
+ > Enter [BeforeEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:44.681
< Exit [BeforeEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:53.488 (8.807s)
> Enter [It] should not create sync events - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_sync_events.go:80 @ 07/16/23 23:12:53.488
< Exit [It] should not create sync events - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_sync_events.go:80 @ 07/16/23 23:13:16.154 (22.701s)
> Enter [AfterEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:16.154
< Exit [AfterEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:16.68 (526ms)
+
+
+ > Enter [BeforeEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:16.682
< Exit [BeforeEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:24.418 (7.736s)
> Enter [It] Balanced affinity mode should balance - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinitymode.go:34 @ 07/16/23 23:13:24.418
< Exit [It] Balanced affinity mode should balance - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinitymode.go:34 @ 07/16/23 23:13:43.022 (18.638s)
> Enter [AfterEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:43.022
< Exit [AfterEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:43.557 (535ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:43.569
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:52.109 (8.54s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:13:52.109
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:14:00.22 (8.111s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:14:00.22
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 07/16/23 23:14:00.221
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 07/16/23 23:14:10.357
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 07/16/23 23:14:20.687
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:14:31.22 (31.034s)
> Enter [It] should still return status code 200 after auth backend is deleted using cache - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:155 @ 07/16/23 23:14:31.221
STEP: Adding a global-auth-cache-key to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:163 @ 07/16/23 23:14:31.221
< Exit [It] should still return status code 200 after auth backend is deleted using cache - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:155 @ 07/16/23 23:14:56.908 (25.722s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:56.908
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:57.868 (959ms)
+
+
+ > Enter [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:57.873
< Exit [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:07.775 (9.936s)
> Enter [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:32 @ 07/16/23 23:15:07.775
< Exit [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:32 @ 07/16/23 23:15:11.846 (4.07s)
> Enter [It] should set mirror-target to http://localhost/mirror - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:36 @ 07/16/23 23:15:11.846
< Exit [It] should set mirror-target to http://localhost/mirror - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:36 @ 07/16/23 23:15:22.158 (10.312s)
> Enter [AfterEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:22.158
< Exit [AfterEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:22.583 (425ms)
+
+
+ > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:22.584
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:31.03 (8.446s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:15:31.03
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:15:35.048 (4.052s)
> Enter [It] should set sticky cookie SERVERID - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:42 @ 07/16/23 23:15:35.048
< Exit [It] should set sticky cookie SERVERID - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:42 @ 07/16/23 23:15:45.303 (10.255s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:45.303
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:45.943 (640ms)
+
+
+ > Enter [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:45.959
< Exit [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:54.309 (8.35s)
> Enter [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:36 @ 07/16/23 23:15:54.309
< Exit [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:36 @ 07/16/23 23:15:58.369 (4.06s)
> Enter [It] should not use the Service Cluster IP and Port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:99 @ 07/16/23 23:15:58.369
STEP: checking if the service is reached - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:113 @ 07/16/23 23:16:15.745
STEP: checking if the Service Cluster IP and Port are not used - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:120 @ 07/16/23 23:16:15.754
< Exit [It] should not use the Service Cluster IP and Port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:99 @ 07/16/23 23:16:15.932 (17.597s)
> Enter [AfterEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:15.932
< Exit [AfterEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:16.329 (396ms)
+
+
+ > Enter [BeforeEach] [Annotations] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:16.33
< Exit [BeforeEach] [Annotations] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:24.942 (8.612s)
> Enter [BeforeEach] [Annotations] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/sslciphers.go:31 @ 07/16/23 23:16:24.942
< Exit [BeforeEach] [Annotations] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/sslciphers.go:31 @ 07/16/23 23:16:29.022 (4.08s)
> Enter [It] should change ssl ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/sslciphers.go:35 @ 07/16/23 23:16:29.022
< Exit [It] should change ssl ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/sslciphers.go:35 @ 07/16/23 23:16:39.31 (10.323s)
> Enter [AfterEach] [Annotations] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:39.31
< Exit [AfterEach] [Annotations] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:39.98 (670ms)
+
+
+ > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:39.982
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:49.837 (9.855s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 07/16/23 23:16:49.837
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 07/16/23 23:17:00.937 (11.1s)
> Enter [It] should enable the log-format-escape-none - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:63 @ 07/16/23 23:17:00.938
< Exit [It] should enable the log-format-escape-none - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:63 @ 07/16/23 23:17:11.121 (10.218s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:11.121
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:11.607 (486ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:11.608
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:20.212 (8.604s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:17:20.212
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:17:28.342 (8.13s)
> Enter [It] should route requests split between mainline and canary if canary weight is 50 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:808 @ 07/16/23 23:17:28.342
< Exit [It] should route requests split between mainline and canary if canary weight is 50 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:808 @ 07/16/23 23:18:23.842 (55.569s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:23.843
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:24.502 (659ms)
+
+
+ > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:24.505
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:31.714 (7.243s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:18:31.714
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:18:35.862 (4.148s)
> Enter [It] should set valid proxy timeouts - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:115 @ 07/16/23 23:18:35.862
< Exit [It] should set valid proxy timeouts - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:115 @ 07/16/23 23:18:46.046 (10.184s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:46.046
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:46.546 (500ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:46.548
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:53.971 (7.423s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:18:53.971
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:18:58.059 (4.088s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:18:58.059
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:19:12.335 (14.31s)
> Enter [It] should not create additional upstream block when auth-keepalive is negative - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:590 @ 07/16/23 23:19:12.335
< Exit [It] should not create additional upstream block when auth-keepalive is negative - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:590 @ 07/16/23 23:19:35.576 (23.275s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:35.576
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:36.255 (679ms)
+
+
+ > Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:36.256
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:43.637 (7.381s)
> Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 07/16/23 23:19:43.637
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 07/16/23 23:19:57.933 (14.296s)
> Enter [It] handles an annotation change - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:171 @ 07/16/23 23:19:57.933
< Exit [It] handles an annotation change - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:171 @ 07/16/23 23:20:04.479 (6.58s)
> Enter [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:04.479
< Exit [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:05.013 (534ms)
+
+
+
+ > Enter [BeforeEach] [Security] Pod Security Policies with volumes - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:05.015
< Exit [BeforeEach] [Security] Pod Security Policies with volumes - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:14.859 (9.844s)
> Enter [It] should be running with a Pod Security Policy - /go/src/k8s.io/ingress-nginx/test/e2e/settings/pod_security_policy_volumes.go:40 @ 07/16/23 23:20:14.859
[SKIPPED] PSP not supported in this version
In [It] at: /go/src/k8s.io/ingress-nginx/test/e2e/settings/pod_security_policy_volumes.go:53 @ 07/16/23 23:20:14.864
< Exit [It] should be running with a Pod Security Policy - /go/src/k8s.io/ingress-nginx/test/e2e/settings/pod_security_policy_volumes.go:40 @ 07/16/23 23:20:14.864 (5ms)
> Enter [AfterEach] [Security] Pod Security Policies with volumes - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:14.864
< Exit [AfterEach] [Security] Pod Security Policies with volumes - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:15.695 (831ms)
+
+
+ > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:15.697
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:23.308 (7.611s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:20:23.308
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:20:27.397 (4.089s)
> Enter [It] should set secure in cookie with provided true annotation on http - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:412 @ 07/16/23 23:20:27.397
< Exit [It] should set secure in cookie with provided true annotation on http - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:412 @ 07/16/23 23:20:37.584 (10.221s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:37.584
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:38.237 (653ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:38.239
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:46.709 (8.47s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 07/16/23 23:20:46.709
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 07/16/23 23:20:50.775 (4.066s)
> Enter [It] should return 200 using auth-tls-match-cn with matching CN from client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:295 @ 07/16/23 23:20:50.775
< Exit [It] should return 200 using auth-tls-match-cn with matching CN from client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:295 @ 07/16/23 23:21:01.786 (11.046s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:01.786
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:02.175 (389ms)
+
+
+ > Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:02.177
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:10.721 (8.544s)
> Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 07/16/23 23:21:10.721
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 07/16/23 23:21:14.801 (4.08s)
> Enter [It] should fail to use longest match for documented warning - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:158 @ 07/16/23 23:21:14.801
STEP: creating a regular ingress definition - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:161 @ 07/16/23 23:21:14.801
STEP: creating an ingress definition with the use-regex annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:165 @ 07/16/23 23:21:21.843
STEP: check that '/foo/bar/bar' does not match the longest exact path - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:179 @ 07/16/23 23:21:32.042
< Exit [It] should fail to use longest match for documented warning - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:158 @ 07/16/23 23:21:32.048 (17.282s)
> Enter [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:32.048
< Exit [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:32.461 (413ms)
+
+
+ > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:32.463
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:39.797 (7.334s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:21:39.797
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:21:43.865 (4.068s)
> Enter [BeforeEach] Without IngressClass Cluster scoped Permission - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:587 @ 07/16/23 23:21:43.865
< Exit [BeforeEach] Without IngressClass Cluster scoped Permission - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:587 @ 07/16/23 23:21:51.955 (8.09s)
> Enter [It] should ignore Ingress with only IngressClassName - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:652 @ 07/16/23 23:21:51.955
< Exit [It] should ignore Ingress with only IngressClassName - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:652 @ 07/16/23 23:22:02.145 (10.223s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:02.145
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:02.564 (419ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:02.566
< Exit [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:11.193 (8.627s)
> Enter [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:33 @ 07/16/23 23:22:11.193
< Exit [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:33 @ 07/16/23 23:22:22.303 (11.11s)
> Enter [It] should block Referers defined in the ConfigMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:88 @ 07/16/23 23:22:22.303
< Exit [It] should block Referers defined in the ConfigMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:88 @ 07/16/23 23:22:32.765 (10.496s)
> Enter [AfterEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:32.765
< Exit [AfterEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:33.67 (906ms)
+
+
+ > Enter [BeforeEach] [Setting] Configmap change - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:33.674
< Exit [BeforeEach] [Setting] Configmap change - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:42.623 (8.949s)
> Enter [BeforeEach] [Setting] Configmap change - /go/src/k8s.io/ingress-nginx/test/e2e/settings/configmap_change.go:32 @ 07/16/23 23:22:42.623
< Exit [BeforeEach] [Setting] Configmap change - /go/src/k8s.io/ingress-nginx/test/e2e/settings/configmap_change.go:32 @ 07/16/23 23:22:46.677 (4.054s)
> Enter [It] should reload after an update in the configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/configmap_change.go:36 @ 07/16/23 23:22:46.677
STEP: adding a whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/settings/configmap_change.go:42 @ 07/16/23 23:22:53.713
STEP: changing error-log-level - /go/src/k8s.io/ingress-nginx/test/e2e/settings/configmap_change.go:61 @ 07/16/23 23:23:03.876
< Exit [It] should reload after an update in the configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/configmap_change.go:36 @ 07/16/23 23:23:17.205 (30.562s)
> Enter [AfterEach] [Setting] Configmap change - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:17.205
< Exit [AfterEach] [Setting] Configmap change - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:17.616 (412ms)
+
+
+ > Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:17.617
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:25.915 (8.298s)
> Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 07/16/23 23:23:25.916
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 07/16/23 23:23:40.996 (15.114s)
> Enter [It] should ignore catch all Ingress with backend and rules - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:69 @ 07/16/23 23:23:40.996
< Exit [It] should ignore catch all Ingress with backend and rules - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:69 @ 07/16/23 23:23:51.243 (10.247s)
> Enter [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:51.243
< Exit [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:51.888 (645ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:51.89
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:02.36 (10.505s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:24:02.36
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:24:06.483 (4.123s)
> Enter [It] should set "proxy_set_header 'My-Custom-Header' '42';" when auth-headers are set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:301 @ 07/16/23 23:24:06.483
< Exit [It] should set "proxy_set_header 'My-Custom-Header' '42';" when auth-headers are set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:301 @ 07/16/23 23:24:16.671 (10.187s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:16.671
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:17.137 (467ms)
+
+
+ > Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:17.14
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:25.522 (8.382s)
> Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 07/16/23 23:24:25.522
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 07/16/23 23:24:29.596 (4.073s)
> Enter [It] should set client_body_buffer_size to 1m - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:101 @ 07/16/23 23:24:29.596
< Exit [It] should set client_body_buffer_size to 1m - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:101 @ 07/16/23 23:24:39.753 (10.192s)
> Enter [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:39.753
< Exit [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:40.161 (408ms)
+
+
+ > Enter [BeforeEach] [Shutdown] ingress controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:40.163
< Exit [BeforeEach] [Shutdown] ingress controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:48.151 (7.988s)
> Enter [BeforeEach] [Shutdown] ingress controller - /go/src/k8s.io/ingress-nginx/test/e2e/gracefulshutdown/shutdown.go:35 @ 07/16/23 23:24:48.151
< Exit [BeforeEach] [Shutdown] ingress controller - /go/src/k8s.io/ingress-nginx/test/e2e/gracefulshutdown/shutdown.go:35 @ 07/16/23 23:24:59.271 (11.12s)
> Enter [It] should shutdown in less than 60 secons without pending connections - /go/src/k8s.io/ingress-nginx/test/e2e/gracefulshutdown/shutdown.go:40 @ 07/16/23 23:24:59.271
< Exit [It] should shutdown in less than 60 secons without pending connections - /go/src/k8s.io/ingress-nginx/test/e2e/gracefulshutdown/shutdown.go:40 @ 07/16/23 23:25:10.518 (11.281s)
> Enter [AfterEach] [Shutdown] ingress controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:10.518
< Exit [AfterEach] [Shutdown] ingress controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:10.966 (448ms)
+
+
+ > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:10.967
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:18.468 (7.501s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:25:18.468
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:25:22.573 (4.105s)
> Enter [It] should ignore Ingress with a different class annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:68 @ 07/16/23 23:25:22.573
< Exit [It] should ignore Ingress with a different class annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:68 @ 07/16/23 23:25:39.828 (17.29s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:39.828
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:40.22 (391ms)
+
+
+ > Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:40.221
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:47.582 (7.361s)
> Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 07/16/23 23:25:47.582
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 07/16/23 23:25:51.699 (4.117s)
> Enter [It] [BAD_ANNOTATIONS] should allow an ingress if there is a default blocklist config in place - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:102 @ 07/16/23 23:25:51.699
< Exit [It] [BAD_ANNOTATIONS] should allow an ingress if there is a default blocklist config in place - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:102 @ 07/16/23 23:26:10.03 (18.365s)
> Enter [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:10.03
< Exit [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:10.792 (762ms)
+
+
+ > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:10.796
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:18.517 (7.721s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 07/16/23 23:26:18.517
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 07/16/23 23:26:29.612 (11.095s)
> Enter [It] should set proxy-headers-hash-max-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:68 @ 07/16/23 23:26:29.612
< Exit [It] should set proxy-headers-hash-max-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:68 @ 07/16/23 23:26:39.848 (10.27s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:39.848
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:40.318 (470ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:40.322
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:49.062 (8.74s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:26:49.062
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:26:57.227 (8.165s)
> Enter [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:372 @ 07/16/23 23:26:57.227
STEP: routing requests to the canary upstream when header is set to 'always' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:395 @ 07/16/23 23:27:14.5
STEP: routing requests to the mainline upstream when header is set to 'never' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:404 @ 07/16/23 23:27:14.506
STEP: routing requests to the mainline upstream when header is set to anything else - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:414 @ 07/16/23 23:27:14.512
< Exit [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:372 @ 07/16/23 23:27:14.518 (17.326s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:14.518
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:14.982 (464ms)
+
+
+ > Enter [BeforeEach] [Setting] proxy-next-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:14.983
< Exit [BeforeEach] [Setting] proxy-next-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:23.621 (8.637s)
> Enter [BeforeEach] [Setting] proxy-next-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_next_upstream.go:32 @ 07/16/23 23:27:23.621
< Exit [BeforeEach] [Setting] proxy-next-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_next_upstream.go:32 @ 07/16/23 23:27:27.678 (4.058s)
> Enter [It] should build proxy next upstream using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_next_upstream.go:36 @ 07/16/23 23:27:27.678
< Exit [It] should build proxy next upstream using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_next_upstream.go:36 @ 07/16/23 23:27:44.864 (17.219s)
> Enter [AfterEach] [Setting] proxy-next-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:44.864
< Exit [AfterEach] [Setting] proxy-next-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:45.355 (491ms)
+
+
+ > Enter [BeforeEach] [Annotations] default-backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:45.356
< Exit [BeforeEach] [Annotations] default-backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:54.361 (9.004s)
> Enter [BeforeEach] [Annotations] default-backend - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/default_backend.go:32 @ 07/16/23 23:27:54.361
< Exit [BeforeEach] [Annotations] default-backend - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/default_backend.go:32 @ 07/16/23 23:27:58.446 (4.085s)
> Enter [It] should use a custom default backend as upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/default_backend.go:37 @ 07/16/23 23:27:58.446
< Exit [It] should use a custom default backend as upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/default_backend.go:37 @ 07/16/23 23:28:08.662 (10.25s)
> Enter [AfterEach] [Annotations] default-backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:08.662
< Exit [AfterEach] [Annotations] default-backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:09.492 (830ms)
+
+
+ > Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:09.495
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:18.198 (8.703s)
> Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 07/16/23 23:28:18.198
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 07/16/23 23:28:20.266 (2.068s)
> Enter [It] should use fastcgi_pass in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:37 @ 07/16/23 23:28:20.266
< Exit [It] should use fastcgi_pass in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:37 @ 07/16/23 23:28:30.476 (10.21s)
> Enter [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:30.476
< Exit [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:31.049 (608ms)
+
+
+ > Enter [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:31.05
< Exit [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:39.51 (8.46s)
> Enter [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:31 @ 07/16/23 23:28:39.51
< Exit [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:31 @ 07/16/23 23:28:43.584 (4.073s)
> Enter [It] only deny explicitly denied IPs, allow all others - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:35 @ 07/16/23 23:28:43.584
STEP: sending request from an explicitly denied IP range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:61 @ 07/16/23 23:29:00.77
STEP: sending request from an explicitly denied IP address - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:69 @ 07/16/23 23:29:00.776
STEP: sending request from an implicitly allowed IP range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:77 @ 07/16/23 23:29:00.783
< Exit [It] only deny explicitly denied IPs, allow all others - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:35 @ 07/16/23 23:29:07.785 (24.235s)
> Enter [AfterEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:07.785
< Exit [AfterEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:08.219 (434ms)
+
+
+ > Enter [BeforeEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:08.222
< Exit [BeforeEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:16.588 (8.366s)
> Enter [It] should return 503 when backend service does not exist - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_backend.go:36 @ 07/16/23 23:29:16.588
< Exit [It] should return 503 when backend service does not exist - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_backend.go:36 @ 07/16/23 23:29:26.783 (10.195s)
> Enter [AfterEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:26.783
< Exit [AfterEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:27.308 (525ms)
+
+
+ > Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:27.309
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:35.546 (8.271s)
> Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 07/16/23 23:29:35.546
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 07/16/23 23:29:39.603 (4.057s)
> Enter [It] should not exists opentelemetry directive - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:47 @ 07/16/23 23:29:39.603
< Exit [It] should not exists opentelemetry directive - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:47 @ 07/16/23 23:29:56.89 (17.287s)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:56.89
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:57.255 (365ms)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 07/16/23 23:29:57.255
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 07/16/23 23:29:57.255 (0s)
+
+
+ > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:57.258
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:30:07.638 (10.419s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:30:07.638
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:30:15.827 (8.189s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:30:15.827
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 07/16/23 23:30:15.827
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 07/16/23 23:30:26.122
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 07/16/23 23:30:36.224
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:30:48.339 (32.577s)
> Enter [It] should return status code 401 when request any protected service - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:85 @ 07/16/23 23:30:48.339
STEP: Sending a request to protected service /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:87 @ 07/16/23 23:30:48.339
STEP: Sending a request to protected service /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:94 @ 07/16/23 23:30:48.391
< Exit [It] should return status code 401 when request any protected service - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:85 @ 07/16/23 23:30:48.504 (165ms)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:30:48.504
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:30:55.877 (7.373s)
+
+
+ > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:30:55.918
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:09.07 (13.19s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:31:09.07
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:31:11.17 (2.1s)
> Enter [It] should enable opentracing using datadog - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:241 @ 07/16/23 23:31:11.17
< Exit [It] should enable opentracing using datadog - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:241 @ 07/16/23 23:31:31.176 (20.041s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:31.176
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:31.616 (439ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:31:31.616
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:31:31.616 (0s)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:31.67
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:40.298 (8.628s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:31:40.298
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:31:44.4 (4.102s)
> Enter [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 07/16/23 23:31:44.402
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 07/16/23 23:31:49.602
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 07/16/23 23:31:59.831
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 07/16/23 23:32:09.984
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 07/16/23 23:32:20.215
< Exit [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 07/16/23 23:32:35.406 (51.073s)
> Enter [It] should deny login for different location on same server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:792 @ 07/16/23 23:32:35.406
STEP: receiving an internal server error without cache on location /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:811 @ 07/16/23 23:32:42.457
< Exit [It] should deny login for different location on same server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:792 @ 07/16/23 23:33:42.399 (1m7.062s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:42.4
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:42.892 (492ms)
+
+
+
+ > Enter [BeforeEach] [Security] Pod Security Policies - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:42.896
< Exit [BeforeEach] [Security] Pod Security Policies - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:51.181 (8.285s)
> Enter [It] should be running with a Pod Security Policy - /go/src/k8s.io/ingress-nginx/test/e2e/settings/pod_security_policy.go:44 @ 07/16/23 23:33:51.181
[SKIPPED] PSP not supported in this version
In [It] at: /go/src/k8s.io/ingress-nginx/test/e2e/settings/pod_security_policy.go:56 @ 07/16/23 23:33:51.184
< Exit [It] should be running with a Pod Security Policy - /go/src/k8s.io/ingress-nginx/test/e2e/settings/pod_security_policy.go:44 @ 07/16/23 23:33:51.184 (3ms)
> Enter [AfterEach] [Security] Pod Security Policies - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:51.184
< Exit [AfterEach] [Security] Pod Security Policies - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:51.664 (480ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:51.666
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:00.007 (8.341s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:34:00.007
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:34:08.102 (8.129s)
> Enter [It] should route requests to the correct upstream if the mainline ingress is modified - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:250 @ 07/16/23 23:34:08.102
STEP: routing requests destined fro the mainline ingress to the mainline upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:288 @ 07/16/23 23:34:29.661
STEP: routing requests destined for the canary ingress to the canary upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:297 @ 07/16/23 23:34:29.668
< Exit [It] should route requests to the correct upstream if the mainline ingress is modified - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:250 @ 07/16/23 23:34:29.676 (21.575s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:29.676
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:30.248 (571ms)
+
+
+ > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:30.253
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:39.68 (9.461s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:34:39.68
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:34:45.772 (6.092s)
> Enter [BeforeEach] With ingress-class-by-name flag - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:518 @ 07/16/23 23:34:45.772
< Exit [BeforeEach] With ingress-class-by-name flag - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:518 @ 07/16/23 23:34:54.823 (9.051s)
> Enter [It] should watch Ingress that uses the class name even if spec is different - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:539 @ 07/16/23 23:34:54.823
< Exit [It] should watch Ingress that uses the class name even if spec is different - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:539 @ 07/16/23 23:35:19.068 (24.279s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:19.068
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:19.459 (391ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:19.461
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:27.831 (8.37s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:35:27.831
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:35:31.866 (4.07s)
> Enter [It] should allow origin for cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:110 @ 07/16/23 23:35:31.866
< Exit [It] should allow origin for cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:110 @ 07/16/23 23:35:38.908 (7.042s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:38.908
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:39.497 (588ms)
+
+
+ > Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:39.502
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:48.362 (8.86s)
> Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 07/16/23 23:35:48.362
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 07/16/23 23:36:02.591 (14.263s)
> Enter [It] handles endpoints only changes - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:62 @ 07/16/23 23:36:02.591
< Exit [It] handles endpoints only changes - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:62 @ 07/16/23 23:36:15.012 (12.421s)
> Enter [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:15.012
< Exit [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:15.419 (407ms)
+
+
+ > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:15.421
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:22.799 (7.379s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:36:22.799
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:36:26.895 (4.096s)
> Enter [It] should exists opentracing_operation_name directive when is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:115 @ 07/16/23 23:36:26.895
< Exit [It] should exists opentracing_operation_name directive when is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:115 @ 07/16/23 23:36:44.072 (17.211s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:44.072
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:44.573 (501ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:36:44.573
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:36:44.573 (0s)
+
+
+ > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:44.575
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:52.863 (8.288s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 07/16/23 23:36:52.863
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 07/16/23 23:37:03.994 (11.165s)
> Enter [It] log-format-escape-none enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:128 @ 07/16/23 23:37:03.994
< Exit [It] log-format-escape-none enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:128 @ 07/16/23 23:37:17.209 (13.215s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:17.209
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:17.698 (489ms)
+
+
+ > Enter [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:17.7
< Exit [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:25.25 (7.55s)
> Enter [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:31 @ 07/16/23 23:37:25.25
< Exit [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:31 @ 07/16/23 23:37:29.308 (4.058s)
> Enter [It] should not add X-Forwarded-Prefix if the annotation value is empty - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:57 @ 07/16/23 23:37:29.308
< Exit [It] should not add X-Forwarded-Prefix if the annotation value is empty - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:57 @ 07/16/23 23:37:39.541 (10.267s)
> Enter [AfterEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:39.541
< Exit [AfterEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:40.249 (708ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:40.25
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:50.903 (10.653s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:37:50.903
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:37:56.972 (6.069s)
> Enter [It] should allow correct origins - missing subdomain + origin with wildcard origin and correct origin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:535 @ 07/16/23 23:37:56.972
< Exit [It] should allow correct origins - missing subdomain + origin with wildcard origin and correct origin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:535 @ 07/16/23 23:38:04.012 (7.074s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:04.012
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:04.575 (562ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:04.576
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:13.092 (8.516s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:38:13.092
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:38:21.224 (8.132s)
> Enter [It] should not use canary as a catch-all server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:863 @ 07/16/23 23:38:21.224
< Exit [It] should not use canary as a catch-all server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:863 @ 07/16/23 23:38:38.446 (17.256s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:38.446
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:38.972 (525ms)
+
+
+ > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:38.973
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:47.576 (8.603s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 07/16/23 23:38:47.576
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 07/16/23 23:39:00.694 (13.151s)
> Enter [It] should disable the log-format-escape-none - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:71 @ 07/16/23 23:39:00.694
< Exit [It] should disable the log-format-escape-none - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:71 @ 07/16/23 23:39:10.972 (10.278s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:10.972
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:11.554 (582ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:11.557
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:21.757 (10.2s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:39:21.757
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:39:25.828 (4.071s)
> Enter [It] should set cors methods to only allow POST, GET - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:62 @ 07/16/23 23:39:25.828
< Exit [It] should set cors methods to only allow POST, GET - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:62 @ 07/16/23 23:39:35.962 (10.168s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:35.962
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:36.474 (511ms)
+
+
+ > Enter [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:36.475
< Exit [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:45.251 (8.776s)
> Enter [It] should be enabled with default settings - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:39 @ 07/16/23 23:39:45.251
< Exit [It] should be enabled with default settings - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:39 @ 07/16/23 23:39:55.449 (10.198s)
> Enter [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:55.449
< Exit [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:55.846 (396ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:55.848
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:04.392 (8.579s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:40:04.392
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:40:12.535 (8.142s)
> Enter [It] should expose headers for cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:153 @ 07/16/23 23:40:12.535
< Exit [It] should expose headers for cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:153 @ 07/16/23 23:40:22.872 (10.337s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:22.872
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:23.35 (478ms)
+
+
+ > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:23.353
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:31.723 (8.405s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:40:31.724
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:40:35.786 (4.063s)
> Enter [It] should ignore Ingress without IngressClass configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:164 @ 07/16/23 23:40:35.786
< Exit [It] should ignore Ingress without IngressClass configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:164 @ 07/16/23 23:40:53.138 (17.352s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:53.138
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:54.07 (932ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:54.097
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:41:02.625 (8.562s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 07/16/23 23:41:02.625
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 07/16/23 23:41:06.715 (4.09s)
> Enter [It] should 302 redirect to error page instead of 400 when auth-tls-error-page is set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:114 @ 07/16/23 23:41:06.715
< Exit [It] should 302 redirect to error page instead of 400 when auth-tls-error-page is set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:114 @ 07/16/23 23:41:20.837 (14.122s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:20.837
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:21.278 (441ms)
+
+
+ > Enter [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:41:21.3
< Exit [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:41:29.247 (7.948s)
> Enter [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:32 @ 07/16/23 23:41:29.248
< Exit [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:32 @ 07/16/23 23:41:31.27 (2.057s)
> Enter [It] should set valid proxy read timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:36 @ 07/16/23 23:41:31.27
< Exit [It] should set valid proxy read timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:36 @ 07/16/23 23:41:48.597 (17.327s)
> Enter [AfterEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:48.597
< Exit [AfterEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:48.993 (395ms)
+
+
+ > Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:07:34.242
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:07:51.069 (16.827s)
> Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 07/16/23 23:07:51.069
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 07/16/23 23:08:07.17 (16.135s)
> Enter [It] should set client_body_buffer_size to 1M - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:123 @ 07/16/23 23:08:07.17
< Exit [It] should set client_body_buffer_size to 1M - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:123 @ 07/16/23 23:08:18.073 (10.903s)
> Enter [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:18.073
< Exit [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:21.927 (3.855s)
+
+
+ > Enter [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:21.964
< Exit [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:34.164 (12.234s)
> Enter [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:31 @ 07/16/23 23:08:34.164
< Exit [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:31 @ 07/16/23 23:08:38.275 (4.111s)
> Enter [It] disable-access-log set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:35 @ 07/16/23 23:08:38.275
< Exit [It] disable-access-log set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:35 @ 07/16/23 23:08:55.61 (17.335s)
> Enter [AfterEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:55.61
< Exit [AfterEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:56.065 (455ms)
+
+
+ > Enter [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:56.067
< Exit [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:04.727 (8.695s)
> Enter [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:42 @ 07/16/23 23:09:04.727
< Exit [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:42 @ 07/16/23 23:09:15.337 (10.61s)
> Enter [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:15.337
< Exit [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:16.059 (722ms)
+
+
+ > Enter [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:16.064
< Exit [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:26.631 (10.567s)
> Enter [It] should set gzip_disable to msie6 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:67 @ 07/16/23 23:09:26.631
< Exit [It] should set gzip_disable to msie6 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:67 @ 07/16/23 23:09:43.812 (17.216s)
> Enter [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:43.816
< Exit [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:44.481 (664ms)
+
+
+ > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:44.483
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:52.854 (8.371s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 07/16/23 23:09:52.854
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 07/16/23 23:09:56.947 (4.093s)
> Enter [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 07/16/23 23:09:56.947
STEP: configuring certificate_by_lua and skipping Nginx configuration of the new certificate - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:128 @ 07/16/23 23:10:14.472
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:136 @ 07/16/23 23:10:22.717
< Exit [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 07/16/23 23:10:22.74 (25.827s)
> Enter [It] removes HTTPS configuration when we delete TLS spec - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:233 @ 07/16/23 23:10:22.74
< Exit [It] removes HTTPS configuration when we delete TLS spec - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:233 @ 07/16/23 23:10:27.764 (5.024s)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:27.764
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:28.249 (485ms)
+
+
+ > Enter [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:28.252
< Exit [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:36.867 (8.65s)
> Enter [It] should set gzip_types to application/javascript - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:89 @ 07/16/23 23:10:36.867
< Exit [It] should set gzip_types to application/javascript - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:89 @ 07/16/23 23:10:54.131 (17.264s)
> Enter [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:54.131
< Exit [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:54.62 (489ms)
+
+
+ > Enter [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:54.623
< Exit [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:11:02.922 (8.355s)
> Enter [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:31 @ 07/16/23 23:11:02.922
< Exit [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:31 @ 07/16/23 23:11:07.043 (4.12s)
> Enter [It] drops server snippet if disabled by the administrator - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:61 @ 07/16/23 23:11:07.043
< Exit [It] drops server snippet if disabled by the administrator - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:61 @ 07/16/23 23:11:36.273 (29.286s)
> Enter [AfterEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:11:36.273
< Exit [AfterEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:11:36.734 (462ms)
+
+
+ > Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:11:36.736
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:11:45.28 (8.543s)
> Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 07/16/23 23:11:45.28
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 07/16/23 23:11:49.471 (4.191s)
> Enter [It] should set client_body_buffer_size to 1000 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:35 @ 07/16/23 23:11:49.471
< Exit [It] should set client_body_buffer_size to 1000 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:35 @ 07/16/23 23:11:59.696 (10.224s)
> Enter [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:11:59.696
< Exit [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:00.22 (525ms)
+
+
+ > Enter [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:00.222
< Exit [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:07.673 (7.488s)
> Enter [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:32 @ 07/16/23 23:12:07.673
< Exit [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:32 @ 07/16/23 23:12:11.802 (4.129s)
> Enter [It] should set valid proxy timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:36 @ 07/16/23 23:12:11.802
< Exit [It] should set valid proxy timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:36 @ 07/16/23 23:12:29.118 (17.317s)
> Enter [AfterEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:29.119
< Exit [AfterEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:29.598 (479ms)
+
+
+ > Enter [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:29.6
< Exit [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:38.338 (8.773s)
> Enter [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:33 @ 07/16/23 23:12:38.338
< Exit [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:33 @ 07/16/23 23:12:42.421 (4.083s)
> Enter [It] should get information for a specific backend server - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:56 @ 07/16/23 23:12:42.421
< Exit [It] should get information for a specific backend server - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:56 @ 07/16/23 23:12:53.144 (10.723s)
> Enter [AfterEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:53.144
< Exit [AfterEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:53.923 (779ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:53.953
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:02.253 (8.335s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:13:02.254
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:13:06.383 (4.13s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:13:06.383
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:13:20.773 (14.39s)
> Enter [It] should return status code 200 when signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:485 @ 07/16/23 23:13:20.773
< Exit [It] should return status code 200 when signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:485 @ 07/16/23 23:13:20.8 (27ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:20.8
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:21.451 (651ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:21.454
< Exit [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:32.274 (10.854s)
> Enter [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:43 @ 07/16/23 23:13:32.274
< Exit [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:43 @ 07/16/23 23:13:51.868 (19.594s)
> Enter [It] should return status code 200 when accessing '/noauth' unauthenticated - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:82 @ 07/16/23 23:13:51.868
< Exit [It] should return status code 200 when accessing '/noauth' unauthenticated - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:82 @ 07/16/23 23:13:55.053 (3.185s)
> Enter [AfterEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:55.053
< Exit [AfterEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:55.451 (398ms)
+
+
+ > Enter [BeforeEach] [Annotations] force-ssl-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:55.453
< Exit [BeforeEach] [Annotations] force-ssl-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:03.927 (8.508s)
> Enter [BeforeEach] [Annotations] force-ssl-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/forcesslredirect.go:30 @ 07/16/23 23:14:03.927
< Exit [BeforeEach] [Annotations] force-ssl-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/forcesslredirect.go:30 @ 07/16/23 23:14:08.019 (4.092s)
> Enter [It] should redirect to https - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/forcesslredirect.go:34 @ 07/16/23 23:14:08.019
< Exit [It] should redirect to https - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/forcesslredirect.go:34 @ 07/16/23 23:14:15.059 (7.04s)
> Enter [AfterEach] [Annotations] force-ssl-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:15.059
< Exit [AfterEach] [Annotations] force-ssl-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:15.545 (486ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:15.546
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:25.303 (9.757s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:14:25.303
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:14:31.39 (6.086s)
> Enter [It] should allow - matching origin with wildcard origin (2 subdomains) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:425 @ 07/16/23 23:14:31.39
< Exit [It] should allow - matching origin with wildcard origin (2 subdomains) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:425 @ 07/16/23 23:14:38.906 (7.55s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:38.906
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:50.983 (12.078s)
+
+
+ > Enter [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:51.107
< Exit [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:05.828 (14.755s)
> Enter [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:42 @ 07/16/23 23:15:05.828
< Exit [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:42 @ 07/16/23 23:15:05.835 (7ms)
> Enter [It] should reload after an update in the configuration - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:169 @ 07/16/23 23:15:05.835
STEP: setting up a first deployment - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:171 @ 07/16/23 23:15:05.835
STEP: updating the tcp service to a second deployment - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:196 @ 07/16/23 23:15:13.198
< Exit [It] should reload after an update in the configuration - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:169 @ 07/16/23 23:15:23.493 (17.658s)
> Enter [AfterEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:23.493
< Exit [AfterEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:23.916 (423ms)
+
+
+ > Enter [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:23.918
< Exit [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:32.462 (8.579s)
> Enter [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:31 @ 07/16/23 23:15:32.462
< Exit [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:31 @ 07/16/23 23:15:36.539 (4.076s)
> Enter [It] should add global server-snippet and drop annotations per admin config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:92 @ 07/16/23 23:15:36.539
< Exit [It] should add global server-snippet and drop annotations per admin config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:92 @ 07/16/23 23:16:08.955 (32.451s)
> Enter [AfterEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:08.955
< Exit [AfterEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:09.389 (434ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:09.392
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:17.757 (8.366s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:16:17.757
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:16:21.842 (4.084s)
> Enter [It] should not allow - single origin with port and origin without port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:386 @ 07/16/23 23:16:21.842
< Exit [It] should not allow - single origin with port and origin without port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:386 @ 07/16/23 23:16:28.878 (7.036s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:28.878
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:29.277 (399ms)
+
+
+ > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:29.279
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:36.677 (7.433s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:16:36.678
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:16:40.761 (4.083s)
> Enter [It] should set cookie with domain - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:225 @ 07/16/23 23:16:40.761
< Exit [It] should set cookie with domain - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:225 @ 07/16/23 23:16:50.994 (10.233s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:50.994
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:51.379 (385ms)
+
+
+ > Enter [BeforeEach] [Setting] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:51.381
< Exit [BeforeEach] [Setting] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:59.709 (8.329s)
> Enter [It] Add ssl ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_ciphers.go:31 @ 07/16/23 23:16:59.71
< Exit [It] Add ssl ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_ciphers.go:31 @ 07/16/23 23:17:09.861 (10.185s)
> Enter [AfterEach] [Setting] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:09.861
< Exit [AfterEach] [Setting] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:10.282 (421ms)
+
+
+ > Enter [BeforeEach] [Ingress] [PathType] exact - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:10.283
< Exit [BeforeEach] [Ingress] [PathType] exact - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:18.723 (8.44s)
> Enter [BeforeEach] [Ingress] [PathType] exact - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_exact.go:33 @ 07/16/23 23:17:18.724
< Exit [BeforeEach] [Ingress] [PathType] exact - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_exact.go:33 @ 07/16/23 23:17:22.807 (4.083s)
> Enter [It] should choose exact location for /exact - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_exact.go:37 @ 07/16/23 23:17:22.807
< Exit [It] should choose exact location for /exact - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_exact.go:37 @ 07/16/23 23:17:50.668 (27.896s)
> Enter [AfterEach] [Ingress] [PathType] exact - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:50.668
< Exit [AfterEach] [Ingress] [PathType] exact - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:51.179 (511ms)
+
+
+ > Enter [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:51.181
< Exit [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:59.818 (8.637s)
> Enter [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:31 @ 07/16/23 23:17:59.819
< Exit [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:31 @ 07/16/23 23:18:03.954 (4.169s)
> Enter [It] should add value of server-snippet setting to all ingress config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:35 @ 07/16/23 23:18:03.954
< Exit [It] should add value of server-snippet setting to all ingress config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:35 @ 07/16/23 23:18:36.609 (32.69s)
> Enter [AfterEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:36.609
< Exit [AfterEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:37.003 (394ms)
+
+
+ > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:37.005
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:45.497 (8.492s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 07/16/23 23:18:45.497
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 07/16/23 23:18:56.635 (11.138s)
> Enter [It] should enable the log-format-escape-json - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:47 @ 07/16/23 23:18:56.635
< Exit [It] should enable the log-format-escape-json - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:47 @ 07/16/23 23:19:06.818 (10.218s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:06.819
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:07.2 (381ms)
+
+
+ > Enter [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:07.202
< Exit [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:15.79 (8.588s)
> Enter [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:31 @ 07/16/23 23:19:15.79
< Exit [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:31 @ 07/16/23 23:19:19.867 (4.077s)
> Enter [It] add valid directives to server via server snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:35 @ 07/16/23 23:19:19.867
< Exit [It] add valid directives to server via server snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:35 @ 07/16/23 23:19:30.126 (10.259s)
> Enter [AfterEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:30.126
< Exit [AfterEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:30.554 (428ms)
+
+
+ > Enter [BeforeEach] [Ingress] [PathType] prefix checks - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:30.555
< Exit [BeforeEach] [Ingress] [PathType] prefix checks - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:38.942 (8.421s)
> Enter [BeforeEach] [Ingress] [PathType] prefix checks - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_prefix.go:31 @ 07/16/23 23:19:38.942
< Exit [BeforeEach] [Ingress] [PathType] prefix checks - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_prefix.go:31 @ 07/16/23 23:19:43.029 (4.087s)
> Enter [It] should return 404 when prefix /aaa does not match request /aaaccc - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_prefix.go:35 @ 07/16/23 23:19:43.029
< Exit [It] should return 404 when prefix /aaa does not match request /aaaccc - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_prefix.go:35 @ 07/16/23 23:19:53.271 (10.241s)
> Enter [AfterEach] [Ingress] [PathType] prefix checks - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:53.271
< Exit [AfterEach] [Ingress] [PathType] prefix checks - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:53.823 (553ms)
+
+
+ > Enter [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:53.836
< Exit [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:02.051 (8.25s)
> Enter [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:34 @ 07/16/23 23:20:02.051
< Exit [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:34 @ 07/16/23 23:20:06.14 (4.089s)
> Enter [It] should not exists Server header in the response - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:38 @ 07/16/23 23:20:06.14
< Exit [It] should not exists Server header in the response - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:38 @ 07/16/23 23:20:23.477 (17.337s)
> Enter [AfterEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:23.477
< Exit [AfterEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:23.967 (489ms)
+
+
+ > Enter [BeforeEach] [Default Backend] custom service - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:23.968
< Exit [BeforeEach] [Default Backend] custom service - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:32.478 (8.544s)
> Enter [It] uses custom default backend that returns 200 as status code - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/custom_default_backend.go:36 @ 07/16/23 23:20:32.478
< Exit [It] uses custom default backend that returns 200 as status code - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/custom_default_backend.go:36 @ 07/16/23 23:20:48.821 (16.343s)
> Enter [AfterEach] [Default Backend] custom service - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:48.821
< Exit [AfterEach] [Default Backend] custom service - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:49.341 (520ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:49.348
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:57.865 (8.517s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 07/16/23 23:20:57.865
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 07/16/23 23:21:01.925 (4.094s)
> Enter [It] should return 403 using auth-tls-match-cn with no matching CN from client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:266 @ 07/16/23 23:21:01.925
< Exit [It] should return 403 using auth-tls-match-cn with no matching CN from client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:266 @ 07/16/23 23:21:13.025 (11.101s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:13.025
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:13.59 (565ms)
+
+
+ > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:13.591
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:23.49 (9.898s)
> Enter [It] should return 200 for service type=ExternalName using FQDN with trailing dot - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:217 @ 07/16/23 23:21:23.49
< Exit [It] should return 200 for service type=ExternalName using FQDN with trailing dot - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:217 @ 07/16/23 23:21:33.747 (10.292s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:33.747
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:34.172 (424ms)
+
+
+ > Enter [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:34.173
< Exit [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:43.009 (8.836s)
> Enter [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:32 @ 07/16/23 23:21:43.009
< Exit [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:32 @ 07/16/23 23:21:47.1 (4.091s)
> Enter [It] should not set invalid proxy read timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:52 @ 07/16/23 23:21:47.1
< Exit [It] should not set invalid proxy read timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:52 @ 07/16/23 23:22:04.345 (17.279s)
> Enter [AfterEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:04.345
< Exit [AfterEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:04.959 (614ms)
+
+
+ > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:04.961
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:13.436 (8.476s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:22:13.436
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:22:17.548 (4.111s)
> Enter [It] should set cookie with expires - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:194 @ 07/16/23 23:22:17.548
< Exit [It] should set cookie with expires - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:194 @ 07/16/23 23:22:27.746 (10.199s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:27.746
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:28.164 (417ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:28.165
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:36.999 (8.868s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:22:36.999
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:22:41.09 (4.09s)
> Enter [It] should not set snippet "proxy_set_header My-Custom-Header 42;" when external auth is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:284 @ 07/16/23 23:22:41.09
< Exit [It] should not set snippet "proxy_set_header My-Custom-Header 42;" when external auth is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:284 @ 07/16/23 23:22:51.266 (10.177s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:51.266
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:51.761 (495ms)
+
+
+ > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:51.771
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:00.105 (8.333s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:23:00.105
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:23:04.146 (4.075s)
> Enter [It] should not exists opentracing directive - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:58 @ 07/16/23 23:23:04.146
< Exit [It] should not exists opentracing directive - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:58 @ 07/16/23 23:23:21.518 (17.372s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:21.518
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:21.932 (414ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:23:21.932
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:23:21.932 (0s)
+
+
+ > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:21.935
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:31.384 (9.483s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:23:31.384
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:23:35.475 (4.091s)
> Enter [It] should enable opentracing using jaeger with sampler host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:184 @ 07/16/23 23:23:35.475
< Exit [It] should enable opentracing using jaeger with sampler host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:184 @ 07/16/23 23:23:55.524 (20.049s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:55.524
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:56.075 (551ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:23:56.075
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:23:56.075 (0s)
+
+
+ > Enter [BeforeEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:56.077
< Exit [BeforeEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:04.518 (8.476s)
> Enter [It] should set ingress details variables for ingresses with host without IngressRuleValue, only Backend - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/without_host.go:55 @ 07/16/23 23:24:04.518
< Exit [It] should set ingress details variables for ingresses with host without IngressRuleValue, only Backend - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/without_host.go:55 @ 07/16/23 23:24:18.775 (14.257s)
> Enter [AfterEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:18.775
< Exit [AfterEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:19.228 (452ms)
+
+
+ > Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:19.229
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:27.5 (8.272s)
> Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 07/16/23 23:24:27.501
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 07/16/23 23:24:31.562 (4.096s)
> Enter [It] should set backend protocol to '' and use fastcgi_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:94 @ 07/16/23 23:24:31.562
< Exit [It] should set backend protocol to '' and use fastcgi_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:94 @ 07/16/23 23:24:42.129 (10.566s)
> Enter [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:42.129
< Exit [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:42.874 (745ms)
+
+
+ > Enter [BeforeEach] [Security] request smuggling - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:42.875
< Exit [BeforeEach] [Security] request smuggling - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:51.845 (8.97s)
> Enter [BeforeEach] [Security] request smuggling - /go/src/k8s.io/ingress-nginx/test/e2e/security/request_smuggling.go:35 @ 07/16/23 23:24:51.845
< Exit [BeforeEach] [Security] request smuggling - /go/src/k8s.io/ingress-nginx/test/e2e/security/request_smuggling.go:35 @ 07/16/23 23:24:55.921 (4.076s)
> Enter [It] should not return body content from error_page - /go/src/k8s.io/ingress-nginx/test/e2e/security/request_smuggling.go:39 @ 07/16/23 23:24:55.921
< Exit [It] should not return body content from error_page - /go/src/k8s.io/ingress-nginx/test/e2e/security/request_smuggling.go:39 @ 07/16/23 23:25:18.165 (22.279s)
> Enter [AfterEach] [Security] request smuggling - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:18.165
< Exit [AfterEach] [Security] request smuggling - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:18.624 (459ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:18.626
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:26.989 (8.37s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:25:26.996
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:25:31.086 (4.091s)
> Enter [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:383 @ 07/16/23 23:25:31.087
< Exit [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:383 @ 07/16/23 23:25:52.393 (21.341s)
> Enter [It] user does not retain cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:422 @ 07/16/23 23:25:52.393
< Exit [It] user does not retain cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:422 @ 07/16/23 23:25:52.403 (10ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:52.403
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:52.851 (448ms)
+
+
+ > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:52.853
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:01.147 (8.328s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 07/16/23 23:26:01.147
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 07/16/23 23:26:05.234 (4.087s)
> Enter [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 07/16/23 23:26:05.234
STEP: configuring certificate_by_lua and skipping Nginx configuration of the new certificate - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:128 @ 07/16/23 23:26:22.995
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:136 @ 07/16/23 23:26:31.133
< Exit [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 07/16/23 23:26:31.179 (25.98s)
> Enter [It] picks up a non-certificate only change - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:218 @ 07/16/23 23:26:31.179
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:229 @ 07/16/23 23:26:36.206
< Exit [It] picks up a non-certificate only change - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:218 @ 07/16/23 23:26:36.237 (5.058s)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:36.237
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:37.018 (782ms)
+
+
+ > Enter [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:37.021
< Exit [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:45.616 (8.596s)
> Enter [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:31 @ 07/16/23 23:26:45.616
< Exit [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:31 @ 07/16/23 23:26:49.683 (4.066s)
> Enter [It] disable-stream-access-log set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:71 @ 07/16/23 23:26:49.683
< Exit [It] disable-stream-access-log set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:71 @ 07/16/23 23:27:06.949 (17.301s)
> Enter [AfterEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:06.949
< Exit [AfterEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:07.445 (496ms)
+
+
+ > Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:07.447
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:15.777 (8.33s)
> Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 07/16/23 23:27:15.778
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 07/16/23 23:27:30.909 (15.132s)
> Enter [It] should delete Ingress updated to catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:81 @ 07/16/23 23:27:30.909
< Exit [It] should delete Ingress updated to catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:81 @ 07/16/23 23:27:45.291 (14.415s)
> Enter [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:45.291
< Exit [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:45.766 (475ms)
+
+
+ > Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:45.767
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:54.396 (8.629s)
> Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 07/16/23 23:27:54.396
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 07/16/23 23:27:58.524 (4.127s)
> Enter [It] should set client_body_buffer_size to 1k - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:79 @ 07/16/23 23:27:58.524
< Exit [It] should set client_body_buffer_size to 1k - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:79 @ 07/16/23 23:28:08.725 (10.235s)
> Enter [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:08.725
< Exit [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:09.625 (900ms)
+
+
+ > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:09.63
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:17.428 (7.798s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:28:17.428
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:28:21.486 (4.058s)
> Enter [It] should work with server-alias annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:372 @ 07/16/23 23:28:21.486
< Exit [It] should work with server-alias annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:372 @ 07/16/23 23:28:31.88 (10.429s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:31.88
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:32.319 (438ms)
+
+
+ > Enter [BeforeEach] [Default Backend] SSL - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:32.324
< Exit [BeforeEach] [Default Backend] SSL - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:41.907 (9.584s)
> Enter [It] should return a self generated SSL certificate - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/ssl.go:29 @ 07/16/23 23:28:41.907
STEP: checking SSL Certificate using the NGINX IP address - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/ssl.go:30 @ 07/16/23 23:28:41.908
STEP: checking SSL Certificate using the NGINX catch all server - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/ssl.go:45 @ 07/16/23 23:28:46.925
< Exit [It] should return a self generated SSL certificate - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/ssl.go:29 @ 07/16/23 23:28:46.943 (5.036s)
> Enter [AfterEach] [Default Backend] SSL - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:46.943
< Exit [AfterEach] [Default Backend] SSL - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:47.34 (397ms)
+
+
+ > Enter [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:47.341
< Exit [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:55.857 (8.516s)
> Enter [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:34 @ 07/16/23 23:28:55.857
< Exit [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:34 @ 07/16/23 23:28:59.917 (4.06s)
> Enter [It] should exists Server header in the response when is enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:50 @ 07/16/23 23:28:59.917
< Exit [It] should exists Server header in the response when is enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:50 @ 07/16/23 23:29:17.172 (17.289s)
> Enter [AfterEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:17.172
< Exit [AfterEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:17.73 (558ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] modsecurity-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:17.734
< Exit [BeforeEach] [Setting] [Security] modsecurity-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:26.783 (9.049s)
> Enter [It] should add value of modsecurity-snippet setting to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/modsecurity/modsecurity_snippet.go:30 @ 07/16/23 23:29:26.783
< Exit [It] should add value of modsecurity-snippet setting to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/modsecurity/modsecurity_snippet.go:30 @ 07/16/23 23:29:37.377 (10.63s)
> Enter [AfterEach] [Setting] [Security] modsecurity-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:37.377
< Exit [AfterEach] [Setting] [Security] modsecurity-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:37.857 (480ms)
+
+
+ > Enter [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:37.859
< Exit [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:45.315 (7.456s)
> Enter [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:30 @ 07/16/23 23:29:45.315
< Exit [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:30 @ 07/16/23 23:29:49.393 (4.078s)
> Enter [It] set rewrite_log on - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:49 @ 07/16/23 23:29:49.393
< Exit [It] set rewrite_log on - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:49 @ 07/16/23 23:29:59.716 (10.323s)
> Enter [AfterEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:59.716
< Exit [AfterEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:30:00.218 (501ms)
+
+
+ > Enter [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:30:00.22
< Exit [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:30:08.82 (8.64s)
> Enter [It] should return OK for service with backend protocol GRPCS - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:199 @ 07/16/23 23:30:08.82
< Exit [It] should return OK for service with backend protocol GRPCS - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:199 @ 07/16/23 23:30:23.242 (14.421s)
> Enter [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:30:23.242
< Exit [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:30:23.721 (479ms)
+
+
+ > Enter [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:30:23.724
< Exit [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:30:32.155 (8.497s)
> Enter [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:37 @ 07/16/23 23:30:32.155
< Exit [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:37 @ 07/16/23 23:30:36.238 (4.083s)
> Enter [It] should add stream-snippet and drop annotations per admin config - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:85 @ 07/16/23 23:30:36.238
< Exit [It] should add stream-snippet and drop annotations per admin config - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:85 @ 07/16/23 23:31:06.15 (29.95s)
> Enter [AfterEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:06.15
< Exit [AfterEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:06.581 (431ms)
+
+
+ > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:06.583
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:15.201 (8.619s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:31:15.201
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:31:19.262 (4.061s)
> Enter [It] should set sticky cookie without host - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:352 @ 07/16/23 23:31:19.262
< Exit [It] should set sticky cookie without host - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:352 @ 07/16/23 23:31:29.469 (10.206s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:29.469
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:29.882 (413ms)
+
+
+ > Enter [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:29.885
< Exit [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:40.12 (10.27s)
> Enter [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:31 @ 07/16/23 23:31:40.12
< Exit [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:31 @ 07/16/23 23:31:44.185 (4.066s)
> Enter [It] set snippet "more_set_headers "Foo1: Bar1";" in all locations" - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:35 @ 07/16/23 23:31:44.185
< Exit [It] set snippet "more_set_headers "Foo1: Bar1";" in all locations" - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:35 @ 07/16/23 23:31:54.361 (10.176s)
> Enter [AfterEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:54.361
< Exit [AfterEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:54.803 (442ms)
+
+
+ > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:54.805
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:03.07 (8.3s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:32:03.07
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:32:07.143 (4.072s)
> Enter [It] should enable opentracing using jaeger - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:172 @ 07/16/23 23:32:07.143
< Exit [It] should enable opentracing using jaeger - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:172 @ 07/16/23 23:32:27.197 (20.054s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:27.197
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:27.565 (368ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:32:27.565
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:32:27.565 (0s)
+
+
+ > Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:27.566
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:35.926 (8.394s)
> Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 07/16/23 23:32:35.926
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 07/16/23 23:32:40.026 (4.1s)
> Enter [It] should set backend protocol to '' and use ajp_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:109 @ 07/16/23 23:32:40.026
< Exit [It] should set backend protocol to '' and use ajp_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:109 @ 07/16/23 23:32:50.274 (10.248s)
> Enter [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:50.274
< Exit [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:50.832 (558ms)
+
+
+ > Enter [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:50.833
< Exit [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:59.336 (8.503s)
> Enter [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:35 @ 07/16/23 23:32:59.336
< Exit [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:35 @ 07/16/23 23:33:10.405 (11.103s)
> Enter [It] should trust X-Forwarded headers when setting is true - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:40 @ 07/16/23 23:33:10.405
STEP: ensuring single values are parsed correctly - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:54 @ 07/16/23 23:33:27.663
STEP: ensuring that first entry in X-Forwarded-Host is used as the best host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:75 @ 07/16/23 23:33:27.674
< Exit [It] should trust X-Forwarded headers when setting is true - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:40 @ 07/16/23 23:33:27.683 (17.278s)
> Enter [AfterEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:27.683
< Exit [AfterEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:28.126 (443ms)
+
+
+ > Enter [BeforeEach] [Endpointslices] long service name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:28.128
< Exit [BeforeEach] [Endpointslices] long service name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:35.418 (7.324s)
> Enter [BeforeEach] [Endpointslices] long service name - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/longname.go:34 @ 07/16/23 23:33:35.418
< Exit [BeforeEach] [Endpointslices] long service name - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/longname.go:34 @ 07/16/23 23:33:39.517 (4.099s)
> Enter [It] should return 200 when service name has max allowed number of characters 63 - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/longname.go:38 @ 07/16/23 23:33:39.517
STEP: checking if the service is reached - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/longname.go:48 @ 07/16/23 23:33:49.731
< Exit [It] should return 200 when service name has max allowed number of characters 63 - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/longname.go:38 @ 07/16/23 23:33:49.739 (10.222s)
> Enter [AfterEach] [Endpointslices] long service name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:49.739
< Exit [AfterEach] [Endpointslices] long service name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:50.184 (444ms)
+
+
+ > Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:50.185
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:58.583 (8.398s)
> Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 07/16/23 23:33:58.583
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 07/16/23 23:34:02.597 (4.049s)
> Enter [It] should set valid proxy-ssl-secret, proxy-ssl-ciphers to HIGH:!AES - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:94 @ 07/16/23 23:34:02.598
< Exit [It] should set valid proxy-ssl-secret, proxy-ssl-ciphers to HIGH:!AES - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:94 @ 07/16/23 23:34:13.497 (10.899s)
> Enter [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:13.497
< Exit [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:13.905 (409ms)
+
+
+ > Enter [BeforeEach] [Setting] main-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:13.907
< Exit [BeforeEach] [Setting] main-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:22.216 (8.309s)
> Enter [It] should add value of main-snippet setting to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/main_snippet.go:31 @ 07/16/23 23:34:22.216
< Exit [It] should add value of main-snippet setting to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/main_snippet.go:31 @ 07/16/23 23:34:32.368 (10.187s)
> Enter [AfterEach] [Setting] main-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:32.368
< Exit [AfterEach] [Setting] main-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:32.925 (557ms)
+
+
+ > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:32.927
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:41.551 (8.624s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 07/16/23 23:34:41.551
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 07/16/23 23:34:47.637 (6.086s)
> Enter [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 07/16/23 23:34:47.637
< Exit [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 07/16/23 23:34:57.01 (9.372s)
> Enter [It] overriding what's set from the upstream - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:166 @ 07/16/23 23:34:57.01
< Exit [It] overriding what's set from the upstream - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:166 @ 07/16/23 23:35:04.275 (7.3s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:04.275
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:04.736 (461ms)
+
+
+ > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:04.742
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:14.56 (9.817s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:35:14.56
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:35:18.617 (4.057s)
> Enter [It] should disable modsecurity - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:74 @ 07/16/23 23:35:18.617
< Exit [It] should disable modsecurity - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:74 @ 07/16/23 23:35:28.832 (10.214s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:28.832
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:29.223 (392ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:29.225
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:38.691 (9.501s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 07/16/23 23:35:38.692
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 07/16/23 23:35:42.8 (4.108s)
> Enter [It] should set valid auth-tls-secret, sslVerify to off, and sslVerifyDepth to 2 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:84 @ 07/16/23 23:35:42.8
< Exit [It] should set valid auth-tls-secret, sslVerify to off, and sslVerifyDepth to 2 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:84 @ 07/16/23 23:35:53.62 (10.82s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:53.62
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:54.081 (461ms)
+
+
+ > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:54.084
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:03.891 (9.841s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:36:03.891
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:36:09.979 (6.088s)
> Enter [It] should change cookie name on ingress definition change - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:64 @ 07/16/23 23:36:09.979
< Exit [It] should change cookie name on ingress definition change - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:64 @ 07/16/23 23:36:25.241 (15.261s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:25.241
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:25.701 (460ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:25.703
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:33.605 (7.936s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:36:33.605
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:36:37.682 (4.077s)
> Enter [It] should enable cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:35 @ 07/16/23 23:36:37.682
< Exit [It] should enable cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:35 @ 07/16/23 23:36:47.901 (10.219s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:47.901
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:48.375 (474ms)
+
+
+ > Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:48.376
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:56.928 (8.552s)
> Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 07/16/23 23:36:56.928
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 07/16/23 23:37:03.013 (6.119s)
> Enter [It] should set valid proxy-ssl-secret, proxy-ssl-protocols - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:122 @ 07/16/23 23:37:03.013
< Exit [It] should set valid proxy-ssl-secret, proxy-ssl-protocols - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:122 @ 07/16/23 23:37:14.194 (11.181s)
> Enter [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:14.194
< Exit [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:14.663 (469ms)
+
+
+ > Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:14.665
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:22.951 (8.286s)
> Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 07/16/23 23:37:22.951
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 07/16/23 23:37:27.087 (4.136s)
> Enter [It] should set client_body_buffer_size to 1K - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:57 @ 07/16/23 23:37:27.087
< Exit [It] should set client_body_buffer_size to 1K - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:57 @ 07/16/23 23:37:37.286 (10.233s)
> Enter [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:37.286
< Exit [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:37.719 (433ms)
+
+
+ > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:37.721
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:47.137 (9.416s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:37:47.137
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:37:51.362 (4.225s)
> Enter [It] should enable modsecurity with snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:91 @ 07/16/23 23:37:51.362
< Exit [It] should enable modsecurity with snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:91 @ 07/16/23 23:38:01.535 (10.206s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:01.535
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:02.216 (682ms)
+
+
+ > Enter [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:02.219
< Exit [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:09.728 (7.509s)
> Enter [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:32 @ 07/16/23 23:38:09.729
< Exit [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:32 @ 07/16/23 23:38:13.797 (4.069s)
> Enter [It] should not set invalid proxy timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:52 @ 07/16/23 23:38:13.797
< Exit [It] should not set invalid proxy timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:52 @ 07/16/23 23:38:31.175 (17.412s)
> Enter [AfterEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:31.175
< Exit [AfterEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:31.552 (376ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:31.553
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:40.919 (9.366s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:38:40.919
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:38:46.993 (6.074s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:38:46.993
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:39:03.307 (16.348s)
> Enter [It] should not create additional upstream block when auth-keepalive is set with HTTP/2 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:609 @ 07/16/23 23:39:03.307
< Exit [It] should not create additional upstream block when auth-keepalive is set with HTTP/2 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:609 @ 07/16/23 23:39:07.472 (4.165s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:07.472
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:08.148 (676ms)
+
+
+ > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:08.153
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:16.57 (8.417s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:39:16.57
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:39:22.657 (6.087s)
> Enter [It] should set the path to /something on the generated cookie - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:99 @ 07/16/23 23:39:22.657
< Exit [It] should set the path to /something on the generated cookie - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:99 @ 07/16/23 23:39:32.838 (10.215s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:32.838
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:33.231 (394ms)
+
+
+ > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:33.235
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:40.596 (7.361s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 07/16/23 23:39:40.596
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 07/16/23 23:39:44.718 (4.122s)
> Enter [It] should not use ports or X-Forwarded-Host during the HTTP to HTTPS redirection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:205 @ 07/16/23 23:39:44.718
Jul 16 23:40:00.953: INFO: Unexpected TLS error: tls: failed to verify certificate: x509: certificate is valid for ingress.local, not settings-tls
< Exit [It] should not use ports or X-Forwarded-Host during the HTTP to HTTPS redirection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:205 @ 07/16/23 23:40:02.967 (18.283s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:02.967
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:03.473 (506ms)
+
+
+ > Enter [BeforeEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:03.475
< Exit [BeforeEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:14.008 (10.533s)
> Enter [It] should set ingress details variables for ingresses without a host - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/without_host.go:34 @ 07/16/23 23:40:14.008
< Exit [It] should set ingress details variables for ingresses without a host - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/without_host.go:34 @ 07/16/23 23:40:28.273 (14.265s)
> Enter [AfterEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:28.274
< Exit [AfterEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:29.069 (795ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:29.07
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:36.48 (7.444s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:40:36.48
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:40:40.607 (4.127s)
> Enter [It] should not allow - unmatching origin with wildcard origin (2 subdomains) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:468 @ 07/16/23 23:40:40.607
< Exit [It] should not allow - unmatching origin with wildcard origin (2 subdomains) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:468 @ 07/16/23 23:40:47.651 (7.043s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:47.651
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:48.174 (524ms)
+
+
+ > Enter [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:48.176
< Exit [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:56.86 (8.684s)
> Enter [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:32 @ 07/16/23 23:40:56.86
< Exit [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:32 @ 07/16/23 23:41:00.951 (4.125s)
> Enter [It] should exist a proxy_host using the upstream-vhost annotation value - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:57 @ 07/16/23 23:41:00.951
< Exit [It] should exist a proxy_host using the upstream-vhost annotation value - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:57 @ 07/16/23 23:41:11.126 (10.175s)
> Enter [AfterEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:11.126
< Exit [AfterEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:11.617 (491ms)
+
+
+ > Enter [BeforeEach] [Annotations] connection-proxy-header - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:41:11.624
< Exit [BeforeEach] [Annotations] connection-proxy-header - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:41:20.141 (8.516s)
> Enter [BeforeEach] [Annotations] connection-proxy-header - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/connection.go:32 @ 07/16/23 23:41:20.141
< Exit [BeforeEach] [Annotations] connection-proxy-header - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/connection.go:32 @ 07/16/23 23:41:22.214 (2.074s)
> Enter [It] set connection header to keep-alive - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/connection.go:36 @ 07/16/23 23:41:22.214
< Exit [It] set connection header to keep-alive - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/connection.go:36 @ 07/16/23 23:41:32.382 (10.202s)
> Enter [AfterEach] [Annotations] connection-proxy-header - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:32.382
< Exit [AfterEach] [Annotations] connection-proxy-header - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:32.85 (468ms)
+
+
+ > Enter [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:41:32.854
< Exit [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:41:40.227 (7.374s)
> Enter [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:34 @ 07/16/23 23:41:40.227
< Exit [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:34 @ 07/16/23 23:41:44.297 (4.07s)
> Enter [It] should redirect from www HTTPS to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:64 @ 07/16/23 23:41:44.297
STEP: setting up server for redirect from www - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:65 @ 07/16/23 23:41:44.297
STEP: sending request to www should redirect to domain - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:91 @ 07/16/23 23:41:59.768
STEP: sending request to domain should not redirect to www - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:103 @ 07/16/23 23:41:59.784
< Exit [It] should redirect from www HTTPS to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:64 @ 07/16/23 23:41:59.805 (15.508s)
> Enter [AfterEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:59.805
< Exit [AfterEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:42:00.18 (409ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:07:34.241
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:07:48.51 (14.268s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:07:48.51
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:08:06.784 (18.308s)
> Enter [It] should allow - single origin for multiple cors values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:169 @ 07/16/23 23:08:06.784
< Exit [It] should allow - single origin for multiple cors values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:169 @ 07/16/23 23:08:13.874 (7.09s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:13.874
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:15.012 (1.138s)
+
+
+ > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:15.026
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:31.711 (16.684s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:08:31.711
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:08:35.749 (4.073s)
> Enter [It] should turn off proxy-request-buffering - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:179 @ 07/16/23 23:08:35.749
< Exit [It] should turn off proxy-request-buffering - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:179 @ 07/16/23 23:08:45.914 (10.164s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:45.914
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:46.502 (588ms)
+
+
+ > Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:46.507
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:58.795 (12.288s)
> Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 07/16/23 23:08:58.795
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 07/16/23 23:09:02.852 (4.092s)
> Enter [It] should exists opentelemetry_operation_name directive when is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:104 @ 07/16/23 23:09:02.852
< Exit [It] should exists opentelemetry_operation_name directive when is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:104 @ 07/16/23 23:09:20.835 (17.983s)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:20.835
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:21.688 (853ms)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 07/16/23 23:09:21.688
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 07/16/23 23:09:21.688 (0s)
+
+
+ > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:21.694
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:29.368 (7.675s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 07/16/23 23:09:29.369
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 07/16/23 23:09:33.396 (4.061s)
> Enter [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 07/16/23 23:09:33.396
Jul 16 23:09:42.839: INFO: Unexpected TLS error: tls: failed to verify certificate: x509: certificate is valid for ingress.local, not settings-tls
< Exit [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 07/16/23 23:09:44.841 (11.445s)
> Enter [It] setting includeSubDomains parameter - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:127 @ 07/16/23 23:09:44.841
< Exit [It] setting includeSubDomains parameter - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:127 @ 07/16/23 23:09:55.117 (10.276s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:55.117
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:55.595 (478ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:55.621
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:03.902 (8.315s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:10:03.902
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:10:07.984 (4.082s)
> Enter [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 07/16/23 23:10:07.984
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 07/16/23 23:10:23.092
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 07/16/23 23:10:33.264
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 07/16/23 23:10:43.654
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 07/16/23 23:10:53.881
< Exit [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 07/16/23 23:11:09.227 (1m1.333s)
> Enter [It] should deny login for different servers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:820 @ 07/16/23 23:11:09.227
STEP: logging into server thisHost /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:821 @ 07/16/23 23:11:09.227
STEP: receiving an internal server error without cache on thisHost location /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:833 @ 07/16/23 23:11:16.27
< Exit [It] should deny login for different servers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:820 @ 07/16/23 23:12:16.192 (1m7.058s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:16.192
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:16.811 (619ms)
+
+
+ > Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:16.817
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:25.674 (8.857s)
> Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 07/16/23 23:12:25.674
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 07/16/23 23:12:36.81 (11.17s)
> Enter [It] should set the request count to upstream server through one keep alive connection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:86 @ 07/16/23 23:12:36.81
< Exit [It] should set the request count to upstream server through one keep alive connection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:86 @ 07/16/23 23:12:47.088 (10.278s)
> Enter [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:47.088
< Exit [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:47.718 (631ms)
+
+
+ > Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:47.72
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:56.863 (9.143s)
> Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 07/16/23 23:12:56.863
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 07/16/23 23:13:07.932 (11.103s)
> Enter [It] should set keepalive_timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:40 @ 07/16/23 23:13:07.932
< Exit [It] should set keepalive_timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:40 @ 07/16/23 23:13:18.203 (10.272s)
> Enter [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:18.203
< Exit [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:18.842 (639ms)
+
+
+ > Enter [BeforeEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:18.844
< Exit [BeforeEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:28.621 (9.777s)
> Enter [It] should be enabled when set to true - /go/src/k8s.io/ingress-nginx/test/e2e/settings/multi_accept.go:39 @ 07/16/23 23:13:28.621
< Exit [It] should be enabled when set to true - /go/src/k8s.io/ingress-nginx/test/e2e/settings/multi_accept.go:39 @ 07/16/23 23:13:39.052 (10.465s)
> Enter [AfterEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:39.052
< Exit [AfterEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:39.573 (521ms)
+
+
+ > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:39.576
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:47.884 (8.308s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:13:47.884
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:13:51.979 (4.095s)
> Enter [It] should serve Ingress when class is updated between annotation and ingressClassName - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:323 @ 07/16/23 23:13:51.979
< Exit [It] should serve Ingress when class is updated between annotation and ingressClassName - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:323 @ 07/16/23 23:14:17.414 (25.47s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:17.414
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:18.388 (973ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:18.39
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:27.699 (9.309s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:14:27.699
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:14:34.284 (6.619s)
> Enter [It] should response with a 200 status from the mainline upstream when requests are made to the mainline ingress - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:48 @ 07/16/23 23:14:34.284
< Exit [It] should response with a 200 status from the mainline upstream when requests are made to the mainline ingress - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:48 @ 07/16/23 23:14:57.094 (22.81s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:57.094
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:58.009 (914ms)
+
+
+ > Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:58.012
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:08.991 (11.014s)
> Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 07/16/23 23:15:08.991
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 07/16/23 23:15:15.072 (6.08s)
> Enter [It] should use correct longest path match - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:66 @ 07/16/23 23:15:15.072
STEP: creating a regular ingress definition - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:69 @ 07/16/23 23:15:15.072
STEP: making a request to the non-rewritten location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:78 @ 07/16/23 23:15:25.351
STEP: creating an ingress definition with the rewrite-target annotation set on the "/" location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:88 @ 07/16/23 23:15:25.361
STEP: making a second request to the non-rewritten location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:102 @ 07/16/23 23:15:35.543
< Exit [It] should use correct longest path match - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:66 @ 07/16/23 23:15:35.551 (20.514s)
> Enter [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:35.551
< Exit [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:36 (449ms)
+
+
+ > Enter [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:36.002
< Exit [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:44.55 (8.548s)
> Enter [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:31 @ 07/16/23 23:15:44.55
< Exit [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:31 @ 07/16/23 23:15:50.604 (6.055s)
> Enter [It] should set the X-Forwarded-Prefix to the annotation value - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:35 @ 07/16/23 23:15:50.604
< Exit [It] should set the X-Forwarded-Prefix to the annotation value - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:35 @ 07/16/23 23:16:00.832 (10.227s)
> Enter [AfterEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:00.832
< Exit [AfterEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:01.23 (398ms)
+
+
+ > Enter [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:01.232
< Exit [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:09.619 (8.421s)
> Enter [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:36 @ 07/16/23 23:16:09.619
< Exit [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:36 @ 07/16/23 23:16:13.742 (4.123s)
> Enter [It] should not appear references to secret updates not used in ingress rules - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:40 @ 07/16/23 23:16:13.742
< Exit [It] should not appear references to secret updates not used in ingress rules - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:40 @ 07/16/23 23:16:37.172 (23.465s)
> Enter [AfterEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:37.172
< Exit [AfterEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:37.786 (614ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:37.787
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:46.283 (8.495s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:16:46.283
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:16:54.442 (8.159s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:16:54.442
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 07/16/23 23:16:54.442
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 07/16/23 23:17:04.664
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 07/16/23 23:17:15.032
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:17:25.212 (30.804s)
> Enter [It] should set snippet when global external auth is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:250 @ 07/16/23 23:17:25.212
STEP: Adding a global-auth-snippet to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:254 @ 07/16/23 23:17:25.212
< Exit [It] should set snippet when global external auth is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:250 @ 07/16/23 23:17:35.375 (10.198s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:35.375
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:35.767 (391ms)
+
+
+ > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:35.769
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:44.223 (8.454s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:17:44.223
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:17:48.3 (4.077s)
> Enter [It] should not allow - portless origin with wildcard origin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:515 @ 07/16/23 23:17:48.3
< Exit [It] should not allow - portless origin with wildcard origin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:515 @ 07/16/23 23:17:55.341 (7.041s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:55.341
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:55.791 (449ms)
+
+
+ > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:55.792
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:04.137 (8.379s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:18:04.137
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:18:08.248 (4.112s)
> Enter [It] does not set the path to / on the generated cookie if there's more than one rule referring to the same backend - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:121 @ 07/16/23 23:18:08.249
< Exit [It] does not set the path to / on the generated cookie if there's more than one rule referring to the same backend - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:121 @ 07/16/23 23:18:18.49 (10.241s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:18.49
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:18.911 (422ms)
+
+
+ > Enter [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:18.912
< Exit [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:27.287 (8.374s)
> Enter [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:38 @ 07/16/23 23:18:27.287
< Exit [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:38 @ 07/16/23 23:18:31.349 (4.062s)
> Enter [It] should allow multiple auth with satisfy any - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:84 @ 07/16/23 23:18:31.349
< Exit [It] should allow multiple auth with satisfy any - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:84 @ 07/16/23 23:18:47.764 (16.45s)
> Enter [AfterEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:47.764
< Exit [AfterEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:48.191 (427ms)
+
+
+ > Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:48.193
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:56.623 (8.43s)
> Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 07/16/23 23:18:56.623
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 07/16/23 23:19:00.738 (4.115s)
> Enter [It] [BAD_ANNOTATIONS] should drop an ingress if there is a custom blocklist config in place and allow others to pass - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:133 @ 07/16/23 23:19:00.738
< Exit [It] [BAD_ANNOTATIONS] should drop an ingress if there is a custom blocklist config in place and allow others to pass - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:133 @ 07/16/23 23:19:26.161 (25.457s)
> Enter [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:26.161
< Exit [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:26.559 (398ms)
+
+
+ > Enter [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:26.564
< Exit [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:35.081 (8.55s)
> Enter [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:32 @ 07/16/23 23:19:35.081
< Exit [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:32 @ 07/16/23 23:19:39.133 (4.052s)
> Enter [It] should exist a proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:36 @ 07/16/23 23:19:39.133
< Exit [It] should exist a proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:36 @ 07/16/23 23:19:49.376 (10.244s)
> Enter [AfterEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:49.376
< Exit [AfterEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:49.802 (425ms)
+
+
+ > Enter [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:49.804
< Exit [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:58.14 (8.336s)
> Enter [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:40 @ 07/16/23 23:19:58.14
< Exit [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:40 @ 07/16/23 23:20:13.506 (15.401s)
> Enter [It] uses default ssl certificate for catch-all ingress - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:64 @ 07/16/23 23:20:13.506
STEP: making sure new ingress is deployed - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:68 @ 07/16/23 23:20:20.544
STEP: making sure new ingress is responding - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:74 @ 07/16/23 23:20:23.704
STEP: making sure the configured default ssl certificate is being used - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:76 @ 07/16/23 23:20:23.704
< Exit [It] uses default ssl certificate for catch-all ingress - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:64 @ 07/16/23 23:20:25.721 (12.215s)
> Enter [AfterEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:25.721
< Exit [AfterEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:26.267 (546ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:26.269
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:34.686 (8.452s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:20:34.686
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:20:38.757 (4.07s)
> Enter [BeforeEach] with invalid auth-url should deny whole location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:866 @ 07/16/23 23:20:38.757
< Exit [BeforeEach] with invalid auth-url should deny whole location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:866 @ 07/16/23 23:20:48.932 (10.175s)
> Enter [It] should add error to the config - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:887 @ 07/16/23 23:20:48.932
< Exit [It] should add error to the config - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:887 @ 07/16/23 23:20:52.115 (3.183s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:52.115
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:52.579 (463ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:52.58
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:00.264 (7.684s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:21:00.264
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:21:04.298 (4.069s)
> Enter [It] should return status code 401 when authentication is configured and Authorization header is sent with invalid credentials - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:116 @ 07/16/23 23:21:04.298
< Exit [It] should return status code 401 when authentication is configured and Authorization header is sent with invalid credentials - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:116 @ 07/16/23 23:21:15.98 (11.682s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:15.98
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:16.663 (683ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:16.666
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:26.922 (10.256s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:21:26.922
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:21:30.978 (4.056s)
> Enter [It] should return status code 401 and cors headers when authentication and cors is configured but Authorization header is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:144 @ 07/16/23 23:21:30.978
< Exit [It] should return status code 401 and cors headers when authentication and cors is configured but Authorization header is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:144 @ 07/16/23 23:21:42.285 (11.341s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:42.285
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:42.816 (531ms)
+
+
+ > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:42.818
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:51.43 (8.612s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 07/16/23 23:21:51.43
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 07/16/23 23:21:55.497 (4.067s)
> Enter [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 07/16/23 23:21:55.497
Jul 16 23:22:04.729: INFO: Unexpected TLS error: tls: failed to verify certificate: x509: certificate is valid for ingress.local, not settings-tls
< Exit [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 07/16/23 23:22:06.734 (11.271s)
> Enter [It] setting preload parameter - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:146 @ 07/16/23 23:22:06.734
< Exit [It] setting preload parameter - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:146 @ 07/16/23 23:22:16.936 (10.203s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:16.937
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:17.423 (487ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:17.424
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:25.824 (8.4s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:22:25.824
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:22:33.95 (8.16s)
> Enter [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:301 @ 07/16/23 23:22:33.95
< Exit [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:301 @ 07/16/23 23:23:02.307 (28.392s)
> Enter [It] user does not retain cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:337 @ 07/16/23 23:23:02.308
< Exit [It] user does not retain cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:337 @ 07/16/23 23:23:02.317 (10ms)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:02.317
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:02.727 (409ms)
+
+
+ > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:02.729
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:11.096 (8.368s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:23:11.097
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:23:17.255 (6.159s)
> Enter [It] always routes traffic to canary if first request was affinitized to canary (default behavior) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:943 @ 07/16/23 23:23:17.255
< Exit [It] always routes traffic to canary if first request was affinitized to canary (default behavior) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:943 @ 07/16/23 23:23:42.874 (25.653s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:42.874
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:43.4 (525ms)
+
+
+ > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:43.401
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:52.034 (8.633s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:23:52.034
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:24:00.279 (8.245s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:24:00.279
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 07/16/23 23:24:00.279
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 07/16/23 23:24:10.446
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 07/16/23 23:24:20.663
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:24:30.894 (30.65s)
> Enter [It] should return status code 200 when request whitelisted (via ingress annotation) service and 401 when request protected service - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:126 @ 07/16/23 23:24:30.894
STEP: Adding an ingress rule for /bar with annotation enable-global-auth = false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:128 @ 07/16/23 23:24:30.894
STEP: Sending a request to protected service /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:140 @ 07/16/23 23:24:35.071
STEP: Sending a request to whitelisted service /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:147 @ 07/16/23 23:24:35.079
< Exit [It] should return status code 200 when request whitelisted (via ingress annotation) service and 401 when request protected service - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:126 @ 07/16/23 23:24:35.086 (4.226s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:35.086
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:35.565 (479ms)
+
+
+ > Enter [BeforeEach] [Annotations] annotation-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:35.566
< Exit [BeforeEach] [Annotations] annotation-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:44.981 (9.415s)
> Enter [BeforeEach] [Annotations] annotation-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/globalratelimit.go:34 @ 07/16/23 23:24:44.981
< Exit [BeforeEach] [Annotations] annotation-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/globalratelimit.go:34 @ 07/16/23 23:24:49.116 (4.135s)
> Enter [It] generates correct configuration - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/globalratelimit.go:38 @ 07/16/23 23:24:49.116
STEP: regenerating the correct configuration after update - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/globalratelimit.go:65 @ 07/16/23 23:25:11.373
< Exit [It] generates correct configuration - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/globalratelimit.go:38 @ 07/16/23 23:25:22.684 (33.602s)
> Enter [AfterEach] [Annotations] annotation-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:22.684
< Exit [AfterEach] [Annotations] annotation-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:23.246 (562ms)
+
+
+ > Enter [BeforeEach] brotli - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:23.247
< Exit [BeforeEach] brotli - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:31.61 (8.398s)
> Enter [BeforeEach] brotli - /go/src/k8s.io/ingress-nginx/test/e2e/settings/brotli.go:35 @ 07/16/23 23:25:31.61
< Exit [BeforeEach] brotli - /go/src/k8s.io/ingress-nginx/test/e2e/settings/brotli.go:35 @ 07/16/23 23:25:35.714 (4.104s)
> Enter [It] should only compress responses that meet the `brotli-min-length` condition - /go/src/k8s.io/ingress-nginx/test/e2e/settings/brotli.go:39 @ 07/16/23 23:25:35.715
< Exit [It] should only compress responses that meet the `brotli-min-length` condition - /go/src/k8s.io/ingress-nginx/test/e2e/settings/brotli.go:39 @ 07/16/23 23:26:07.011 (31.33s)
> Enter [AfterEach] brotli - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:07.011
< Exit [AfterEach] brotli - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:07.5 (489ms)
+
+
+ > Enter [BeforeEach] [Annotations] preserve-trailing-slash - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:07.503
< Exit [BeforeEach] [Annotations] preserve-trailing-slash - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:16.195 (8.692s)
> Enter [BeforeEach] [Annotations] preserve-trailing-slash - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/preservetrailingslash.go:30 @ 07/16/23 23:26:16.195
< Exit [BeforeEach] [Annotations] preserve-trailing-slash - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/preservetrailingslash.go:30 @ 07/16/23 23:26:20.306 (4.111s)
> Enter [It] should allow preservation of trailing slashes - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/preservetrailingslash.go:34 @ 07/16/23 23:26:20.306
< Exit [It] should allow preservation of trailing slashes - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/preservetrailingslash.go:34 @ 07/16/23 23:26:27.349 (7.044s)
> Enter [AfterEach] [Annotations] preserve-trailing-slash - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:27.349
< Exit [AfterEach] [Annotations] preserve-trailing-slash - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:27.949 (600ms)
+
+
+ > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:27.952
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:36.662 (8.744s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:26:36.662
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:26:40.824 (4.163s)
> Enter [It] should enable modsecurity with snippet and block requests - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:153 @ 07/16/23 23:26:40.824
< Exit [It] should enable modsecurity with snippet and block requests - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:153 @ 07/16/23 23:27:03.024 (22.234s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:03.024
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:03.527 (504ms)
+
+
+ > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:03.528
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:11.896 (8.368s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:27:11.896
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:27:15.977 (4.081s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:27:15.977
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:27:30.444 (14.468s)
> Enter [It] should redirect to signin url when not signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:494 @ 07/16/23 23:27:30.445
< Exit [It] should redirect to signin url when not signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:494 @ 07/16/23 23:27:30.455 (11ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:30.455
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:31.001 (545ms)
+
+
+ > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:31.003
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:39.402 (8.434s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:27:39.403
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:27:43.461 (4.058s)
> Enter [It] should turn on proxy-buffering - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:157 @ 07/16/23 23:27:43.461
< Exit [It] should turn on proxy-buffering - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:157 @ 07/16/23 23:27:53.686 (10.226s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:53.687
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:54.173 (486ms)
+
+
+ > Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:54.174
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:02.854 (8.714s)
> Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 07/16/23 23:28:02.854
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 07/16/23 23:28:06.916 (4.062s)
> Enter [It] should use ~* location modifier if regex annotation is present - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:111 @ 07/16/23 23:28:06.916
STEP: creating a regular ingress definition - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:114 @ 07/16/23 23:28:06.917
STEP: creating an ingress definition with the use-regex amd rewrite-target annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:123 @ 07/16/23 23:28:17.092
STEP: ensuring '/foo' matches '~* ^/foo' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:137 @ 07/16/23 23:28:27.312
STEP: ensuring '/foo/bar' matches '~* ^/foo.+' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:147 @ 07/16/23 23:28:27.32
< Exit [It] should use ~* location modifier if regex annotation is present - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:111 @ 07/16/23 23:28:27.329 (20.413s)
> Enter [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:27.329
< Exit [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:27.758 (429ms)
+
+
+ > Enter [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:27.76
< Exit [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:35.027 (7.302s)
> Enter [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:42 @ 07/16/23 23:28:35.027
< Exit [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:42 @ 07/16/23 23:28:35.031 (4ms)
> Enter [It] should expose an ExternalName TCP service - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:80 @ 07/16/23 23:28:35.031
< Exit [It] should expose an ExternalName TCP service - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:80 @ 07/16/23 23:28:38.754 (3.722s)
> Enter [AfterEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:38.754
< Exit [AfterEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:39.199 (446ms)
+
+
+ > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:39.205
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:47.511 (8.307s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:28:47.511
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:28:51.575 (4.064s)
> Enter [It] should disable modsecurity using 'modsecurity off;' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:132 @ 07/16/23 23:28:51.575
< Exit [It] should disable modsecurity using 'modsecurity off;' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:132 @ 07/16/23 23:29:08.745 (17.204s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:08.745
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:09.129 (383ms)
+
+
+ > Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:09.13
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:17.772 (8.641s)
> Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 07/16/23 23:29:17.772
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 07/16/23 23:29:28.874 (11.102s)
> Enter [It] should enable PROXY Protocol for TCP - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:155 @ 07/16/23 23:29:28.874
Automatically polling progress:
[Setting] use-proxy-protocol should enable PROXY Protocol for TCP (Spec Runtime: 3m19.498s)
/go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:155
In [It] (Node Runtime: 2m59.754s)
/go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:155
Spec Goroutine
goroutine 2683 [IO wait, 2 minutes]
internal/poll.runtime_pollWait(0x7f5468c3dd40, 0x72)
/usr/local/go/src/runtime/netpoll.go:306
internal/poll.(*pollDesc).wait(0xc000c86a00?, 0xc000daf725?, 0x0)
/usr/local/go/src/internal/poll/fd_poll_runtime.go:84
internal/poll.(*pollDesc).waitRead(...)
/usr/local/go/src/internal/poll/fd_poll_runtime.go:89
internal/poll.(*FD).Read(0xc000c86a00, {0xc000daf725, 0x15b, 0x15b})
/usr/local/go/src/internal/poll/fd_unix.go:167
net.(*netFD).Read(0xc000c86a00, {0xc000daf725?, 0x453656?, 0x380?})
/usr/local/go/src/net/fd_posix.go:55
net.(*conn).Read(0xc000126120, {0xc000daf725?, 0x19913c0?, 0xc000daf500?})
/usr/local/go/src/net/net.go:183
io.ReadAll({0x1f62e00, 0xc000126120})
/usr/local/go/src/io/io.go:701
> k8s.io/ingress-nginx/test/e2e/settings.glob..func38.5()
/go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:211
github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func3({0xa0558e, 0xc000cfc300})
/go/src/k8s.io/ingress-nginx/.modcache/github.com/onsi/ginkgo/v2@v2.9.0/internal/node.go:463
github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3()
/go/src/k8s.io/ingress-nginx/.modcache/github.com/onsi/ginkgo/v2@v2.9.0/internal/suite.go:863
github.com/onsi/ginkgo/v2/internal.(*Suite).runNode
/go/src/k8s.io/ingress-nginx/.modcache/github.com/onsi/ginkgo/v2@v2.9.0/internal/suite.go:850
< Exit [It] should enable PROXY Protocol for TCP - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:155 @ 07/16/23 23:39:43.452 (10m15.338s)
> Enter [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:43.452
< Exit [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:44.02 (568ms)
+
+
+ > Enter [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:44.023
< Exit [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:52.324 (8.301s)
> Enter [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:35 @ 07/16/23 23:39:52.324
< Exit [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:35 @ 07/16/23 23:40:01.39 (9.101s)
> Enter [It] trusts X-Forwarded-For header only when setting is true - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:40 @ 07/16/23 23:40:01.39
STEP: ensuring single values are parsed correctly - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:54 @ 07/16/23 23:40:18.685
< Exit [It] trusts X-Forwarded-For header only when setting is true - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:40 @ 07/16/23 23:40:18.693 (17.302s)
> Enter [AfterEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:18.693
< Exit [AfterEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:19.14 (448ms)
+
+
+ > Enter [BeforeEach] [Setting] [Lua] lua-shared-dicts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:19.154
< Exit [BeforeEach] [Setting] [Lua] lua-shared-dicts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:27.75 (8.595s)
> Enter [It] configures lua shared dicts - /go/src/k8s.io/ingress-nginx/test/e2e/settings/lua_shared_dicts.go:29 @ 07/16/23 23:40:27.75
< Exit [It] configures lua shared dicts - /go/src/k8s.io/ingress-nginx/test/e2e/settings/lua_shared_dicts.go:29 @ 07/16/23 23:40:39.948 (12.232s)
> Enter [AfterEach] [Setting] [Lua] lua-shared-dicts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:39.948
< Exit [AfterEach] [Setting] [Lua] lua-shared-dicts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:40.361 (413ms)
+
+
+ > Enter [BeforeEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:40.362
< Exit [BeforeEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:49.01 (8.647s)
> Enter [It] should create sync events - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_sync_events.go:53 @ 07/16/23 23:40:49.01
< Exit [It] should create sync events - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_sync_events.go:53 @ 07/16/23 23:41:11.382 (22.406s)
> Enter [AfterEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:11.382
< Exit [AfterEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:12.084 (702ms)
+
+
+ > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:41:12.087
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:41:19.624 (7.537s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:41:19.624
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:41:23.694 (4.07s)
> Enter [It] should build proxy next upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:194 @ 07/16/23 23:41:23.694
< Exit [It] should build proxy next upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:194 @ 07/16/23 23:41:33.973 (10.314s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:33.974
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:34.437 (464ms)
+
+
+ > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:41:34.439
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:41:42.983 (8.544s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:41:42.983
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:41:47.055 (4.073s)
> Enter [It] should include opentracing_trust_incoming_span off directive when disabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:85 @ 07/16/23 23:41:47.055
< Exit [It] should include opentracing_trust_incoming_span off directive when disabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:85 @ 07/16/23 23:42:04.248 (17.227s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:42:04.248
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:42:04.658 (410ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:42:04.658
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:42:04.658 (0s)
+
+
+
\ No newline at end of file
From 30dc62987192e6a6ca797c403148549b86bd30f7 Mon Sep 17 00:00:00 2001
From: Nicholas Orlowsky
Date: Sun, 16 Jul 2023 23:54:30 -0400
Subject: [PATCH 023/283] remove junit
---
test/junitreports/report-e2e-test-suite.xml | 1311 -------------------
1 file changed, 1311 deletions(-)
delete mode 100644 test/junitreports/report-e2e-test-suite.xml
diff --git a/test/junitreports/report-e2e-test-suite.xml b/test/junitreports/report-e2e-test-suite.xml
deleted file mode 100644
index 43f6f3233..000000000
--- a/test/junitreports/report-e2e-test-suite.xml
+++ /dev/null
@@ -1,1311 +0,0 @@
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:07:34.215
< Exit [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:07:47.677 (13.462s)
> Enter [It] should use grpc_pass in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:43 @ 07/16/23 23:07:47.677
< Exit [It] should use grpc_pass in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:43 @ 07/16/23 23:08:11.636 (23.993s)
> Enter [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:11.636
< Exit [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:12.72 (1.084s)
-
-
- > Enter [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:12.728
< Exit [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:26.952 (14.224s)
> Enter [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:32 @ 07/16/23 23:08:26.952
< Exit [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:32 @ 07/16/23 23:08:40.053 (13.136s)
> Enter [It] reuse port should be disabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:44 @ 07/16/23 23:08:40.053
< Exit [It] reuse port should be disabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:44 @ 07/16/23 23:08:50.288 (10.235s)
> Enter [AfterEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:50.289
< Exit [AfterEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:50.915 (626ms)
-
-
- > Enter [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:50.916
< Exit [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:00.386 (9.47s)
> Enter [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:32 @ 07/16/23 23:09:00.386
< Exit [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:32 @ 07/16/23 23:09:11.506 (11.154s)
> Enter [It] reuse port should be enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:52 @ 07/16/23 23:09:11.506
< Exit [It] reuse port should be enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:52 @ 07/16/23 23:09:21.824 (10.319s)
> Enter [AfterEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:21.824
< Exit [AfterEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:22.594 (769ms)
-
-
- > Enter [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:22.602
< Exit [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:31.342 (8.739s)
> Enter [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:32 @ 07/16/23 23:09:31.342
< Exit [BeforeEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:32 @ 07/16/23 23:09:42.441 (11.134s)
> Enter [It] reuse port should be enabled by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:38 @ 07/16/23 23:09:42.441
< Exit [It] reuse port should be enabled by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/reuse-port.go:38 @ 07/16/23 23:09:45.658 (3.217s)
> Enter [AfterEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:45.658
< Exit [AfterEach] [Setting] reuse-port - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:46.07 (411ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:46.071
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:55.04 (8.969s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 07/16/23 23:09:55.04
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 07/16/23 23:09:59.124 (4.084s)
> Enter [It] should pass URL-encoded certificate to upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:161 @ 07/16/23 23:09:59.124
< Exit [It] should pass URL-encoded certificate to upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:161 @ 07/16/23 23:10:13.448 (14.358s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:13.448
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:13.998 (550ms)
-
-
- > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:13.999
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:22.738 (8.738s)
> Enter [It] should return 200 for service type=ExternalName with a port defined - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:129 @ 07/16/23 23:10:22.738
< Exit [It] should return 200 for service type=ExternalName with a port defined - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:129 @ 07/16/23 23:10:33.094 (10.391s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:33.094
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:33.676 (582ms)
-
-
- > Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:33.688
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:42.391 (8.703s)
> Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 07/16/23 23:10:42.391
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 07/16/23 23:10:53.541 (11.15s)
> Enter [It] should enable PROXY Protocol for HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:112 @ 07/16/23 23:10:53.541
< Exit [It] should enable PROXY Protocol for HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:112 @ 07/16/23 23:12:26.01 (1m32.617s)
> Enter [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:26.01
< Exit [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:26.827 (817ms)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:26.829
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:35.094 (8.299s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:12:35.094
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:12:39.241 (4.147s)
> Enter [It] should enable modsecurity through the config map but ignore snippet as disabled by admin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:305 @ 07/16/23 23:12:39.241
< Exit [It] should enable modsecurity through the config map but ignore snippet as disabled by admin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:305 @ 07/16/23 23:13:08.762 (29.555s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:08.762
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:09.288 (526ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:09.289
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:17.226 (7.936s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:13:17.226
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:13:21.294 (4.068s)
> Enter [It] should not set cookie without domain annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:248 @ 07/16/23 23:13:21.294
< Exit [It] should not set cookie without domain annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:248 @ 07/16/23 23:13:31.492 (10.198s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:31.492
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:32.119 (661ms)
-
-
-
- > Enter [BeforeEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:32.123
< Exit [BeforeEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:40.759 (8.636s)
> Enter [It] enables access logging for default backend - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:88 @ 07/16/23 23:13:40.759
[SKIPPED] enable-access-log-for-default-backend
In [It] at: /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:90 @ 07/16/23 23:13:40.759
< Exit [It] enables access logging for default backend - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:88 @ 07/16/23 23:13:40.759 (0s)
> Enter [AfterEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:40.76
< Exit [AfterEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:41.293 (534ms)
-
-
- > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:41.296
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:50.342 (9.046s)
> Enter [It] should return status 502 for service type=ExternalName with an invalid host - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:153 @ 07/16/23 23:13:50.342
< Exit [It] should return status 502 for service type=ExternalName with an invalid host - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:153 @ 07/16/23 23:14:00.578 (10.237s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:00.578
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:01.204 (626ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:01.205
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:09.622 (8.451s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:14:09.622
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:14:13.746 (4.123s)
> Enter [It] should set secure in cookie with provided false annotation on https - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:458 @ 07/16/23 23:14:13.746
< Exit [It] should set secure in cookie with provided false annotation on https - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:458 @ 07/16/23 23:14:24.227 (10.481s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:24.227
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:24.72 (493ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:24.722
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:35.239 (10.552s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:14:35.239
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:14:43.596 (8.357s)
> Enter [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:383 @ 07/16/23 23:14:43.596
< Exit [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:383 @ 07/16/23 23:15:05.851 (22.289s)
> Enter [It] user retains cookie by default - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:411 @ 07/16/23 23:15:05.851
< Exit [It] user retains cookie by default - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:411 @ 07/16/23 23:15:05.862 (11ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:05.862
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:06.276 (414ms)
-
-
- > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:06.278
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:14.855 (8.577s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 07/16/23 23:15:14.855
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 07/16/23 23:15:25.98 (11.125s)
> Enter [It] should set proxy-headers-hash-bucket-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:60 @ 07/16/23 23:15:25.98
< Exit [It] should set proxy-headers-hash-bucket-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:60 @ 07/16/23 23:15:36.182 (10.236s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:36.182
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:36.652 (469ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:36.653
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:45.163 (8.51s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:15:45.163
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:15:51.277 (6.114s)
> Enter [It] should disable cors allow credentials - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:94 @ 07/16/23 23:15:51.277
< Exit [It] should disable cors allow credentials - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:94 @ 07/16/23 23:16:01.482 (10.205s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:01.482
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:02.018 (570ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:02.019
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:09.556 (7.537s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:16:09.556
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:16:13.642 (4.085s)
> Enter [It] should serve Ingress when class is added - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:257 @ 07/16/23 23:16:13.642
< Exit [It] should serve Ingress when class is added - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:257 @ 07/16/23 23:16:39.138 (25.531s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:39.138
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:39.697 (559ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:39.736
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:47.471 (7.735s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:16:47.471
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:16:51.578 (4.107s)
> Enter [It] should delete Ingress when class is removed - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:192 @ 07/16/23 23:16:51.578
< Exit [It] should delete Ingress when class is removed - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:192 @ 07/16/23 23:17:17.178 (25.634s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:17.178
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:17.695 (517ms)
-
-
- > Enter [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:17.697
< Exit [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:26.222 (8.525s)
> Enter [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:42 @ 07/16/23 23:17:26.222
< Exit [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:42 @ 07/16/23 23:17:30.293 (4.071s)
> Enter [It] should include geoip2 line in config when enabled and db file exists - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:46 @ 07/16/23 23:17:30.293
Jul 16 23:17:39.506: INFO: Connecting to github.com (140.82.113.3:443)
Connecting to github.com (140.82.113.3:443)
Connecting to raw.githubusercontent.com (185.199.111.133:443)
saving to '/etc/nginx/geoip/GeoLite2-Country.mmdb'
GeoLite2-Country.mmd 100%!|(MISSING)********************************| 17952 0:00:00 ETA
'/etc/nginx/geoip/GeoLite2-Country.mmdb' saved
< Exit [It] should include geoip2 line in config when enabled and db file exists - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:46 @ 07/16/23 23:17:49.758 (19.499s)
> Enter [AfterEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:49.758
< Exit [AfterEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:50.446 (688ms)
-
-
- > Enter [BeforeEach] [Status] status update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:50.448
< Exit [BeforeEach] [Status] status update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:59.09 (8.642s)
> Enter [It] should update status field after client-go reconnection - /go/src/k8s.io/ingress-nginx/test/e2e/status/update.go:43 @ 07/16/23 23:17:59.09
Jul 16 23:17:59.090: INFO: Asynchronously running '/bin/bash -c /usr/local/bin/kubectl proxy --accept-hosts=.* --address=0.0.0.0 --port=0'
Jul 16 23:18:19.484: INFO: waiting for leader election and initial status update
Jul 16 23:18:59.486: INFO: Asynchronously running '/bin/bash -c /usr/local/bin/kubectl proxy --accept-hosts=.* --address=0.0.0.0 --port=36979'
< Exit [It] should update status field after client-go reconnection - /go/src/k8s.io/ingress-nginx/test/e2e/status/update.go:43 @ 07/16/23 23:19:09.559 (1m10.572s)
> Enter [AfterEach] [Status] status update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:09.559
< Exit [AfterEach] [Status] status update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:10.072 (512ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:10.074
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:18.758 (8.683s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:19:18.758
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:19:22.852 (4.094s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:19:22.852
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:19:37.243 (14.425s)
> Enter [It] should overwrite Foo header with auth response - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:529 @ 07/16/23 23:19:37.243
< Exit [It] should overwrite Foo header with auth response - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:529 @ 07/16/23 23:19:41.445 (4.202s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:41.446
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:42.051 (605ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:42.053
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:50.431 (8.379s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:19:50.432
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:19:54.495 (4.064s)
> Enter [It] should return status code 200 when authentication is configured with a map and Authorization header is sent - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:199 @ 07/16/23 23:19:54.495
< Exit [It] should return status code 200 when authentication is configured with a map and Authorization header is sent - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:199 @ 07/16/23 23:20:06.914 (12.453s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:06.914
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:07.67 (756ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:07.684
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:16.699 (9.015s)
> Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 07/16/23 23:20:16.699
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 07/16/23 23:20:20.747 (4.048s)
> Enter [It] should set backend protocol to https:// and use proxy_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:34 @ 07/16/23 23:20:20.747
< Exit [It] should set backend protocol to https:// and use proxy_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:34 @ 07/16/23 23:20:31.134 (10.387s)
> Enter [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:31.134
< Exit [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:31.656 (556ms)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:31.657
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:40.453 (8.796s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:20:40.453
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:20:44.53 (4.077s)
> Enter [It] should enable modsecurity globally and with modsecurity-snippet block requests - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:189 @ 07/16/23 23:20:44.53
< Exit [It] should enable modsecurity globally and with modsecurity-snippet block requests - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:189 @ 07/16/23 23:21:13.79 (29.294s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:13.79
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:14.395 (605ms)
-
-
- > Enter [BeforeEach] [Default Backend] change default settings - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:14.4
< Exit [BeforeEach] [Default Backend] change default settings - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:23.168 (8.768s)
> Enter [BeforeEach] [Default Backend] change default settings - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/with_hosts.go:34 @ 07/16/23 23:21:23.168
< Exit [BeforeEach] [Default Backend] change default settings - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/with_hosts.go:34 @ 07/16/23 23:21:27.261 (4.093s)
> Enter [It] should apply the annotation to the default backend - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/with_hosts.go:38 @ 07/16/23 23:21:27.261
< Exit [It] should apply the annotation to the default backend - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/with_hosts.go:38 @ 07/16/23 23:21:37.483 (10.256s)
> Enter [AfterEach] [Default Backend] change default settings - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:37.483
< Exit [AfterEach] [Default Backend] change default settings - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:38.068 (585ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:38.069
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:45.534 (7.465s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:21:45.534
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:21:49.607 (4.073s)
> Enter [BeforeEach] when external authentication is configured with a custom redirect param - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:651 @ 07/16/23 23:21:49.607
< Exit [BeforeEach] when external authentication is configured with a custom redirect param - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:651 @ 07/16/23 23:22:03.839 (14.266s)
> Enter [It] should return status code 200 when signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:678 @ 07/16/23 23:22:03.84
< Exit [It] should return status code 200 when signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:678 @ 07/16/23 23:22:03.852 (12ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:03.852
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:04.325 (473ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:04.328
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:12.822 (8.494s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:22:12.822
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:22:16.892 (4.07s)
> Enter [It] should return status code 401 when authentication is configured with invalid content and Authorization header is sent - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:227 @ 07/16/23 23:22:16.892
< Exit [It] should return status code 401 when authentication is configured with invalid content and Authorization header is sent - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:227 @ 07/16/23 23:22:27.117 (10.225s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:27.117
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:27.555 (438ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:27.556
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:36.204 (8.682s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:22:36.204
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:22:40.282 (4.078s)
> Enter [It] should return status code 200 when authentication is configured and Authorization header is sent - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:172 @ 07/16/23 23:22:40.283
< Exit [It] should return status code 200 when authentication is configured and Authorization header is sent - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:172 @ 07/16/23 23:22:52.486 (12.203s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:52.486
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:52.861 (375ms)
-
-
- > Enter [BeforeEach] [Setting] settings-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:52.864
< Exit [BeforeEach] [Setting] settings-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:00.437 (7.573s)
> Enter [BeforeEach] [Setting] settings-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/settings/globalratelimit.go:34 @ 07/16/23 23:23:00.437
< Exit [BeforeEach] [Setting] settings-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/settings/globalratelimit.go:34 @ 07/16/23 23:23:04.507 (4.105s)
> Enter [It] generates correct NGINX configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/globalratelimit.go:38 @ 07/16/23 23:23:04.507
STEP: generating correct defaults - /go/src/k8s.io/ingress-nginx/test/e2e/settings/globalratelimit.go:43 @ 07/16/23 23:23:11.537
STEP: applying customizations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/globalratelimit.go:61 @ 07/16/23 23:23:14.706
< Exit [It] generates correct NGINX configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/globalratelimit.go:38 @ 07/16/23 23:23:25.01 (20.503s)
> Enter [AfterEach] [Setting] settings-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:25.01
< Exit [AfterEach] [Setting] settings-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:25.724 (714ms)
-
-
- > Enter [BeforeEach] [Annotations] limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:25.726
< Exit [BeforeEach] [Annotations] limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:34.135 (8.443s)
> Enter [BeforeEach] [Annotations] limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitrate.go:33 @ 07/16/23 23:23:34.135
< Exit [BeforeEach] [Annotations] limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitrate.go:33 @ 07/16/23 23:23:38.193 (4.058s)
> Enter [It] Check limit-rate annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitrate.go:37 @ 07/16/23 23:23:38.193
< Exit [It] Check limit-rate annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitrate.go:37 @ 07/16/23 23:23:52.705 (14.512s)
> Enter [AfterEach] [Annotations] limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:52.707
< Exit [AfterEach] [Annotations] limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:53.193 (486ms)
-
-
- > Enter [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:53.194
< Exit [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:02.76 (9.601s)
> Enter [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:34 @ 07/16/23 23:24:02.76
< Exit [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:34 @ 07/16/23 23:24:13.875 (11.115s)
> Enter [It] Add a custom header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:40 @ 07/16/23 23:24:13.875
< Exit [It] Add a custom header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:40 @ 07/16/23 23:24:24.131 (10.255s)
> Enter [AfterEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:24.131
< Exit [AfterEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:24.572 (441ms)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:24.573
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:33.002 (8.463s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:24:33.003
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:24:37.063 (4.061s)
> Enter [It] should enable modsecurity with transaction ID and OWASP rules - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:53 @ 07/16/23 23:24:37.063
< Exit [It] should enable modsecurity with transaction ID and OWASP rules - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:53 @ 07/16/23 23:24:47.308 (10.245s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:47.308
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:47.843 (535ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:47.845
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:56.211 (8.367s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:24:56.212
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:25:04.311 (8.134s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:25:04.312
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 07/16/23 23:25:04.312
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 07/16/23 23:25:14.551
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 07/16/23 23:25:24.781
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:25:34.923 (30.646s)
> Enter [It] should return status code 200 when request whitelisted (via no-auth-locations) service and 401 when request protected service - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:102 @ 07/16/23 23:25:34.923
STEP: Adding a no-auth-locations for /bar to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:104 @ 07/16/23 23:25:34.924
STEP: Sending a request to protected service /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:111 @ 07/16/23 23:25:45.117
STEP: Sending a request to whitelisted service /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:118 @ 07/16/23 23:25:45.136
< Exit [It] should return status code 200 when request whitelisted (via no-auth-locations) service and 401 when request protected service - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:102 @ 07/16/23 23:25:45.155 (10.231s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:45.155
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:45.792 (637ms)
-
-
- > Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:45.799
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:53.394 (7.595s)
> Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 07/16/23 23:25:53.394
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 07/16/23 23:25:57.447 (4.052s)
> Enter [It] should write rewrite logs - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:37 @ 07/16/23 23:25:57.447
STEP: setting enable-rewrite-log annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:38 @ 07/16/23 23:25:57.447
< Exit [It] should write rewrite logs - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:37 @ 07/16/23 23:26:10.67 (13.258s)
> Enter [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:10.67
< Exit [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:11.462 (792ms)
-
-
- > Enter [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:11.466
< Exit [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:19.994 (8.529s)
> Enter [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:36 @ 07/16/23 23:26:19.994
< Exit [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:36 @ 07/16/23 23:26:24.057 (4.063s)
> Enter [It] should use the Service Cluster IP and Port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:41 @ 07/16/23 23:26:24.057
STEP: checking if the service is reached - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:53 @ 07/16/23 23:26:34.26
STEP: checking if the Service Cluster IP and Port are used - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:60 @ 07/16/23 23:26:34.268
< Exit [It] should use the Service Cluster IP and Port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:41 @ 07/16/23 23:26:34.424 (10.402s)
> Enter [AfterEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:34.424
< Exit [AfterEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:34.943 (519ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:34.948
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:43.595 (8.647s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:26:43.595
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:26:47.667 (4.072s)
> Enter [It] should allow - single origin with required port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:358 @ 07/16/23 23:26:47.667
< Exit [It] should allow - single origin with required port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:358 @ 07/16/23 23:26:54.707 (7.04s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:54.707
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:55.197 (490ms)
-
-
- > Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:55.199
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:02.431 (7.267s)
> Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 07/16/23 23:27:02.431
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 07/16/23 23:27:06.577 (4.146s)
> Enter [It] should not set client_body_buffer_size to invalid 1b - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:145 @ 07/16/23 23:27:06.577
< Exit [It] should not set client_body_buffer_size to invalid 1b - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:145 @ 07/16/23 23:27:16.86 (10.283s)
> Enter [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:16.86
< Exit [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:17.6 (740ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:17.603
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:29.242 (11.639s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:27:29.242
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:27:33.297 (4.089s)
> Enter [It] should accept both Ingresses with default IngressClassName and IngressClass annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:132 @ 07/16/23 23:27:33.297
< Exit [It] should accept both Ingresses with default IngressClassName and IngressClass annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:132 @ 07/16/23 23:27:50.62 (17.323s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:50.62
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:51.396 (777ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:51.398
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:59.848 (8.45s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:27:59.848
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:28:07.927 (8.114s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:28:07.927
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 07/16/23 23:28:07.927
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 07/16/23 23:28:18.108
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 07/16/23 23:28:28.311
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:28:38.594 (30.701s)
> Enter [It] should proxy_method method when global-auth-method is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:197 @ 07/16/23 23:28:38.594
STEP: Adding a global-auth-method to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:202 @ 07/16/23 23:28:38.594
< Exit [It] should proxy_method method when global-auth-method is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:197 @ 07/16/23 23:28:48.849 (10.255s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:48.849
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:49.496 (647ms)
-
-
- > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:49.498
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:58.133 (8.635s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 07/16/23 23:28:58.133
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 07/16/23 23:29:00.195 (2.062s)
> Enter [It] should not use ports during the HTTP to HTTPS redirection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:187 @ 07/16/23 23:29:00.195
< Exit [It] should not use ports during the HTTP to HTTPS redirection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:187 @ 07/16/23 23:29:09.273 (9.111s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:09.273
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:09.693 (420ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:09.696
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:18.525 (8.83s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:29:18.525
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:29:22.595 (4.069s)
> Enter [It] should warn user when use-regex is true and session-cookie-path is not set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:294 @ 07/16/23 23:29:22.595
< Exit [It] should warn user when use-regex is true and session-cookie-path is not set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:294 @ 07/16/23 23:29:35.79 (13.229s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:35.79
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:36.912 (1.123s)
-
-
- > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:36.914
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:45.266 (8.352s)
> Enter [It] should update the external name after a service update - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:248 @ 07/16/23 23:29:45.266
STEP: checking the service is updated to use eu.httpbin.org - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:304 @ 07/16/23 23:30:01.037
< Exit [It] should update the external name after a service update - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:248 @ 07/16/23 23:30:01.219 (15.992s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:30:01.219
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:30:01.675 (455ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:30:01.676
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:30:09.223 (7.547s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:30:09.223
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:30:17.344 (8.121s)
> Enter [It] should route requests to the correct upstream if the canary ingress is modified - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:307 @ 07/16/23 23:30:17.344
STEP: routing requests destined for the mainline ingress to the mainline upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:351 @ 07/16/23 23:30:44.8
STEP: routing requests destined for the canary ingress to the canary upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:360 @ 07/16/23 23:30:44.834
< Exit [It] should route requests to the correct upstream if the canary ingress is modified - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:307 @ 07/16/23 23:30:44.863 (27.584s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:30:44.863
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:30:51.061 (6.197s)
-
-
- > Enter [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:30:51.215
< Exit [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:08.914 (17.737s)
> Enter [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:40 @ 07/16/23 23:31:08.914
< Exit [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:40 @ 07/16/23 23:31:24.729 (15.815s)
> Enter [It] uses default ssl certificate for host based ingress when configured certificate does not match host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:80 @ 07/16/23 23:31:24.729
STEP: making sure new ingress is deployed - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:90 @ 07/16/23 23:31:33.588
STEP: making sure the configured default ssl certificate is being used - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:96 @ 07/16/23 23:31:36.75
< Exit [It] uses default ssl certificate for host based ingress when configured certificate does not match host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:80 @ 07/16/23 23:31:38.764 (14.071s)
> Enter [AfterEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:38.764
< Exit [AfterEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:39.22 (456ms)
-
-
- > Enter [BeforeEach] [Setting] Configmap - limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:39.221
< Exit [BeforeEach] [Setting] Configmap - limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:47.492 (8.271s)
> Enter [BeforeEach] [Setting] Configmap - limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/settings/limit_rate.go:32 @ 07/16/23 23:31:47.492
< Exit [BeforeEach] [Setting] Configmap - limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/settings/limit_rate.go:32 @ 07/16/23 23:31:51.545 (4.053s)
> Enter [It] Check limit-rate config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/limit_rate.go:36 @ 07/16/23 23:31:51.545
< Exit [It] Check limit-rate config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/limit_rate.go:36 @ 07/16/23 23:32:22.076 (30.566s)
> Enter [AfterEach] [Setting] Configmap - limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:22.076
< Exit [AfterEach] [Setting] Configmap - limit-rate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:22.569 (493ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:22.57
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:30.865 (8.329s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:32:30.865
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:32:34.935 (4.071s)
> Enter [It] should allow - missing origins (should allow all origins) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:571 @ 07/16/23 23:32:34.936
< Exit [It] should allow - missing origins (should allow all origins) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:571 @ 07/16/23 23:32:42.001 (7.066s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:42.001
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:42.52 (519ms)
-
-
- > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:42.522
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:49.858 (7.336s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 07/16/23 23:32:49.859
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 07/16/23 23:33:00.922 (11.098s)
> Enter [It] should set server_names_hash_max_size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:48 @ 07/16/23 23:33:00.922
< Exit [It] should set server_names_hash_max_size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:48 @ 07/16/23 23:33:11.133 (10.211s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:11.133
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:11.499 (366ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:11.501
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:19.977 (8.476s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 07/16/23 23:33:19.977
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 07/16/23 23:33:24.088 (4.111s)
> Enter [It] should return 200 using auth-tls-match-cn where atleast one of the regex options matches CN from client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:324 @ 07/16/23 23:33:24.088
< Exit [It] should return 200 using auth-tls-match-cn where atleast one of the regex options matches CN from client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:324 @ 07/16/23 23:33:34.766 (10.712s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:34.766
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:35.346 (580ms)
-
-
- > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:35.349
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:43.804 (8.455s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 07/16/23 23:33:43.804
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 07/16/23 23:33:54.894 (11.09s)
> Enter [It] should set variables-hash-bucket-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:80 @ 07/16/23 23:33:54.894
< Exit [It] should set variables-hash-bucket-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:80 @ 07/16/23 23:34:05.028 (10.168s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:05.028
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:05.552 (523ms)
-
-
- > Enter [BeforeEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:05.554
< Exit [BeforeEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:14.153 (8.6s)
> Enter [It] should be disabled when set to false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/multi_accept.go:49 @ 07/16/23 23:34:14.153
< Exit [It] should be disabled when set to false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/multi_accept.go:49 @ 07/16/23 23:34:24.357 (10.204s)
> Enter [AfterEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:24.358
< Exit [AfterEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:24.84 (482ms)
-
-
- > Enter [BeforeEach] single ingress - multiple hosts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:24.841
< Exit [BeforeEach] single ingress - multiple hosts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:33.146 (8.339s)
> Enter [BeforeEach] single ingress - multiple hosts - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/multiple_rules.go:33 @ 07/16/23 23:34:33.146
< Exit [BeforeEach] single ingress - multiple hosts - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/multiple_rules.go:33 @ 07/16/23 23:34:47.325 (14.18s)
> Enter [It] should set the correct $service_name NGINX variable - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/multiple_rules.go:38 @ 07/16/23 23:34:47.325
< Exit [It] should set the correct $service_name NGINX variable - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/multiple_rules.go:38 @ 07/16/23 23:35:00.678 (13.387s)
> Enter [AfterEach] single ingress - multiple hosts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:00.678
< Exit [AfterEach] single ingress - multiple hosts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:01.088 (411ms)
-
-
- > Enter [BeforeEach] [Annotations] app-root - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:01.09
< Exit [BeforeEach] [Annotations] app-root - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:09.717 (8.628s)
> Enter [BeforeEach] [Annotations] app-root - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/approot.go:31 @ 07/16/23 23:35:09.717
< Exit [BeforeEach] [Annotations] app-root - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/approot.go:31 @ 07/16/23 23:35:13.774 (4.056s)
> Enter [It] should redirect to /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/approot.go:35 @ 07/16/23 23:35:13.774
< Exit [It] should redirect to /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/approot.go:35 @ 07/16/23 23:35:24.001 (10.227s)
> Enter [AfterEach] [Annotations] app-root - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:24.001
< Exit [AfterEach] [Annotations] app-root - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:24.542 (541ms)
-
-
- > Enter [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:24.545
< Exit [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:32.804 (8.293s)
> Enter [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:39 @ 07/16/23 23:35:32.804
< Exit [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:39 @ 07/16/23 23:35:45.013 (12.209s)
> Enter [It] should enable ssl-passthrough-proxy-port on a different port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:56 @ 07/16/23 23:35:45.013
< Exit [It] should enable ssl-passthrough-proxy-port on a different port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:56 @ 07/16/23 23:35:56.305 (11.292s)
> Enter [AfterEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:56.305
< Exit [AfterEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:57.119 (814ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:57.124
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:06.657 (9.567s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:36:06.657
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:36:10.742 (4.085s)
> Enter [It] should work with use-regex annotation and session-cookie-path - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:270 @ 07/16/23 23:36:10.742
< Exit [It] should work with use-regex annotation and session-cookie-path - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:270 @ 07/16/23 23:36:20.937 (10.195s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:20.937
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:21.453 (516ms)
-
-
- > Enter [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:21.455
< Exit [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:31.124 (9.704s)
> Enter [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:36 @ 07/16/23 23:36:31.124
< Exit [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:36 @ 07/16/23 23:36:35.265 (4.141s)
> Enter [It] should return the fake SSL certificate if the secret is invalid - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:82 @ 07/16/23 23:36:35.265
< Exit [It] should return the fake SSL certificate if the secret is invalid - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:82 @ 07/16/23 23:36:48.617 (13.352s)
> Enter [AfterEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:48.617
< Exit [AfterEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:49.062 (444ms)
-
-
- > Enter [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:49.063
< Exit [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:57.626 (8.563s)
> Enter [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:79 @ 07/16/23 23:36:57.626
< Exit [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:79 @ 07/16/23 23:37:05.661 (8.069s)
> Enter [It] should connect to the same pod - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:83 @ 07/16/23 23:37:05.661
< Exit [It] should connect to the same pod - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:83 @ 07/16/23 23:37:36.037 (30.41s)
> Enter [AfterEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:36.037
< Exit [AfterEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:36.473 (436ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:36.475
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:45.324 (8.85s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:37:45.324
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:37:57.596 (12.271s)
> Enter [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:301 @ 07/16/23 23:37:57.596
< Exit [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:301 @ 07/16/23 23:38:25.91 (28.348s)
> Enter [It] user with global-auth-always-set-cookie key in configmap retains cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:348 @ 07/16/23 23:38:25.91
< Exit [It] user with global-auth-always-set-cookie key in configmap retains cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:348 @ 07/16/23 23:38:32.91 (7.035s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:32.91
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:33.401 (490ms)
-
-
- > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:33.402
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:42.01 (8.609s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 07/16/23 23:38:42.01
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 07/16/23 23:38:55.207 (13.196s)
> Enter [It] should not configure log-format escape by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:40 @ 07/16/23 23:38:55.207
< Exit [It] should not configure log-format escape by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:40 @ 07/16/23 23:38:58.375 (3.169s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:58.375
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:58.773 (398ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:58.777
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:07.045 (8.302s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:39:07.045
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:39:11.141 (4.096s)
> Enter [BeforeEach] when external authentication is configured with a custom redirect param - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:651 @ 07/16/23 23:39:11.141
< Exit [BeforeEach] when external authentication is configured with a custom redirect param - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:651 @ 07/16/23 23:39:25.521 (14.38s)
> Enter [It] keeps processing new ingresses even if one of the existing ingresses is misconfigured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:698 @ 07/16/23 23:39:25.521
< Exit [It] keeps processing new ingresses even if one of the existing ingresses is misconfigured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:698 @ 07/16/23 23:39:36.735 (11.248s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:36.735
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:37.352 (617ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:37.354
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:47.228 (9.874s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:39:47.228
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:39:55.38 (8.152s)
> Enter [It] should return 404 status for requests to the canary if no matching ingress is found - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:80 @ 07/16/23 23:39:55.38
< Exit [It] should return 404 status for requests to the canary if no matching ingress is found - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:80 @ 07/16/23 23:40:02.395 (7.05s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:02.395
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:02.942 (547ms)
-
-
- > Enter [BeforeEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:02.952
< Exit [BeforeEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:14.181 (11.229s)
> Enter [It] should have worker_rlimit_nofile option - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_options.go:31 @ 07/16/23 23:40:14.181
< Exit [It] should have worker_rlimit_nofile option - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_options.go:31 @ 07/16/23 23:40:17.314 (3.133s)
> Enter [AfterEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:17.314
< Exit [AfterEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:17.708 (394ms)
-
-
- > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:17.709
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:26.08 (8.371s)
> Enter [It] should sync ingress on external name service addition/deletion - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:311 @ 07/16/23 23:40:26.08
< Exit [It] should sync ingress on external name service addition/deletion - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:311 @ 07/16/23 23:40:46.867 (20.821s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:46.867
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:47.244 (376ms)
-
-
- I0716 23:41:15.732712 21 request.go:690] Waited for 1.1995168s due to client-side throttling, not priority and fairness, request: GET:https://10.96.0.1:443/api/v1/namespaces/e2e-tests-limit-connections-1689550847245898400-wb8ks/services/nginx-ingress-controller
- > Enter [BeforeEach] [Annotations] Annotation - limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:47.245
< Exit [BeforeEach] [Annotations] Annotation - limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:56.079 (8.834s)
> Enter [BeforeEach] [Annotations] Annotation - limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitconnections.go:34 @ 07/16/23 23:40:56.079
< Exit [BeforeEach] [Annotations] Annotation - limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitconnections.go:34 @ 07/16/23 23:41:00.171 (4.127s)
> Enter [It] should limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitconnections.go:38 @ 07/16/23 23:41:00.171
< Exit [It] should limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/limitconnections.go:38 @ 07/16/23 23:41:24.568 (24.396s)
> Enter [AfterEach] [Annotations] Annotation - limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:24.568
< Exit [AfterEach] [Annotations] Annotation - limit-connections - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:25.344 (776ms)
-
-
- > Enter [BeforeEach] [Shutdown] Grace period shutdown - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:41:25.36
< Exit [BeforeEach] [Shutdown] Grace period shutdown - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:41:32.695 (7.368s)
> Enter [It] /healthz should return status code 500 during shutdown grace period - /go/src/k8s.io/ingress-nginx/test/e2e/gracefulshutdown/grace_period.go:35 @ 07/16/23 23:41:32.695
< Exit [It] /healthz should return status code 500 during shutdown grace period - /go/src/k8s.io/ingress-nginx/test/e2e/gracefulshutdown/grace_period.go:35 @ 07/16/23 23:42:45.785 (1m13.158s)
> Enter [AfterEach] [Shutdown] Grace period shutdown - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:42:45.785
< Exit [AfterEach] [Shutdown] Grace period shutdown - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:42:46.185 (401ms)
-
-
- > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:42:46.188
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:43:12.099 (25.945s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:43:12.099
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:43:20.23 (8.131s)
> Enter [It] should return an error if there is an invalid value in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:136 @ 07/16/23 23:43:20.23
< Exit [It] should return an error if there is an invalid value in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:136 @ 07/16/23 23:43:27.268 (7.037s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:43:27.268
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:43:27.784 (516ms)
-
-
- > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:43:27.785
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:43:58.24 (30.49s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:43:58.24
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:44:06.339 (8.133s)
> Enter [It] reject ingress with global-rate-limit annotations when memcached is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:43 @ 07/16/23 23:44:06.339
STEP: rejects ingress when memcached is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:52 @ 07/16/23 23:44:06.339
STEP: accepts ingress when memcached is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:57 @ 07/16/23 23:44:06.349
< Exit [It] reject ingress with global-rate-limit annotations when memcached is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:43 @ 07/16/23 23:44:16.599 (10.26s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:44:16.599
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:44:17.054 (455ms)
-
-
- > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:44:17.055
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:44:36.36 (19.339s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:44:36.36
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:44:44.488 (8.128s)
> Enter [It] should not return an error for an invalid Ingress when it has unknown class - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:207 @ 07/16/23 23:44:44.488
< Exit [It] should not return an error for an invalid Ingress when it has unknown class - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:207 @ 07/16/23 23:44:44.642 (153ms)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:44:44.642
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:44:45.068 (426ms)
-
-
- > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:44:45.07
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:45:03.441 (18.405s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:45:03.441
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:45:11.572 (8.131s)
> Enter [It] should not allow overlaps of host and paths without canary annotations - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:70 @ 07/16/23 23:45:11.572
< Exit [It] should not allow overlaps of host and paths without canary annotations - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:70 @ 07/16/23 23:45:14.768 (3.197s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:45:14.768
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:45:15.19 (422ms)
-
-
- > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:45:15.191
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:45:33.55 (18.393s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:45:33.55
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:45:41.706 (8.156s)
> Enter [It] should return an error if the Ingress V1 definition contains invalid annotations - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:196 @ 07/16/23 23:45:41.706
< Exit [It] should return an error if the Ingress V1 definition contains invalid annotations - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:196 @ 07/16/23 23:45:41.879 (173ms)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:45:41.879
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:45:42.315 (436ms)
-
-
- > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:45:42.316
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:46:05.628 (23.347s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:46:05.629
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:46:13.77 (8.142s)
> Enter [It] should not return an error if the Ingress V1 definition is valid with IngressClass annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:180 @ 07/16/23 23:46:13.77
< Exit [It] should not return an error if the Ingress V1 definition is valid with IngressClass annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:180 @ 07/16/23 23:46:19.093 (5.323s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:46:19.093
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:46:19.553 (460ms)
-
-
- > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:46:19.554
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:46:38.748 (19.229s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:46:38.748
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:46:46.903 (8.154s)
> Enter [It] should return an error if there is a forbidden value in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:150 @ 07/16/23 23:46:46.903
< Exit [It] should return an error if there is a forbidden value in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:150 @ 07/16/23 23:46:53.94 (7.037s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:46:53.94
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:46:54.36 (420ms)
-
-
- > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:46:54.361
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:47:21.846 (27.52s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:47:21.846
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:47:29.967 (8.139s)
> Enter [It] should not return an error if the Ingress V1 definition is valid with Ingress Class - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:164 @ 07/16/23 23:47:29.967
< Exit [It] should not return an error if the Ingress V1 definition is valid with Ingress Class - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:164 @ 07/16/23 23:47:33.332 (3.365s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:47:33.332
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:47:33.801 (469ms)
-
-
- > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:47:33.802
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:48:03.021 (29.226s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:48:03.021
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:48:11.191 (8.17s)
> Enter [It] should block ingress with invalid path - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:108 @ 07/16/23 23:48:11.191
< Exit [It] should block ingress with invalid path - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:108 @ 07/16/23 23:48:14.438 (3.246s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:48:14.438
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:48:15.015 (577ms)
-
-
- > Enter [BeforeEach] [TopologyHints] topology aware routing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:48:15.017
< Exit [BeforeEach] [TopologyHints] topology aware routing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:48:22.38 (7.363s)
> Enter [BeforeEach] [TopologyHints] topology aware routing - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/topology.go:39 @ 07/16/23 23:48:22.38
< Exit [BeforeEach] [TopologyHints] topology aware routing - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/topology.go:39 @ 07/16/23 23:48:26.446 (4.066s)
> Enter [It] should return 200 when service has topology hints - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/topology.go:43 @ 07/16/23 23:48:26.446
STEP: checking if the service is reached - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/topology.go:53 @ 07/16/23 23:48:36.588
< Exit [It] should return 200 when service has topology hints - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/topology.go:43 @ 07/16/23 23:48:36.76 (10.343s)
> Enter [AfterEach] [TopologyHints] topology aware routing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:48:36.76
< Exit [AfterEach] [TopologyHints] topology aware routing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:48:37.218 (459ms)
-
-
- > Enter [BeforeEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:48:37.219
< Exit [BeforeEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:49:01.506 (24.32s)
> Enter [BeforeEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/settings/namespace_selector.go:51 @ 07/16/23 23:49:01.506
< Exit [BeforeEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/settings/namespace_selector.go:51 @ 07/16/23 23:49:27.706 (26.2s)
> Enter [It] should ingore Ingress of namespace without label foo=bar and accept those of namespace with label foo=bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/namespace_selector.go:63 @ 07/16/23 23:49:27.706
< Exit [It] should ingore Ingress of namespace without label foo=bar and accept those of namespace with label foo=bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/namespace_selector.go:63 @ 07/16/23 23:49:34.037 (6.365s)
> Enter [AfterEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:49:34.037
< Exit [AfterEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:49:34.43 (393ms)
> Enter [AfterEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/settings/namespace_selector.go:56 @ 07/16/23 23:49:34.43
< Exit [AfterEach] [Flag] watch namespace selector - /go/src/k8s.io/ingress-nginx/test/e2e/settings/namespace_selector.go:56 @ 07/16/23 23:49:34.447 (17ms)
-
-
- > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:49:34.449
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:49:53.407 (18.958s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:49:53.407
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:50:01.525 (8.152s)
> Enter [It] should allow overlaps of host and paths with canary annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:87 @ 07/16/23 23:50:01.525
< Exit [It] should allow overlaps of host and paths with canary annotation - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:87 @ 07/16/23 23:50:06.787 (5.263s)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:50:06.787
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:50:07.247 (459ms)
-
-
- > Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:50:07.248
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:50:26.543 (19.295s)
> Enter [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:50:26.543
< Exit [BeforeEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:38 @ 07/16/23 23:50:34.647 (8.138s)
> Enter [It] should return an error if there is an error validating the ingress definition - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:125 @ 07/16/23 23:50:34.647
< Exit [It] should return an error if there is an error validating the ingress definition - /go/src/k8s.io/ingress-nginx/test/e2e/admission/admission.go:125 @ 07/16/23 23:50:34.688 (42ms)
> Enter [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:50:34.688
< Exit [AfterEach] [Admission] admission controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:50:35.093 (404ms)
-
-
- > Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:07:34.275
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:07:48.02 (13.746s)
> Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 07/16/23 23:07:48.02
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 07/16/23 23:08:02.283 (14.262s)
> Enter [It] should allow for custom rewrite parameters - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:190 @ 07/16/23 23:08:02.283
STEP: creating an ingress definition with the use-regex annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:193 @ 07/16/23 23:08:02.283
STEP: check that '/foo/bar/bar' redirects to custom rewrite - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:206 @ 07/16/23 23:08:12.679
< Exit [It] should allow for custom rewrite parameters - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:190 @ 07/16/23 23:08:12.703 (10.454s)
> Enter [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:12.703
< Exit [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:13.572 (869ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:13.576
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:28.615 (15.039s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:08:28.615
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:08:36.764 (8.184s)
> Enter [It] should route requests to the correct upstream if mainline ingress is created after the canary ingress - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:206 @ 07/16/23 23:08:36.765
STEP: routing requests destined for the mainline ingress to the mainelin upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:231 @ 07/16/23 23:08:54.047
STEP: routing requests destined for the canary ingress to the canary upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:240 @ 07/16/23 23:08:54.056
< Exit [It] should route requests to the correct upstream if mainline ingress is created after the canary ingress - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:206 @ 07/16/23 23:08:54.065 (17.301s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:54.065
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:54.538 (473ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:54.54
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:05.022 (10.516s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 07/16/23 23:09:05.022
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 07/16/23 23:09:09.106 (4.084s)
> Enter [It] should set sslClientCertificate, sslVerifyClient and sslVerifyDepth with auth-tls-secret - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:36 @ 07/16/23 23:09:09.106
< Exit [It] should set sslClientCertificate, sslVerifyClient and sslVerifyDepth with auth-tls-secret - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:36 @ 07/16/23 23:09:25.238 (16.132s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:25.238
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:25.913 (675ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:25.915
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:34.419 (8.538s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:09:34.419
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:09:42.592 (8.174s)
> Enter [It] routes traffic to either mainline or canary backend (legacy behavior) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:1058 @ 07/16/23 23:09:42.592
< Exit [It] routes traffic to either mainline or canary backend (legacy behavior) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:1058 @ 07/16/23 23:10:38.197 (55.673s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:38.197
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:38.587 (391ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:38.589
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:47.213 (8.624s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:10:47.213
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:10:51.275 (4.063s)
> Enter [It] should not allow - single origin for multiple cors values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:196 @ 07/16/23 23:10:51.276
< Exit [It] should not allow - single origin for multiple cors values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:196 @ 07/16/23 23:10:58.316 (7.04s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:58.316
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:58.828 (512ms)
-
-
- > Enter [BeforeEach] [Annotations] influxdb-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:58.83
< Exit [BeforeEach] [Annotations] influxdb-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:11:06.101 (7.326s)
> Enter [BeforeEach] [Annotations] influxdb-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/influxdb.go:42 @ 07/16/23 23:11:06.101
< Exit [BeforeEach] [Annotations] influxdb-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/influxdb.go:42 @ 07/16/23 23:11:55.28 (49.235s)
> Enter [It] should send the request metric to the influxdb server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/influxdb.go:48 @ 07/16/23 23:11:55.28
< Exit [It] should send the request metric to the influxdb server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/influxdb.go:48 @ 07/16/23 23:12:16.87 (21.626s)
> Enter [AfterEach] [Annotations] influxdb-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:16.87
< Exit [AfterEach] [Annotations] influxdb-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:17.419 (549ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:17.421
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:26.489 (9.069s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:12:26.49
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:12:30.699 (4.21s)
> Enter [It] should not set invalid proxy timeouts - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:136 @ 07/16/23 23:12:30.699
< Exit [It] should not set invalid proxy timeouts - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:136 @ 07/16/23 23:12:41.026 (10.361s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:41.03
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:41.518 (487ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:41.519
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:50.636 (9.117s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:12:50.636
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:12:54.712 (4.076s)
> Enter [It] should allow correct origins - single origin for multiple cors values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:216 @ 07/16/23 23:12:54.712
< Exit [It] should allow correct origins - single origin for multiple cors values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:216 @ 07/16/23 23:13:01.787 (7.076s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:01.787
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:02.426 (673ms)
-
-
- > Enter [BeforeEach] [Ingress] [PathType] mix Exact and Prefix paths - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:02.429
< Exit [BeforeEach] [Ingress] [PathType] mix Exact and Prefix paths - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:11.216 (8.787s)
> Enter [BeforeEach] [Ingress] [PathType] mix Exact and Prefix paths - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:33 @ 07/16/23 23:13:11.217
< Exit [BeforeEach] [Ingress] [PathType] mix Exact and Prefix paths - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:33 @ 07/16/23 23:13:15.424 (4.207s)
> Enter [It] should choose the correct location - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:39 @ 07/16/23 23:13:15.424
STEP: Checking exact request to / - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:63 @ 07/16/23 23:13:32.733
STEP: Checking prefix request to /bar - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:76 @ 07/16/23 23:13:32.756
STEP: Checking exact request to /foo - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:109 @ 07/16/23 23:13:50.333
STEP: Checking prefix request to /foo/bar - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:122 @ 07/16/23 23:13:50.341
STEP: Checking prefix request to /foobar - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:134 @ 07/16/23 23:13:50.351
< Exit [It] should choose the correct location - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_mixed.go:39 @ 07/16/23 23:13:50.359 (34.97s)
> Enter [AfterEach] [Ingress] [PathType] mix Exact and Prefix paths - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:50.36
< Exit [AfterEach] [Ingress] [PathType] mix Exact and Prefix paths - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:50.91 (550ms)
-
-
- > Enter [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:50.913
< Exit [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:58.322 (7.409s)
> Enter [It] should set gzip_comp_level to 4 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:56 @ 07/16/23 23:13:58.322
< Exit [It] should set gzip_comp_level to 4 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:56 @ 07/16/23 23:14:15.594 (17.306s)
> Enter [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:15.594
< Exit [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:16.06 (466ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:16.061
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:24.013 (7.951s)
> Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 07/16/23 23:14:24.013
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 07/16/23 23:14:28.134 (4.121s)
> Enter [It] should set valid proxy-ssl-secret - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:37 @ 07/16/23 23:14:28.134
< Exit [It] should set valid proxy-ssl-secret - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:37 @ 07/16/23 23:14:47.036 (18.936s)
> Enter [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:47.036
< Exit [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:53.943 (6.907s)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:53.945
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:04.186 (10.275s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:15:04.186
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:15:08.271 (4.085s)
> Enter [It] should change the default proxy HTTP version - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:233 @ 07/16/23 23:15:08.271
< Exit [It] should change the default proxy HTTP version - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:233 @ 07/16/23 23:15:18.477 (10.206s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:18.477
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:18.878 (401ms)
-
-
- > Enter [BeforeEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:18.88
< Exit [BeforeEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:27.307 (8.428s)
> Enter [It] should respond with a custom redirect code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:61 @ 07/16/23 23:15:27.307
STEP: setting permanent-redirect-code annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:62 @ 07/16/23 23:15:27.307
STEP: sending request to redirected URL path - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:82 @ 07/16/23 23:15:37.505
< Exit [It] should respond with a custom redirect code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:61 @ 07/16/23 23:15:37.513 (10.24s)
> Enter [AfterEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:37.513
< Exit [AfterEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:38.004 (491ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:38.014
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:47.066 (9.052s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:15:47.066
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:15:57.188 (10.122s)
> Enter [It] should routes to mainline upstream when the given Regex causes error - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:566 @ 07/16/23 23:15:57.188
STEP: routing requests to the mainline upstream when the given Regex causes error - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:591 @ 07/16/23 23:16:14.422
< Exit [It] should routes to mainline upstream when the given Regex causes error - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:566 @ 07/16/23 23:16:14.445 (17.291s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:14.445
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:15.095 (650ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:15.112
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:23.549 (8.437s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:16:23.549
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:16:27.629 (4.08s)
> Enter [It] should set snippet "proxy_set_header My-Custom-Header 42;" when external auth is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:266 @ 07/16/23 23:16:27.629
< Exit [It] should set snippet "proxy_set_header My-Custom-Header 42;" when external auth is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:266 @ 07/16/23 23:16:37.862 (10.268s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:37.862
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:38.445 (583ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:38.446
< Exit [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:49.042 (10.596s)
> Enter [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:33 @ 07/16/23 23:16:49.042
< Exit [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:33 @ 07/16/23 23:17:00.129 (11.087s)
> Enter [It] should block User-Agents defined in the ConfigMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:55 @ 07/16/23 23:17:00.129
< Exit [It] should block User-Agents defined in the ConfigMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:55 @ 07/16/23 23:17:10.352 (10.257s)
> Enter [AfterEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:10.352
< Exit [AfterEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:10.734 (382ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:10.736
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:19.354 (8.618s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:17:19.354
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:17:23.429 (4.075s)
> Enter [It] should not set secure in cookie with provided false annotation on http - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:435 @ 07/16/23 23:17:23.429
< Exit [It] should not set secure in cookie with provided false annotation on http - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:435 @ 07/16/23 23:17:33.591 (10.197s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:33.591
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:34.089 (497ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:34.09
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:42.368 (8.278s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:17:42.368
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:17:50.549 (8.181s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:17:50.549
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 07/16/23 23:17:50.549
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 07/16/23 23:18:01.043
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 07/16/23 23:18:11.254
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:18:21.423 (30.908s)
> Enter [It] should add auth headers when global-auth-response-headers is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:223 @ 07/16/23 23:18:21.423
STEP: Adding a global-auth-response-headers to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:228 @ 07/16/23 23:18:21.423
< Exit [It] should add auth headers when global-auth-response-headers is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:223 @ 07/16/23 23:18:31.597 (10.208s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:31.597
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:32.129 (532ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:32.13
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:40.387 (8.257s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:18:40.387
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:18:44.465 (4.078s)
> Enter [It] should set proxy client-max-body-size to 8m - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:85 @ 07/16/23 23:18:44.465
< Exit [It] should set proxy client-max-body-size to 8m - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:85 @ 07/16/23 23:18:54.781 (10.316s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:54.781
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:55.208 (427ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:55.21
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:03.622 (8.446s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:19:03.622
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:19:07.698 (4.076s)
> Enter [It] should set proxy_redirect to default - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:52 @ 07/16/23 23:19:07.698
< Exit [It] should set proxy_redirect to default - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:52 @ 07/16/23 23:19:17.914 (10.216s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:17.914
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:18.304 (391ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:18.307
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:26.675 (8.368s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:19:26.675
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:19:30.739 (4.064s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:19:30.739
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:19:45.008 (14.304s)
> Enter [It] should create additional upstream block when auth-keepalive is set with HTTP/1.x - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:623 @ 07/16/23 23:19:45.008
< Exit [It] should create additional upstream block when auth-keepalive is set with HTTP/1.x - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:623 @ 07/16/23 23:20:08.248 (23.274s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:08.248
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:08.787 (539ms)
-
-
- > Enter [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:08.788
< Exit [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:17.73 (8.942s)
> Enter [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:32 @ 07/16/23 23:20:17.73
< Exit [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:32 @ 07/16/23 23:20:21.833 (4.103s)
> Enter [It] should return status code 200 for host 'foo' and 404 for 'bar' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:36 @ 07/16/23 23:20:21.833
< Exit [It] should return status code 200 for host 'foo' and 404 for 'bar' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:36 @ 07/16/23 23:20:32.024 (10.226s)
> Enter [AfterEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:32.024
< Exit [AfterEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:32.522 (498ms)
-
-
- > Enter [BeforeEach] plugins - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:32.53
< Exit [BeforeEach] plugins - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:40.871 (8.341s)
> Enter [BeforeEach] plugins - /go/src/k8s.io/ingress-nginx/test/e2e/settings/plugins.go:31 @ 07/16/23 23:20:40.871
< Exit [BeforeEach] plugins - /go/src/k8s.io/ingress-nginx/test/e2e/settings/plugins.go:31 @ 07/16/23 23:20:46.94 (6.069s)
> Enter [It] should exist a x-hello-world header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/plugins.go:35 @ 07/16/23 23:20:46.94
< Exit [It] should exist a x-hello-world header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/plugins.go:35 @ 07/16/23 23:21:04.258 (17.351s)
> Enter [AfterEach] plugins - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:04.258
< Exit [AfterEach] plugins - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:04.797 (540ms)
-
-
- > Enter [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:04.802
< Exit [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:13.19 (8.387s)
> Enter [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:79 @ 07/16/23 23:21:13.19
< Exit [BeforeEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:79 @ 07/16/23 23:21:19.32 (6.13s)
> Enter [It] should connect to the same subset of pods - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:92 @ 07/16/23 23:21:19.32
< Exit [It] should connect to the same subset of pods - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamhashby.go:92 @ 07/16/23 23:21:49.708 (30.422s)
> Enter [AfterEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:49.708
< Exit [AfterEach] [Annotations] upstream-hash-by-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:50.139 (431ms)
-
-
- > Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:50.145
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:58.496 (8.351s)
> Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 07/16/23 23:21:58.496
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 07/16/23 23:22:09.574 (11.112s)
> Enter [It] should set keepalive_requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:48 @ 07/16/23 23:22:09.574
< Exit [It] should set keepalive_requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:48 @ 07/16/23 23:22:19.755 (10.181s)
> Enter [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:19.755
< Exit [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:20.256 (501ms)
-
-
- > Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:20.257
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:28.894 (8.637s)
> Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 07/16/23 23:22:28.894
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 07/16/23 23:22:43.112 (14.252s)
> Enter [It] handles endpoints only changes (down scaling of replicas) - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:87 @ 07/16/23 23:22:43.112
< Exit [It] handles endpoints only changes (down scaling of replicas) - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:87 @ 07/16/23 23:23:05.645 (22.568s)
> Enter [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:05.645
< Exit [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:06.129 (484ms)
-
-
- > Enter [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:06.131
< Exit [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:20.599 (14.468s)
> Enter [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:38 @ 07/16/23 23:23:20.6
< Exit [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:38 @ 07/16/23 23:23:27.994 (7.394s)
> Enter [It] should set X-Forwarded-Port header to 443 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:70 @ 07/16/23 23:23:27.994
< Exit [It] should set X-Forwarded-Port header to 443 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:70 @ 07/16/23 23:23:40.522 (12.562s)
> Enter [AfterEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:40.522
< Exit [AfterEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:40.988 (466ms)
-
-
- > Enter [BeforeEach] [Annotations] upstream-vhost - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:40.989
< Exit [BeforeEach] [Annotations] upstream-vhost - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:49.554 (8.565s)
> Enter [BeforeEach] [Annotations] upstream-vhost - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamvhost.go:30 @ 07/16/23 23:23:49.554
< Exit [BeforeEach] [Annotations] upstream-vhost - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamvhost.go:30 @ 07/16/23 23:23:53.661 (4.107s)
> Enter [It] set host to upstreamvhost.bar.com - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamvhost.go:34 @ 07/16/23 23:23:53.661
< Exit [It] set host to upstreamvhost.bar.com - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/upstreamvhost.go:34 @ 07/16/23 23:24:03.928 (10.302s)
> Enter [AfterEach] [Annotations] upstream-vhost - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:03.928
< Exit [AfterEach] [Annotations] upstream-vhost - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:04.364 (435ms)
-
-
- > Enter [BeforeEach] [Setting] configmap stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:04.366
< Exit [BeforeEach] [Setting] configmap stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:12.746 (8.379s)
> Enter [BeforeEach] [Setting] configmap stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/settings/stream_snippet.go:38 @ 07/16/23 23:24:12.746
< Exit [BeforeEach] [Setting] configmap stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/settings/stream_snippet.go:38 @ 07/16/23 23:24:16.814 (4.069s)
> Enter [It] should add value of stream-snippet via config map to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/stream_snippet.go:42 @ 07/16/23 23:24:16.814
< Exit [It] should add value of stream-snippet via config map to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/stream_snippet.go:42 @ 07/16/23 23:24:39.062 (22.282s)
> Enter [AfterEach] [Setting] configmap stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:39.062
< Exit [AfterEach] [Setting] configmap stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:39.426 (364ms)
-
-
- > Enter [BeforeEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:39.427
< Exit [BeforeEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:48.131 (8.704s)
> Enter [It] should create sync events (default) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_sync_events.go:35 @ 07/16/23 23:24:48.132
< Exit [It] should create sync events (default) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_sync_events.go:35 @ 07/16/23 23:25:02.405 (14.308s)
> Enter [AfterEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:02.405
< Exit [AfterEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:02.769 (364ms)
-
-
- > Enter [BeforeEach] [Flag] disable-service-external-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:02.775
< Exit [BeforeEach] [Flag] disable-service-external-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:11.181 (8.406s)
> Enter [BeforeEach] [Flag] disable-service-external-name - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_service_external_name.go:38 @ 07/16/23 23:25:11.181
< Exit [BeforeEach] [Flag] disable-service-external-name - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_service_external_name.go:38 @ 07/16/23 23:25:24.327 (13.145s)
> Enter [It] should ignore services of external-name type - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_service_external_name.go:52 @ 07/16/23 23:25:24.327
< Exit [It] should ignore services of external-name type - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_service_external_name.go:52 @ 07/16/23 23:25:44.763 (20.471s)
> Enter [AfterEach] [Flag] disable-service-external-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:44.763
< Exit [AfterEach] [Flag] disable-service-external-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:45.279 (515ms)
-
-
- > Enter [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:45.282
< Exit [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:53.726 (8.444s)
> Enter [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:31 @ 07/16/23 23:25:53.726
< Exit [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:31 @ 07/16/23 23:25:57.802 (4.077s)
> Enter [It] drops snippet "more_set_headers "Foo1: Bar1";" in all locations if disabled by admin" - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:58 @ 07/16/23 23:25:57.803
< Exit [It] drops snippet "more_set_headers "Foo1: Bar1";" in all locations if disabled by admin" - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:58 @ 07/16/23 23:26:27.099 (29.331s)
> Enter [AfterEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:27.099
< Exit [AfterEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:27.643 (544ms)
-
-
- > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:27.646
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:36.154 (8.542s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 07/16/23 23:26:36.154
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 07/16/23 23:26:40.235 (4.081s)
> Enter [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 07/16/23 23:26:40.235
Jul 16 23:26:49.946: INFO: Unexpected TLS error: tls: failed to verify certificate: x509: certificate is valid for ingress.local, not settings-tls
< Exit [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 07/16/23 23:26:51.943 (11.709s)
> Enter [It] setting max-age parameter - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:111 @ 07/16/23 23:26:51.944
< Exit [It] setting max-age parameter - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:111 @ 07/16/23 23:27:02.135 (10.226s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:02.135
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:02.635 (500ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:02.637
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:10.976 (8.339s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:27:10.976
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:27:15.04 (4.064s)
> Enter [BeforeEach] when external authentication is configured with a custom redirect param - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:651 @ 07/16/23 23:27:15.04
< Exit [BeforeEach] when external authentication is configured with a custom redirect param - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:651 @ 07/16/23 23:27:29.343 (14.303s)
> Enter [It] should redirect to signin url when not signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:687 @ 07/16/23 23:27:29.343
< Exit [It] should redirect to signin url when not signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:687 @ 07/16/23 23:27:29.355 (12ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:29.355
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:29.875 (520ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:29.877
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:37.741 (7.898s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:27:37.741
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:27:45.891 (8.149s)
> Enter [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:604 @ 07/16/23 23:27:45.891
STEP: routing requests to the canary upstream when header value does not match and cookie is set to 'always' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:630 @ 07/16/23 23:28:03.119
< Exit [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:604 @ 07/16/23 23:28:03.125 (17.268s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:03.125
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:03.604 (479ms)
-
-
- > Enter [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:03.605
< Exit [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:11.902 (8.297s)
> Enter [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:35 @ 07/16/23 23:28:11.902
< Exit [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:35 @ 07/16/23 23:28:23.063 (11.161s)
> Enter [It] should not trust X-Forwarded-For header when setting is false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:78 @ 07/16/23 23:28:23.063
< Exit [It] should not trust X-Forwarded-For header when setting is false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:78 @ 07/16/23 23:28:40.338 (17.309s)
> Enter [AfterEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:40.338
< Exit [AfterEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:40.752 (414ms)
-
-
- > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:40.754
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:49.068 (8.315s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 07/16/23 23:28:49.068
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 07/16/23 23:28:53.189 (4.121s)
> Enter [It] picks up the previously missing secret for a given ingress without reloading - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:70 @ 07/16/23 23:28:53.189
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:94 @ 07/16/23 23:29:10.345
STEP: skipping Nginx reload - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:101 @ 07/16/23 23:29:13.397
< Exit [It] picks up the previously missing secret for a given ingress without reloading - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:70 @ 07/16/23 23:29:13.425 (20.27s)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:13.425
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:13.959 (534ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:13.961
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:22.387 (8.427s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:29:22.387
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:29:26.497 (4.11s)
> Enter [BeforeEach] With watch-ingress-without-class flag - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:462 @ 07/16/23 23:29:26.497
< Exit [BeforeEach] With watch-ingress-without-class flag - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:462 @ 07/16/23 23:29:34.509 (8.047s)
> Enter [It] should watch Ingress with no class and ignore ingress with a different class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:482 @ 07/16/23 23:29:34.509
< Exit [It] should watch Ingress with no class and ignore ingress with a different class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:482 @ 07/16/23 23:29:51.844 (17.335s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:51.844
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:52.449 (605ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:52.451
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:30:02.775 (10.363s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:30:02.775
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:30:08.866 (6.091s)
> Enter [It] should allow - matching origin+port with wildcard origin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:488 @ 07/16/23 23:30:08.866
< Exit [It] should allow - matching origin+port with wildcard origin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:488 @ 07/16/23 23:30:15.919 (7.053s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:30:15.919
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:30:16.435 (515ms)
-
-
- > Enter [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:30:16.437
< Exit [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:30:40.742 (24.37s)
> Enter [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:38 @ 07/16/23 23:30:40.742
< Exit [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:38 @ 07/16/23 23:30:57.46 (16.718s)
> Enter [It] should set the X-Forwarded-Port header to 443 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:100 @ 07/16/23 23:30:57.46
< Exit [It] should set the X-Forwarded-Port header to 443 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:100 @ 07/16/23 23:31:14.185 (16.763s)
> Enter [AfterEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:14.185
< Exit [AfterEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:14.687 (502ms)
-
-
-
- > Enter [BeforeEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:14.689
< Exit [BeforeEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:23.074 (8.386s)
> Enter [It] disables access logging for default backend - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:105 @ 07/16/23 23:31:23.074
[SKIPPED] enable-access-log-for-default-backend
In [It] at: /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:107 @ 07/16/23 23:31:23.075
< Exit [It] disables access logging for default backend - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:105 @ 07/16/23 23:31:23.075 (0s)
> Enter [AfterEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:23.075
< Exit [AfterEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:23.495 (420ms)
-
-
- > Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:23.497
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:32.125 (8.663s)
> Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 07/16/23 23:31:32.125
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 07/16/23 23:31:46.863 (14.738s)
> Enter [It] handles endpoints only changes consistently (down scaling of replicas vs. empty service) - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:125 @ 07/16/23 23:31:46.863
< Exit [It] handles endpoints only changes consistently (down scaling of replicas vs. empty service) - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:125 @ 07/16/23 23:32:13.132 (26.303s)
> Enter [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:13.132
< Exit [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:13.542 (410ms)
-
-
- > Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:13.543
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:21.845 (8.301s)
> Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 07/16/23 23:32:21.845
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 07/16/23 23:32:32.94 (11.13s)
> Enter [It] should allow Ingress with rules - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:123 @ 07/16/23 23:32:32.94
< Exit [It] should allow Ingress with rules - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:123 @ 07/16/23 23:32:43.229 (10.289s)
> Enter [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:43.229
< Exit [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:43.683 (454ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:43.686
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:52.383 (8.697s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 07/16/23 23:32:52.383
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 07/16/23 23:32:56.466 (4.083s)
> Enter [It] should validate auth-tls-verify-client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:206 @ 07/16/23 23:32:56.466
< Exit [It] should validate auth-tls-verify-client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:206 @ 07/16/23 23:33:11.547 (15.115s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:11.547
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:11.984 (436ms)
-
-
- > Enter [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:11.986
< Exit [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:20.45 (8.464s)
> Enter [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:39 @ 07/16/23 23:33:20.45
< Exit [BeforeEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:39 @ 07/16/23 23:33:32.659 (12.244s)
> Enter [It] should pass unknown traffic to default backend and handle known traffic - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:79 @ 07/16/23 23:33:32.659
Jul 16 23:34:02.788: INFO: Unexpected TLS error: tls: failed to verify certificate: x509: certificate is valid for ingress.local, not noannotationnopassthrough.com
< Exit [It] should pass unknown traffic to default backend and handle known traffic - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_passthrough.go:79 @ 07/16/23 23:34:08.035 (35.41s)
> Enter [AfterEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:08.036
< Exit [AfterEach] [Flag] enable-ssl-passthrough - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:08.724 (688ms)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:08.73
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:16.88 (8.151s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:34:16.881
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:34:20.959 (4.078s)
> Enter [It] should enable modsecurity - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:35 @ 07/16/23 23:34:20.959
< Exit [It] should enable modsecurity - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:35 @ 07/16/23 23:34:31.272 (10.348s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:31.272
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:31.691 (419ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:31.694
< Exit [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:41.1 (9.407s)
> Enter [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:43 @ 07/16/23 23:34:41.1
< Exit [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:43 @ 07/16/23 23:35:00.246 (19.146s)
> Enter [It] should return status code 401 when accessing '/' unauthentication - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:54 @ 07/16/23 23:35:00.246
< Exit [It] should return status code 401 when accessing '/' unauthentication - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:54 @ 07/16/23 23:35:03.378 (3.166s)
> Enter [AfterEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:03.378
< Exit [AfterEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:03.897 (519ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:03.899
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:12.446 (8.548s)
> Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 07/16/23 23:35:12.446
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 07/16/23 23:35:16.511 (4.065s)
> Enter [It] proxy-ssl-location-only flag should change the nginx config server part - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:150 @ 07/16/23 23:35:16.511
< Exit [It] proxy-ssl-location-only flag should change the nginx config server part - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:150 @ 07/16/23 23:35:49.692 (33.215s)
> Enter [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:49.692
< Exit [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:50.092 (400ms)
-
-
- > Enter [BeforeEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:98 @ 07/16/23 23:35:50.093
< Exit [BeforeEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:98 @ 07/16/23 23:35:52.103 (2.01s)
> Enter [It] fails when using alias directive - /go/src/k8s.io/ingress-nginx/test/e2e/nginx/nginx.go:115 @ 07/16/23 23:35:52.103
< Exit [It] fails when using alias directive - /go/src/k8s.io/ingress-nginx/test/e2e/nginx/nginx.go:115 @ 07/16/23 23:36:52.175 (1m0.14s)
> Enter [AfterEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:99 @ 07/16/23 23:36:52.175
< Exit [AfterEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:99 @ 07/16/23 23:36:52.185 (10ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:52.186
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:02.922 (10.77s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:37:02.922
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:37:07.012 (4.09s)
> Enter [It] should ignore Ingress with different controller class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:104 @ 07/16/23 23:37:07.012
< Exit [It] should ignore Ingress with different controller class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:104 @ 07/16/23 23:37:24.253 (17.242s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:24.253
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:24.676 (423ms)
-
-
- > Enter [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:24.678
< Exit [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:32.973 (8.329s)
> Enter [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:30 @ 07/16/23 23:37:32.973
< Exit [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:30 @ 07/16/23 23:37:37.052 (4.079s)
> Enter [It] set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:34 @ 07/16/23 23:37:37.052
< Exit [It] set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:34 @ 07/16/23 23:37:47.815 (10.762s)
> Enter [AfterEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:47.815
< Exit [AfterEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:48.335 (520ms)
-
-
- > Enter [BeforeEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:48.336
< Exit [BeforeEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:58.16 (9.824s)
> Enter [It] should return 503 when all backend service endpoints are unavailable - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_backend.go:54 @ 07/16/23 23:37:58.16
< Exit [It] should return 503 when all backend service endpoints are unavailable - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_backend.go:54 @ 07/16/23 23:38:08.445 (10.319s)
> Enter [AfterEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:08.445
< Exit [AfterEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:08.913 (468ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:08.914
< Exit [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:16.27 (7.355s)
> Enter [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:33 @ 07/16/23 23:38:16.27
< Exit [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:33 @ 07/16/23 23:38:27.37 (11.1s)
> Enter [It] should block CIDRs defined in the ConfigMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:38 @ 07/16/23 23:38:27.37
< Exit [It] should block CIDRs defined in the ConfigMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:38 @ 07/16/23 23:38:37.659 (10.323s)
> Enter [AfterEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:37.659
< Exit [AfterEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:38.366 (708ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:38.369
< Exit [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:50.759 (12.39s)
> Enter [It] authorization metadata should be overwritten by external auth response headers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:126 @ 07/16/23 23:38:50.759
< Exit [It] authorization metadata should be overwritten by external auth response headers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:126 @ 07/16/23 23:39:09.202 (18.477s)
> Enter [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:09.202
< Exit [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:09.666 (464ms)
-
-
- > Enter [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:09.667
< Exit [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:20.364 (10.697s)
> Enter [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:32 @ 07/16/23 23:39:20.364
< Exit [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:32 @ 07/16/23 23:39:26.451 (6.087s)
> Enter [It] should return status code 200 for host 'foo' and 'bar' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:62 @ 07/16/23 23:39:26.451
< Exit [It] should return status code 200 for host 'foo' and 'bar' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:62 @ 07/16/23 23:39:36.677 (10.26s)
> Enter [AfterEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:36.677
< Exit [AfterEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:37.244 (568ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:37.246
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:46.548 (9.301s)
> Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 07/16/23 23:39:46.548
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 07/16/23 23:39:48.593 (2.045s)
> Enter [It] should add fastcgi_param in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:71 @ 07/16/23 23:39:48.593
< Exit [It] should add fastcgi_param in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:71 @ 07/16/23 23:39:58.782 (10.188s)
> Enter [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:58.782
< Exit [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:59.281 (499ms)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:59.283
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:09.944 (10.696s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:40:09.944
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:40:14.019 (4.074s)
> Enter [It] should disable default modsecurity conf setting when modsecurity-snippet is specified - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:347 @ 07/16/23 23:40:14.019
< Exit [It] should disable default modsecurity conf setting when modsecurity-snippet is specified - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:347 @ 07/16/23 23:40:36.276 (22.292s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:36.276
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:37.147 (871ms)
-
-
- > Enter [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:37.158
< Exit [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:45.052 (7.894s)
> Enter [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:80 @ 07/16/23 23:40:45.052
< Exit [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:80 @ 07/16/23 23:40:55.399 (10.347s)
> Enter [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:55.399
< Exit [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:56.086 (686ms)
-
-
- > Enter [BeforeEach] [Annotations] whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:56.088
< Exit [BeforeEach] [Annotations] whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:41:04.49 (8.436s)
> Enter [BeforeEach] [Annotations] whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipwhitelist.go:30 @ 07/16/23 23:41:04.49
< Exit [BeforeEach] [Annotations] whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipwhitelist.go:30 @ 07/16/23 23:41:08.564 (4.074s)
> Enter [It] should set valid ip whitelist range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipwhitelist.go:34 @ 07/16/23 23:41:08.564
< Exit [It] should set valid ip whitelist range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipwhitelist.go:34 @ 07/16/23 23:41:18.798 (10.233s)
> Enter [AfterEach] [Annotations] whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:18.798
< Exit [AfterEach] [Annotations] whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:19.252 (455ms)
-
-
- > Enter [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:41:19.254
< Exit [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:41:27.682 (8.428s)
> Enter [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:67 @ 07/16/23 23:41:27.682
< Exit [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:67 @ 07/16/23 23:41:37.904 (10.256s)
> Enter [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:37.904
< Exit [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:38.533 (629ms)
-
-
- > Enter [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:07:34.181
< Exit [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:07:48.294 (14.113s)
> Enter [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:33 @ 07/16/23 23:07:48.294
< Exit [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:33 @ 07/16/23 23:08:06.535 (18.275s)
> Enter [It] should list the backend servers - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:37 @ 07/16/23 23:08:06.535
< Exit [It] should list the backend servers - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:37 @ 07/16/23 23:08:19.035 (12.5s)
> Enter [AfterEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:19.036
< Exit [AfterEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:22.623 (3.587s)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:22.634
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:33.298 (10.698s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:08:33.298
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:08:41.456 (8.158s)
> Enter [It] does not crash when canary ingress has multiple paths to the same non-matching backend - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:915 @ 07/16/23 23:08:41.456
< Exit [It] does not crash when canary ingress has multiple paths to the same non-matching backend - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:915 @ 07/16/23 23:08:58.789 (17.333s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:58.789
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:59.423 (634ms)
-
-
- > Enter [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:59.425
< Exit [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:07.036 (7.646s)
> Enter [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:31 @ 07/16/23 23:09:07.036
< Exit [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:31 @ 07/16/23 23:09:11.131 (4.095s)
> Enter [It] only allow explicitly allowed IPs, deny all others - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:86 @ 07/16/23 23:09:11.131
STEP: sending request from an explicitly denied IP range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:115 @ 07/16/23 23:09:28.355
STEP: sending request from an implicitly denied IP - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:123 @ 07/16/23 23:09:28.363
STEP: sending request from an explicitly allowed IP range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:131 @ 07/16/23 23:09:28.369
STEP: sending request from an explicitly allowed IP range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:139 @ 07/16/23 23:09:28.381
< Exit [It] only allow explicitly allowed IPs, deny all others - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:86 @ 07/16/23 23:09:35.394 (24.298s)
> Enter [AfterEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:35.394
< Exit [AfterEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:35.813 (419ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:35.815
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:43.362 (7.548s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:09:43.362
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:09:51.533 (8.17s)
> Enter [It] should not use canary with domain as a server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:891 @ 07/16/23 23:09:51.533
< Exit [It] should not use canary with domain as a server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:891 @ 07/16/23 23:10:08.703 (17.205s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:08.703
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:09.316 (613ms)
-
-
- > Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:09.318
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:18.473 (9.154s)
> Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 07/16/23 23:10:18.473
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 07/16/23 23:10:29.549 (11.076s)
> Enter [It] should respect port passed by the PROXY Protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:46 @ 07/16/23 23:10:29.549
< Exit [It] should respect port passed by the PROXY Protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:46 @ 07/16/23 23:12:01.67 (1m32.267s)
> Enter [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:01.67
< Exit [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:02.208 (575ms)
-
-
- > Enter [BeforeEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:02.214
< Exit [BeforeEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:10.539 (8.324s)
> Enter [It] should be enabled by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/multi_accept.go:31 @ 07/16/23 23:12:10.539
< Exit [It] should be enabled by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/multi_accept.go:31 @ 07/16/23 23:12:13.724 (3.185s)
> Enter [AfterEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:13.724
< Exit [AfterEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:14.29 (566ms)
-
-
- > Enter [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:14.293
< Exit [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:23.098 (8.805s)
> Enter [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:33 @ 07/16/23 23:12:23.098
< Exit [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:33 @ 07/16/23 23:12:27.239 (4.141s)
> Enter [It] should produce valid JSON for /dbg general - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:85 @ 07/16/23 23:12:27.239
< Exit [It] should produce valid JSON for /dbg general - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:85 @ 07/16/23 23:12:34.414 (7.21s)
> Enter [AfterEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:34.414
< Exit [AfterEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:35.005 (591ms)
-
-
- > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:35.039
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:42.388 (7.349s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 07/16/23 23:12:42.388
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 07/16/23 23:12:46.475 (4.088s)
> Enter [BeforeEach] should configure TLS protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:47 @ 07/16/23 23:12:46.475
Jul 16 23:12:56.021: INFO: Unexpected TLS error: tls: failed to verify certificate: x509: certificate is valid for ingress.local, not settings-tls
< Exit [BeforeEach] should configure TLS protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:47 @ 07/16/23 23:12:58.041 (11.565s)
> Enter [It] setting cipher suite - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:65 @ 07/16/23 23:12:58.041
< Exit [It] setting cipher suite - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:65 @ 07/16/23 23:13:08.414 (10.408s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:08.414
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:08.876 (461ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:08.877
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:18.056 (9.178s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:13:18.056
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:13:22.157 (4.101s)
> Enter [It] should not allow - single origin without port and origin with required port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:405 @ 07/16/23 23:13:22.157
< Exit [It] should not allow - single origin without port and origin with required port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:405 @ 07/16/23 23:13:29.225 (7.069s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:29.225
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:29.887 (662ms)
-
-
- > Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:29.89
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:39.107 (9.251s)
> Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 07/16/23 23:13:39.107
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 07/16/23 23:13:43.181 (4.074s)
> Enter [It] [BAD_ANNOTATIONS] should drop an ingress if there is an invalid character in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:36 @ 07/16/23 23:13:43.181
< Exit [It] [BAD_ANNOTATIONS] should drop an ingress if there is an invalid character in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:36 @ 07/16/23 23:14:10.942 (27.795s)
> Enter [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:10.942
< Exit [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:11.517 (575ms)
-
-
- > Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:11.518
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:22.99 (11.472s)
> Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 07/16/23 23:14:22.99
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 07/16/23 23:14:27.23 (4.24s)
> Enter [It] should exists opentelemetry directive when is enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:60 @ 07/16/23 23:14:27.23
< Exit [It] should exists opentelemetry directive when is enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:60 @ 07/16/23 23:14:49.899 (22.703s)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:49.899
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:57.182 (7.283s)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 07/16/23 23:14:57.182
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 07/16/23 23:14:57.182 (0s)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:57.184
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:08.252 (11.102s)
> Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 07/16/23 23:15:08.252
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 07/16/23 23:15:12.39 (4.138s)
> Enter [It] should set backend protocol to grpcs:// and use grpc_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:79 @ 07/16/23 23:15:12.39
< Exit [It] should set backend protocol to grpcs:// and use grpc_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:79 @ 07/16/23 23:15:22.633 (10.243s)
> Enter [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:22.633
< Exit [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:23.102 (469ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:23.104
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:31.984 (8.914s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:15:31.984
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:15:36.044 (4.06s)
> Enter [It] should not break functionality with extra domain - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:314 @ 07/16/23 23:15:36.044
< Exit [It] should not break functionality with extra domain - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:314 @ 07/16/23 23:15:43.084 (7.04s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:43.084
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:43.533 (449ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:43.534
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:53.243 (9.708s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:15:53.243
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:16:01.378 (8.135s)
> Enter [It] should route requests only to canary if canary weight is equal to canary weight total - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:775 @ 07/16/23 23:16:01.378
< Exit [It] should route requests only to canary if canary weight is equal to canary weight total - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:775 @ 07/16/23 23:16:18.568 (17.224s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:18.568
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:19.084 (516ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:19.086
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:27.839 (8.752s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:16:27.839
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:16:31.857 (4.053s)
> Enter [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:383 @ 07/16/23 23:16:31.857
< Exit [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:383 @ 07/16/23 23:16:53.175 (21.318s)
> Enter [It] user with annotated ingress retains cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:433 @ 07/16/23 23:16:53.175
< Exit [It] user with annotated ingress retains cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:433 @ 07/16/23 23:16:58.37 (5.195s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:58.37
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:58.799 (429ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:58.8
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:07.105 (8.339s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:17:07.105
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:17:15.232 (8.127s)
> Enter [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:301 @ 07/16/23 23:17:15.232
< Exit [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:301 @ 07/16/23 23:17:43.549 (28.352s)
> Enter [It] user retains cookie by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:326 @ 07/16/23 23:17:43.549
< Exit [It] user retains cookie by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:326 @ 07/16/23 23:17:43.559 (9ms)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:43.559
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:44.126 (567ms)
-
-
-
- > Enter [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:44.132
< Exit [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:52.272 (8.14s)
> Enter [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:42 @ 07/16/23 23:17:52.272
< Exit [BeforeEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:42 @ 07/16/23 23:17:56.337 (4.065s)
> Enter [It] should only allow requests from specific countries - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:70 @ 07/16/23 23:17:56.338
[SKIPPED] GeoIP test are temporarily disabled
In [It] at: /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:71 @ 07/16/23 23:17:56.338
< Exit [It] should only allow requests from specific countries - /go/src/k8s.io/ingress-nginx/test/e2e/settings/geoip2.go:70 @ 07/16/23 23:17:56.338 (0s)
> Enter [AfterEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:56.338
< Exit [AfterEach] [Setting] Geoip2 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:56.866 (528ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:56.867
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:05.372 (8.539s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:18:05.372
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:18:09.472 (4.1s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:18:09.472
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:18:23.753 (14.281s)
> Enter [It] keeps processing new ingresses even if one of the existing ingresses is misconfigured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:505 @ 07/16/23 23:18:23.753
< Exit [It] keeps processing new ingresses even if one of the existing ingresses is misconfigured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:505 @ 07/16/23 23:18:35.016 (11.297s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:35.016
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:35.607 (591ms)
-
-
- > Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:35.609
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:43.138 (7.529s)
> Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 07/16/23 23:18:43.138
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 07/16/23 23:18:54.215 (11.077s)
> Enter [It] should respect proto passed by the PROXY Protocol server port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:79 @ 07/16/23 23:18:54.216
< Exit [It] should respect proto passed by the PROXY Protocol server port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:79 @ 07/16/23 23:20:26.407 (1m32.295s)
> Enter [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:26.407
< Exit [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:26.885 (478ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:26.887
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:37.187 (10.334s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:20:37.187
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:20:45.389 (8.202s)
> Enter [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:532 @ 07/16/23 23:20:45.389
STEP: routing requests to the mainline upstream when header is set to 'DoCananry' and header-value is 'DoCanary' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:557 @ 07/16/23 23:21:02.659
< Exit [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:532 @ 07/16/23 23:21:02.665 (17.31s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:02.665
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:03.083 (418ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:03.085
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:11.612 (8.528s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:21:11.613
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:21:15.676 (4.064s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:21:15.676
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:21:30.005 (14.329s)
> Enter [It] should not create additional upstream block when auth-keepalive is not set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:552 @ 07/16/23 23:21:30.005
< Exit [It] should not create additional upstream block when auth-keepalive is not set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:552 @ 07/16/23 23:21:53.323 (23.352s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:53.323
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:53.812 (489ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:53.814
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:03.724 (9.944s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:22:03.724
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:22:07.799 (4.075s)
> Enter [It] should setup proxy cookies - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:215 @ 07/16/23 23:22:07.799
< Exit [It] should setup proxy cookies - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:215 @ 07/16/23 23:22:17.991 (10.193s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:17.992
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:18.348 (357ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:18.35
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:25.849 (7.5s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:22:25.849
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:22:29.974 (4.125s)
> Enter [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 07/16/23 23:22:29.975
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 07/16/23 23:22:35.051
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 07/16/23 23:22:45.228
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 07/16/23 23:22:55.444
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 07/16/23 23:23:05.609
< Exit [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 07/16/23 23:23:20.804 (50.898s)
> Enter [It] should redirect to signin url when not signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:849 @ 07/16/23 23:23:20.804
< Exit [It] should redirect to signin url when not signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:849 @ 07/16/23 23:23:20.815 (11ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:20.815
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:21.307 (492ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:21.309
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:29.836 (8.527s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:23:29.836
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:23:33.883 (4.082s)
> Enter [BeforeEach] Without IngressClass Cluster scoped Permission - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:587 @ 07/16/23 23:23:33.883
< Exit [BeforeEach] Without IngressClass Cluster scoped Permission - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:587 @ 07/16/23 23:23:40.947 (7.064s)
> Enter [It] should watch Ingress with correct annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:631 @ 07/16/23 23:23:40.947
< Exit [It] should watch Ingress with correct annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:631 @ 07/16/23 23:23:51.186 (10.238s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:51.186
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:51.782 (596ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:51.784
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:01.236 (9.487s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:24:01.236
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:24:07.344 (6.108s)
> Enter [BeforeEach] With specific ingress-class flags - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:392 @ 07/16/23 23:24:07.344
< Exit [BeforeEach] With specific ingress-class flags - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:392 @ 07/16/23 23:24:16.393 (9.049s)
> Enter [It] should ignore Ingress with no class and accept the correctly configured Ingresses - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:413 @ 07/16/23 23:24:16.393
< Exit [It] should ignore Ingress with no class and accept the correctly configured Ingresses - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:413 @ 07/16/23 23:24:40.653 (24.294s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:40.653
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:41.482 (829ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:41.484
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:50.125 (8.641s)
> Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 07/16/23 23:24:50.125
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 07/16/23 23:24:54.192 (4.067s)
> Enter [It] should set backend protocol to grpc:// and use grpc_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:64 @ 07/16/23 23:24:54.192
< Exit [It] should set backend protocol to grpc:// and use grpc_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:64 @ 07/16/23 23:25:04.321 (10.163s)
> Enter [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:04.321
< Exit [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:04.923 (601ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:04.925
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:13.199 (8.274s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:25:13.199
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:25:17.26 (4.061s)
> Enter [It] should not break functionality - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:267 @ 07/16/23 23:25:17.26
< Exit [It] should not break functionality - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:267 @ 07/16/23 23:25:24.298 (7.039s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:24.298
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:24.749 (451ms)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:24.752
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:33.474 (8.756s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:25:33.474
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:25:37.542 (4.067s)
> Enter [It] should enable modsecurity through the config map - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:264 @ 07/16/23 23:25:37.542
< Exit [It] should enable modsecurity through the config map - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:264 @ 07/16/23 23:26:06.773 (29.265s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:06.773
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:07.274 (502ms)
-
-
- > Enter [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:07.276
< Exit [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:15.787 (8.511s)
> Enter [It] use the default configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:32 @ 07/16/23 23:26:15.787
< Exit [It] use the default configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:32 @ 07/16/23 23:26:18.987 (3.2s)
> Enter [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:18.987
< Exit [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:19.381 (394ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:19.383
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:27.733 (8.35s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:26:27.733
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:26:31.801 (4.102s)
> Enter [It] should not match - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:338 @ 07/16/23 23:26:31.801
< Exit [It] should not match - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:338 @ 07/16/23 23:26:38.85 (7.05s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:38.85
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:39.478 (628ms)
-
-
- > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:39.479
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:48.115 (8.636s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 07/16/23 23:26:48.115
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 07/16/23 23:26:59.194 (11.079s)
> Enter [It] log-format-escape-json enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:82 @ 07/16/23 23:26:59.195
< Exit [It] log-format-escape-json enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:82 @ 07/16/23 23:27:12.403 (13.243s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:12.403
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:13.018 (615ms)
-
-
- > Enter [BeforeEach] [Setting] [Load Balancer] round-robin - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:13.019
< Exit [BeforeEach] [Setting] [Load Balancer] round-robin - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:21.582 (8.563s)
> Enter [BeforeEach] [Setting] [Load Balancer] round-robin - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/round_robin.go:34 @ 07/16/23 23:27:21.582
< Exit [BeforeEach] [Setting] [Load Balancer] round-robin - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/round_robin.go:34 @ 07/16/23 23:27:34.703 (13.156s)
> Enter [It] should evenly distribute requests with round-robin (default algorithm) - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/round_robin.go:39 @ 07/16/23 23:27:34.703
< Exit [It] should evenly distribute requests with round-robin (default algorithm) - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/round_robin.go:39 @ 07/16/23 23:29:42.768 (2m8.202s)
> Enter [AfterEach] [Setting] [Load Balancer] round-robin - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:42.769
< Exit [AfterEach] [Setting] [Load Balancer] round-robin - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:43.223 (454ms)
-
-
- > Enter [BeforeEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:43.227
< Exit [BeforeEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:53.678 (10.45s)
> Enter [It] Check persistent affinity mode - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinitymode.go:67 @ 07/16/23 23:29:53.678
< Exit [It] Check persistent affinity mode - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinitymode.go:67 @ 07/16/23 23:31:59.236 (2m5.735s)
> Enter [AfterEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:59.236
< Exit [AfterEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:59.608 (372ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:59.609
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:07.878 (8.303s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:32:07.878
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:32:16 (8.122s)
> Enter [It] should route requests to the correct upstream if mainline ingress is created before the canary ingress - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:161 @ 07/16/23 23:32:16
STEP: routing requests destined for the mainline ingress to the maineline upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:185 @ 07/16/23 23:32:33.194
STEP: routing requests destined for the canary ingress to the canary upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:195 @ 07/16/23 23:32:33.2
< Exit [It] should route requests to the correct upstream if mainline ingress is created before the canary ingress - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:161 @ 07/16/23 23:32:33.205 (17.24s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:33.206
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:33.607 (402ms)
-
-
- > Enter [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:33.609
< Exit [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:42.047 (8.438s)
> Enter [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:32 @ 07/16/23 23:32:42.047
< Exit [BeforeEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:32 @ 07/16/23 23:32:44.131 (2.084s)
> Enter [It] should return status code 200 for hosts defined in two ingresses, different path with one alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:87 @ 07/16/23 23:32:44.131
< Exit [It] should return status code 200 for hosts defined in two ingresses, different path with one alias - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/alias.go:87 @ 07/16/23 23:33:01.382 (17.284s)
> Enter [AfterEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:01.382
< Exit [AfterEach] [Annotations] server-alias - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:01.909 (527ms)
-
-
- > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:01.911
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:09.441 (7.531s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 07/16/23 23:33:09.441
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 07/16/23 23:33:13.505 (4.063s)
> Enter [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 07/16/23 23:33:13.505
STEP: configuring certificate_by_lua and skipping Nginx configuration of the new certificate - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:128 @ 07/16/23 23:33:30.702
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:136 @ 07/16/23 23:33:38.854
< Exit [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 07/16/23 23:33:38.882 (25.412s)
> Enter [It] supports requests with domain with trailing dot - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:145 @ 07/16/23 23:33:38.883
< Exit [It] supports requests with domain with trailing dot - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:145 @ 07/16/23 23:33:38.915 (33ms)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:38.915
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:39.351 (436ms)
-
-
- > Enter [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:39.353
< Exit [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:47.674 (8.321s)
> Enter [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:34 @ 07/16/23 23:33:47.674
< Exit [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:34 @ 07/16/23 23:33:51.753 (4.079s)
> Enter [It] should redirect from www HTTP to HTTP - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:38 @ 07/16/23 23:33:51.753
STEP: setting up server for redirect from www - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:39 @ 07/16/23 23:33:51.753
STEP: sending request to www.fromtowwwredirect.bar.com - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:55 @ 07/16/23 23:34:01.902
< Exit [It] should redirect from www HTTP to HTTP - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:38 @ 07/16/23 23:34:01.908 (10.19s)
> Enter [AfterEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:01.908
< Exit [AfterEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:02.385 (477ms)
-
-
- > Enter [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:02.387
< Exit [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:10.798 (8.412s)
> Enter [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:32 @ 07/16/23 23:34:10.798
< Exit [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:32 @ 07/16/23 23:34:14.981 (4.183s)
> Enter [It] should disable mirror-request-body - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:67 @ 07/16/23 23:34:14.981
< Exit [It] should disable mirror-request-body - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:67 @ 07/16/23 23:34:25.139 (10.158s)
> Enter [AfterEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:25.139
< Exit [AfterEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:25.527 (388ms)
-
-
- > Enter [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:25.529
< Exit [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:34.003 (8.508s)
> Enter [It] should be disabled by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:32 @ 07/16/23 23:34:34.003
< Exit [It] should be disabled by default - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:32 @ 07/16/23 23:34:37.287 (3.284s)
> Enter [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:37.287
< Exit [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:37.727 (440ms)
-
-
- > Enter [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:37.729
< Exit [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:46.195 (8.467s)
> Enter [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:36 @ 07/16/23 23:34:46.195
< Exit [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:36 @ 07/16/23 23:34:50.299 (4.103s)
> Enter [It] should use the Service Cluster IP and Port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:70 @ 07/16/23 23:34:50.299
STEP: checking if the service is reached - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:82 @ 07/16/23 23:35:07.674
STEP: checking if the Service Cluster IP and Port are used - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:89 @ 07/16/23 23:35:07.684
< Exit [It] should use the Service Cluster IP and Port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:70 @ 07/16/23 23:35:07.935 (17.671s)
> Enter [AfterEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:07.935
< Exit [AfterEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:08.597 (662ms)
-
-
- > Enter [BeforeEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:08.599
< Exit [BeforeEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:16.925 (8.326s)
> Enter [It] should have worker_rlimit_nofile option and be independent on amount of worker processes - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_options.go:38 @ 07/16/23 23:35:16.925
< Exit [It] should have worker_rlimit_nofile option and be independent on amount of worker processes - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_options.go:38 @ 07/16/23 23:35:27.115 (10.19s)
> Enter [AfterEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:27.115
< Exit [AfterEach] global-options - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:27.606 (491ms)
-
-
- > Enter [BeforeEach] [Setting] [Load Balancer] load-balance - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:27.607
< Exit [BeforeEach] [Setting] [Load Balancer] load-balance - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:36.182 (8.609s)
> Enter [BeforeEach] [Setting] [Load Balancer] load-balance - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/configmap.go:31 @ 07/16/23 23:35:36.182
< Exit [BeforeEach] [Setting] [Load Balancer] load-balance - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/configmap.go:31 @ 07/16/23 23:35:40.286 (4.104s)
> Enter [It] should apply the configmap load-balance setting - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/configmap.go:35 @ 07/16/23 23:35:40.286
< Exit [It] should apply the configmap load-balance setting - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/configmap.go:35 @ 07/16/23 23:35:57.881 (17.595s)
> Enter [AfterEach] [Setting] [Load Balancer] load-balance - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:57.882
< Exit [AfterEach] [Setting] [Load Balancer] load-balance - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:58.487 (606ms)
-
-
- > Enter [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:58.488
< Exit [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:08.838 (10.384s)
> Enter [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:42 @ 07/16/23 23:36:08.838
< Exit [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:42 @ 07/16/23 23:36:08.844 (7ms)
> Enter [It] should expose a TCP service - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:46 @ 07/16/23 23:36:08.844
< Exit [It] should expose a TCP service - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:46 @ 07/16/23 23:36:20.132 (11.288s)
> Enter [AfterEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:20.132
< Exit [AfterEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:20.736 (604ms)
-
-
- > Enter [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:20.747
< Exit [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:35.265 (14.553s)
> Enter [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:38 @ 07/16/23 23:36:35.265
< Exit [BeforeEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:38 @ 07/16/23 23:36:40.48 (5.214s)
> Enter [It] should set X-Forwarded-Port headers accordingly when listening on a non-default HTTP port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:48 @ 07/16/23 23:36:40.48
< Exit [It] should set X-Forwarded-Port headers accordingly when listening on a non-default HTTP port - /go/src/k8s.io/ingress-nginx/test/e2e/settings/listen_nondefault_ports.go:48 @ 07/16/23 23:36:50.676 (10.196s)
> Enter [AfterEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:50.676
< Exit [AfterEach] [Flag] custom HTTP and HTTPS ports - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:51.171 (494ms)
-
-
- > Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:51.175
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:05.11 (13.969s)
> Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 07/16/23 23:37:05.11
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 07/16/23 23:37:07.17 (2.06s)
> Enter [It] [BAD_ANNOTATIONS] should drop an ingress if there is a forbidden word in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:67 @ 07/16/23 23:37:07.17
< Exit [It] [BAD_ANNOTATIONS] should drop an ingress if there is a forbidden word in some annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:67 @ 07/16/23 23:37:39.655 (32.519s)
> Enter [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:39.655
< Exit [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:40.653 (998ms)
-
-
- > Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:40.661
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:51.734 (11.073s)
> Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 07/16/23 23:37:51.734
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 07/16/23 23:38:03.848 (12.148s)
> Enter [It] should ignore catch all Ingress with backend - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:50 @ 07/16/23 23:38:03.849
< Exit [It] should ignore catch all Ingress with backend - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:50 @ 07/16/23 23:38:24.234 (20.386s)
> Enter [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:24.234
< Exit [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:24.679 (445ms)
-
-
- > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:24.68
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:32.938 (8.292s)
> Enter [It] should return 200 for service type=ExternalName without a port defined - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:95 @ 07/16/23 23:38:32.938
< Exit [It] should return 200 for service type=ExternalName without a port defined - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:95 @ 07/16/23 23:38:43.94 (11.002s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:43.94
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:44.431 (490ms)
-
-
- > Enter [BeforeEach] [Service] Nil Service Backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:44.432
< Exit [BeforeEach] [Service] Nil Service Backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:52.684 (8.252s)
> Enter [BeforeEach] [Service] Nil Service Backend - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_nil_backend.go:34 @ 07/16/23 23:38:52.684
< Exit [BeforeEach] [Service] Nil Service Backend - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_nil_backend.go:34 @ 07/16/23 23:38:56.739 (4.055s)
> Enter [It] should return 404 when backend service is nil - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_nil_backend.go:38 @ 07/16/23 23:38:56.739
STEP: setting an ingress with a nil backend - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_nil_backend.go:39 @ 07/16/23 23:38:56.739
< Exit [It] should return 404 when backend service is nil - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_nil_backend.go:38 @ 07/16/23 23:39:14.138 (17.433s)
> Enter [AfterEach] [Service] Nil Service Backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:14.138
< Exit [AfterEach] [Service] Nil Service Backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:14.962 (824ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:14.965
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:24.07 (9.105s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:39:24.07
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:39:28.143 (4.073s)
> Enter [It] should allow headers for cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:137 @ 07/16/23 23:39:28.143
< Exit [It] should allow headers for cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:137 @ 07/16/23 23:39:38.36 (10.251s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:38.36
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:39.039 (679ms)
-
-
- > Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:39.042
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:48.893 (9.851s)
> Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 07/16/23 23:39:48.893
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 07/16/23 23:40:03.237 (14.378s)
> Enter [It] configures balancer Lua middleware correctly - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:50 @ 07/16/23 23:40:03.237
< Exit [It] configures balancer Lua middleware correctly - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:50 @ 07/16/23 23:40:09.71 (6.473s)
> Enter [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:09.71
< Exit [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:10.252 (542ms)
-
-
- > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:10.253
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:19.088 (8.835s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 07/16/23 23:40:19.088
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 07/16/23 23:40:23.173 (4.085s)
> Enter [It] picks up the certificate when we add TLS spec to existing ingress - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:45 @ 07/16/23 23:40:23.173
< Exit [It] picks up the certificate when we add TLS spec to existing ingress - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:45 @ 07/16/23 23:40:38.779 (15.64s)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:38.779
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:39.307 (527ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:39.308
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:47.706 (8.397s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:40:47.706
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:40:55.919 (8.214s)
> Enter [It] respects always and never values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:643 @ 07/16/23 23:40:55.919
STEP: routing requests to the canary upstream when cookie is set to 'always' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:667 @ 07/16/23 23:41:13.225
STEP: routing requests to the mainline upstream when cookie is set to 'never' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:678 @ 07/16/23 23:41:21.42
STEP: routing requests to the mainline upstream when cookie is set to anything else - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:689 @ 07/16/23 23:41:31.387
< Exit [It] respects always and never values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:643 @ 07/16/23 23:41:41.387 (45.536s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:41.387
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:41.882 (496ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:07:34.174
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:07:47.886 (13.712s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:07:47.886
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:08:05.964 (18.112s)
> Enter [It] should set cors max-age - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:78 @ 07/16/23 23:08:05.964
< Exit [It] should set cors max-age - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:78 @ 07/16/23 23:08:16.513 (10.55s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:16.513
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:18.635 (2.121s)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:18.644
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:33.277 (14.667s)
> Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 07/16/23 23:08:33.277
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 07/16/23 23:08:37.346 (4.069s)
> Enter [It] should add fastcgi_index in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:54 @ 07/16/23 23:08:37.346
< Exit [It] should add fastcgi_index in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:54 @ 07/16/23 23:08:47.641 (10.296s)
> Enter [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:47.641
< Exit [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:48.061 (420ms)
-
-
-
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:48.065
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:56.738 (8.673s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:08:56.738
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:09:02.831 (6.128s)
> Enter [It] should set proxy_redirect to off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:36 @ 07/16/23 23:09:02.831
< Exit [It] should set proxy_redirect to off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:36 @ 07/16/23 23:09:13.19 (10.358s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:13.19
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:13.879 (690ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:13.881
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:23.851 (9.97s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:09:23.851
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:09:27.921 (4.07s)
> Enter [It] should return status code 503 when authentication is configured with an invalid secret - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:65 @ 07/16/23 23:09:27.921
< Exit [It] should return status code 503 when authentication is configured with an invalid secret - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:65 @ 07/16/23 23:09:38.098 (10.211s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:38.098
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:38.641 (542ms)
-
-
- > Enter [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:38.642
< Exit [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:47.013 (8.37s)
> Enter [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:32 @ 07/16/23 23:09:47.013
< Exit [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:32 @ 07/16/23 23:09:51.1 (4.087s)
> Enter [It] should set valid proxy send timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:36 @ 07/16/23 23:09:51.1
< Exit [It] should set valid proxy send timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:36 @ 07/16/23 23:10:08.284 (17.218s)
> Enter [AfterEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:08.284
< Exit [AfterEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:08.876 (592ms)
-
-
- > Enter [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:08.879
< Exit [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:17.058 (8.179s)
> Enter [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:37 @ 07/16/23 23:10:17.058
< Exit [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:37 @ 07/16/23 23:10:21.245 (4.187s)
> Enter [It] should add value of stream-snippet to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:41 @ 07/16/23 23:10:21.245
< Exit [It] should add value of stream-snippet to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:41 @ 07/16/23 23:10:36.438 (15.228s)
> Enter [AfterEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:36.438
< Exit [AfterEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:37.064 (626ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:37.067
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:45.508 (8.441s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:10:45.508
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:10:49.586 (4.077s)
> Enter [It] should set cache_key when external auth cache is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:322 @ 07/16/23 23:10:49.586
< Exit [It] should set cache_key when external auth cache is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:322 @ 07/16/23 23:10:59.919 (10.333s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:59.919
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:11:00.531 (612ms)
-
-
- > Enter [BeforeEach] [SSL] redirect to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:11:00.533
< Exit [BeforeEach] [SSL] redirect to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:11:09.091 (8.614s)
> Enter [BeforeEach] [SSL] redirect to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/http_redirect.go:32 @ 07/16/23 23:11:09.091
< Exit [BeforeEach] [SSL] redirect to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/http_redirect.go:32 @ 07/16/23 23:11:13.182 (4.091s)
> Enter [It] should redirect from HTTP to HTTPS when secret is missing - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/http_redirect.go:36 @ 07/16/23 23:11:13.182
< Exit [It] should redirect from HTTP to HTTPS when secret is missing - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/http_redirect.go:36 @ 07/16/23 23:11:26.418 (13.236s)
> Enter [AfterEach] [SSL] redirect to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:11:26.418
< Exit [AfterEach] [SSL] redirect to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:11:26.883 (466ms)
-
-
- > Enter [BeforeEach] [Annotations] custom-http-errors - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:11:26.886
< Exit [BeforeEach] [Annotations] custom-http-errors - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:11:35.167 (8.337s)
> Enter [BeforeEach] [Annotations] custom-http-errors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:37 @ 07/16/23 23:11:35.167
< Exit [BeforeEach] [Annotations] custom-http-errors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:37 @ 07/16/23 23:11:39.249 (4.082s)
> Enter [It] configures Nginx correctly - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:41 @ 07/16/23 23:11:39.249
STEP: turning on proxy_intercept_errors directive - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:59 @ 07/16/23 23:11:49.509
STEP: configuring error_page directive - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:62 @ 07/16/23 23:11:49.509
STEP: creating error locations - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:67 @ 07/16/23 23:11:49.509
STEP: updating configuration when only custom-http-error value changes - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:72 @ 07/16/23 23:11:49.509
STEP: ignoring duplicate values (503 in this case) per server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:90 @ 07/16/23 23:11:55.803
STEP: using the custom default-backend from annotation for upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:102 @ 07/16/23 23:12:06.081
< Exit [It] configures Nginx correctly - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/customhttperrors.go:41 @ 07/16/23 23:12:16.315 (37.103s)
> Enter [AfterEach] [Annotations] custom-http-errors - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:16.315
< Exit [AfterEach] [Annotations] custom-http-errors - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:17.092 (777ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:17.094
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:26.253 (9.159s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:12:26.253
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:12:30.38 (4.127s)
> Enter [BeforeEach] with invalid auth-url should deny whole location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:866 @ 07/16/23 23:12:30.38
< Exit [BeforeEach] with invalid auth-url should deny whole location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:866 @ 07/16/23 23:12:40.55 (10.205s)
> Enter [It] should return 503 (location was denied) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:879 @ 07/16/23 23:12:40.55
< Exit [It] should return 503 (location was denied) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:879 @ 07/16/23 23:12:40.557 (7ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:40.557
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:41.043 (485ms)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:41.045
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:49.182 (8.137s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:12:49.182
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:12:53.256 (4.074s)
> Enter [It] should enable modsecurity when enable-owasp-modsecurity-crs is set to true - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:225 @ 07/16/23 23:12:53.256
< Exit [It] should enable modsecurity when enable-owasp-modsecurity-crs is set to true - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:225 @ 07/16/23 23:13:22.75 (29.529s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:22.751
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:23.247 (496ms)
-
-
- > Enter [BeforeEach] [Setting] OCSP - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:23.249
< Exit [BeforeEach] [Setting] OCSP - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:32.429 (9.214s)
> Enter [BeforeEach] [Setting] OCSP - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:45 @ 07/16/23 23:13:32.429
< Exit [BeforeEach] [Setting] OCSP - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:45 @ 07/16/23 23:13:36.507 (4.079s)
> Enter [It] should enable OCSP and contain stapling information in the connection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:49 @ 07/16/23 23:13:36.507
STEP: running cfssl gencert -initca ca_csr.json | cfssljson -bare ca - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:216 @ 07/16/23 23:13:43.545
STEP: running cfssl gencert -ca ca.pem -ca-key ca-key.pem -config=cfssl_config.json -profile=intermediate intermediate_ca_csr.json | cfssljson -bare intermediate_ca - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:216 @ 07/16/23 23:13:43.952
STEP: running cfssl gencert -ca intermediate_ca.pem -ca-key intermediate_ca-key.pem -config=cfssl_config.json -profile=ocsp ocsp_csr.json | cfssljson -bare ocsp - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:216 @ 07/16/23 23:13:44.496
STEP: running cfssl serve -db-config=db-config.json -ca-key=intermediate_ca-key.pem -ca=intermediate_ca.pem -config=cfssl_config.json -responder=ocsp.pem -responder-key=ocsp-key.pem - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:228 @ 07/16/23 23:13:44.802
STEP: running cfssl gencert -remote=localhost -profile=server leaf_csr.json | cfssljson -bare leaf - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:238 @ 07/16/23 23:13:49.804
STEP: running cfssl ocsprefresh -ca intermediate_ca.pem -responder=ocsp.pem -responder-key=ocsp-key.pem -db-config=db-config.json - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:252 @ 07/16/23 23:13:50.312
< Exit [It] should enable OCSP and contain stapling information in the connection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ocsp/ocsp.go:49 @ 07/16/23 23:14:19.018 (42.545s)
> Enter [AfterEach] [Setting] OCSP - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:19.019
< Exit [AfterEach] [Setting] OCSP - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:19.766 (748ms)
-
-
- > Enter [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:19.784
< Exit [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:28.844 (9.06s)
> Enter [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:38 @ 07/16/23 23:14:28.844
< Exit [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:38 @ 07/16/23 23:14:32.923 (4.113s)
> Enter [It] should configure satisfy directive correctly - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:42 @ 07/16/23 23:14:32.923
< Exit [It] should configure satisfy directive correctly - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:42 @ 07/16/23 23:14:58.308 (25.386s)
> Enter [AfterEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:58.309
< Exit [AfterEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:58.898 (590ms)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:58.904
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:07.074 (8.204s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:15:07.074
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:15:11.143 (4.069s)
> Enter [It] should enable opentracing using zipkin - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:160 @ 07/16/23 23:15:11.143
< Exit [It] should enable opentracing using zipkin - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:160 @ 07/16/23 23:15:31.188 (20.046s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:31.189
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:31.695 (506ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:15:31.695
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:15:31.695 (0s)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:31.698
< Exit [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:40.015 (8.352s)
> Enter [It] should return OK for service with backend protocol GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:68 @ 07/16/23 23:15:40.015
< Exit [It] should return OK for service with backend protocol GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:68 @ 07/16/23 23:15:56.386 (16.37s)
> Enter [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:56.386
< Exit [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:56.782 (396ms)
-
-
- > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:56.784
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:04.113 (7.363s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 07/16/23 23:16:04.113
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 07/16/23 23:16:08.211 (4.099s)
> Enter [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 07/16/23 23:16:08.211
STEP: configuring certificate_by_lua and skipping Nginx configuration of the new certificate - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:128 @ 07/16/23 23:16:25.445
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:136 @ 07/16/23 23:16:33.599
< Exit [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 07/16/23 23:16:33.62 (25.443s)
> Enter [It] falls back to using default certificate when secret gets deleted without reloading - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:185 @ 07/16/23 23:16:33.62
STEP: serving the default certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:204 @ 07/16/23 23:16:38.67
STEP: skipping Nginx reload - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:214 @ 07/16/23 23:16:38.72
< Exit [It] falls back to using default certificate when secret gets deleted without reloading - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:185 @ 07/16/23 23:16:38.72 (5.1s)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:38.72
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:39.166 (446ms)
-
-
- > Enter [BeforeEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:98 @ 07/16/23 23:16:39.168
< Exit [BeforeEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:98 @ 07/16/23 23:16:41.179 (2.011s)
> Enter [It] fails when using root directive - /go/src/k8s.io/ingress-nginx/test/e2e/nginx/nginx.go:124 @ 07/16/23 23:16:41.179
< Exit [It] fails when using root directive - /go/src/k8s.io/ingress-nginx/test/e2e/nginx/nginx.go:124 @ 07/16/23 23:17:41.25 (1m0.14s)
> Enter [AfterEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:99 @ 07/16/23 23:17:41.25
< Exit [AfterEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:99 @ 07/16/23 23:17:41.266 (16ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:41.269
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:49.268 (7.999s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:17:49.268
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:17:53.439 (4.171s)
> Enter [It] should set proxy_redirect to hello.com goodbye.com - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:68 @ 07/16/23 23:17:53.439
< Exit [It] should set proxy_redirect to hello.com goodbye.com - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:68 @ 07/16/23 23:18:03.611 (10.206s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:03.611
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:04.065 (454ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:04.067
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:11.387 (7.321s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:18:11.387
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:18:15.513 (4.126s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:18:15.513
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:18:29.758 (14.244s)
> Enter [It] should not create additional upstream block when host part of auth-url contains a variable - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:570 @ 07/16/23 23:18:29.758
< Exit [It] should not create additional upstream block when host part of auth-url contains a variable - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:570 @ 07/16/23 23:18:52.938 (23.215s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:52.938
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:53.44 (502ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:53.442
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:01.722 (8.314s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:19:01.722
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:19:05.782 (4.06s)
> Enter [It] should not break functionality - without `*` - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:291 @ 07/16/23 23:19:05.782
< Exit [It] should not break functionality - without `*` - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:291 @ 07/16/23 23:19:12.827 (7.045s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:12.827
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:13.418 (591ms)
-
-
- > Enter [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:13.419
< Exit [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:21.929 (8.511s)
> Enter [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:31 @ 07/16/23 23:19:21.93
< Exit [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:31 @ 07/16/23 23:19:26.01 (4.081s)
> Enter [It] disable-http-access-log set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:53 @ 07/16/23 23:19:26.011
< Exit [It] disable-http-access-log set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:53 @ 07/16/23 23:19:43.294 (17.318s)
> Enter [AfterEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:43.294
< Exit [AfterEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:43.763 (468ms)
-
-
- > Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:43.765
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:53.125 (9.36s)
> Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 07/16/23 23:19:53.125
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 07/16/23 23:19:57.249 (4.124s)
> Enter [It] should not exists opentelemetry_operation_name directive when is empty - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:89 @ 07/16/23 23:19:57.249
< Exit [It] should not exists opentelemetry_operation_name directive when is empty - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:89 @ 07/16/23 23:20:14.861 (17.646s)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:14.861
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:15.741 (880ms)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 07/16/23 23:20:15.741
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 07/16/23 23:20:15.741 (0s)
-
-
- > Enter [BeforeEach] [Ingress] DeepInspection - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:15.743
< Exit [BeforeEach] [Ingress] DeepInspection - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:24.398 (8.655s)
> Enter [BeforeEach] [Ingress] DeepInspection - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/deep_inspection.go:30 @ 07/16/23 23:20:24.398
< Exit [BeforeEach] [Ingress] DeepInspection - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/deep_inspection.go:30 @ 07/16/23 23:20:28.465 (4.067s)
> Enter [It] should drop whole ingress if one path matches invalid regex - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/deep_inspection.go:34 @ 07/16/23 23:20:28.465
< Exit [It] should drop whole ingress if one path matches invalid regex - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/deep_inspection.go:34 @ 07/16/23 23:20:45.696 (17.265s)
> Enter [AfterEach] [Ingress] DeepInspection - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:45.696
< Exit [AfterEach] [Ingress] DeepInspection - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:46.089 (393ms)
-
-
- > Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:46.09
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:54.488 (8.398s)
> Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 07/16/23 23:20:54.488
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 07/16/23 23:21:05.565 (11.111s)
> Enter [It] should set keep alive connection timeout to upstream server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:68 @ 07/16/23 23:21:05.565
< Exit [It] should set keep alive connection timeout to upstream server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:68 @ 07/16/23 23:21:15.847 (10.282s)
> Enter [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:15.847
< Exit [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:16.528 (681ms)
-
-
- > Enter [BeforeEach] [Annotations] http2-push-preload - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:16.53
< Exit [BeforeEach] [Annotations] http2-push-preload - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:26.755 (10.225s)
> Enter [BeforeEach] [Annotations] http2-push-preload - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/http2pushpreload.go:30 @ 07/16/23 23:21:26.755
< Exit [BeforeEach] [Annotations] http2-push-preload - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/http2pushpreload.go:30 @ 07/16/23 23:21:30.816 (4.061s)
> Enter [It] enable the http2-push-preload directive - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/http2pushpreload.go:34 @ 07/16/23 23:21:30.816
< Exit [It] enable the http2-push-preload directive - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/http2pushpreload.go:34 @ 07/16/23 23:21:41.003 (10.222s)
> Enter [AfterEach] [Annotations] http2-push-preload - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:41.003
< Exit [AfterEach] [Annotations] http2-push-preload - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:41.534 (531ms)
-
-
- > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:41.538
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:50.229 (8.691s)
> Enter [It] should return 200 for service type=ExternalName using a port name - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:184 @ 07/16/23 23:21:50.229
< Exit [It] should return 200 for service type=ExternalName using a port name - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:184 @ 07/16/23 23:22:00.623 (10.393s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:00.623
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:00.983 (361ms)
-
-
- > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:00.985
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:09.37 (8.419s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 07/16/23 23:22:09.37
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 07/16/23 23:22:20.486 (11.116s)
> Enter [It] should set server_names_hash_bucket_size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:40 @ 07/16/23 23:22:20.486
< Exit [It] should set server_names_hash_bucket_size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:40 @ 07/16/23 23:22:30.763 (10.277s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:30.763
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:31.515 (787ms)
-
-
- > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:31.521
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:40.235 (8.714s)
> Enter [It] works with external name set to incomplete fqdn - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:62 @ 07/16/23 23:22:40.235
< Exit [It] works with external name set to incomplete fqdn - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:62 @ 07/16/23 23:22:54.509 (14.274s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:54.509
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:55.102 (593ms)
-
-
- > Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:55.104
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:03.655 (8.585s)
> Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 07/16/23 23:23:03.655
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 07/16/23 23:23:14.739 (11.084s)
> Enter [It] should set keepalive connection to upstream server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:59 @ 07/16/23 23:23:14.739
< Exit [It] should set keepalive connection to upstream server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:59 @ 07/16/23 23:23:25.032 (10.292s)
> Enter [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:25.032
< Exit [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:25.8 (768ms)
-
-
- > Enter [BeforeEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:98 @ 07/16/23 23:23:25.803
< Exit [BeforeEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:98 @ 07/16/23 23:23:27.816 (2.013s)
> Enter [It] start nginx with default configuration - /go/src/k8s.io/ingress-nginx/test/e2e/nginx/nginx.go:102 @ 07/16/23 23:23:27.816
< Exit [It] start nginx with default configuration - /go/src/k8s.io/ingress-nginx/test/e2e/nginx/nginx.go:102 @ 07/16/23 23:23:36.925 (9.144s)
> Enter [AfterEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:99 @ 07/16/23 23:23:36.925
< Exit [AfterEach] [Setting] nginx-configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:99 @ 07/16/23 23:23:36.938 (13ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:36.94
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:45.412 (8.472s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:23:45.412
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:23:49.52 (4.108s)
> Enter [It] should not set proxy client-max-body-size to incorrect value - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:100 @ 07/16/23 23:23:49.52
< Exit [It] should not set proxy client-max-body-size to incorrect value - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:100 @ 07/16/23 23:23:59.723 (10.203s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:59.723
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:00.261 (538ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:00.263
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:07.782 (7.554s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:24:07.782
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:24:11.858 (4.076s)
> Enter [It] should return status code 200 when no authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:46 @ 07/16/23 23:24:11.858
< Exit [It] should return status code 200 when no authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:46 @ 07/16/23 23:24:22.095 (10.237s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:22.095
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:22.827 (732ms)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:22.835
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:31.215 (8.414s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:24:31.215
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:24:33.268 (2.053s)
> Enter [It] should not exists opentracing_location_operation_name directive when is empty - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:130 @ 07/16/23 23:24:33.268
< Exit [It] should not exists opentracing_location_operation_name directive when is empty - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:130 @ 07/16/23 23:24:50.51 (17.242s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:50.51
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:51.166 (657ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:24:51.166
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:24:51.166 (0s)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:51.169
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:00.029 (8.86s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:25:00.029
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:25:08.096 (8.101s)
> Enter [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:490 @ 07/16/23 23:25:08.096
STEP: routing requests to the canary upstream when header pattern is matched - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:514 @ 07/16/23 23:25:25.318
STEP: routing requests to the mainline upstream when header failed to match header value - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:523 @ 07/16/23 23:25:25.328
< Exit [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:490 @ 07/16/23 23:25:25.338 (17.243s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:25.339
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:25.856 (517ms)
-
-
- > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:25.858
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:34.445 (8.622s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 07/16/23 23:25:34.445
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 07/16/23 23:25:45.53 (11.085s)
> Enter [It] should set vmap-hash-bucket-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:100 @ 07/16/23 23:25:45.53
< Exit [It] should set vmap-hash-bucket-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:100 @ 07/16/23 23:25:55.715 (10.185s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:55.715
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:56.172 (456ms)
-
-
- > Enter [BeforeEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:56.173
< Exit [BeforeEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:04.819 (8.68s)
> Enter [It] should respond with a standard redirect code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:33 @ 07/16/23 23:26:04.819
STEP: setting permanent-redirect annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:34 @ 07/16/23 23:26:04.819
STEP: sending request to redirected URL path - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:52 @ 07/16/23 23:26:15.073
< Exit [It] should respond with a standard redirect code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/redirect.go:33 @ 07/16/23 23:26:15.081 (10.263s)
> Enter [AfterEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:15.081
< Exit [AfterEach] [Annotations] permanent-redirect permanent-redirect-code - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:15.564 (482ms)
-
-
- > Enter [BeforeEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:15.565
< Exit [BeforeEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:23.961 (8.396s)
> Enter [It] should return 404 sending requests when only a default backend is running - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:33 @ 07/16/23 23:26:23.961
STEP: basic HTTP GET request without host to path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 07/16/23 23:26:28.963
STEP: basic HTTP GET request without host to path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 07/16/23 23:26:28.977
STEP: basic HTTPS GET request without host to path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 07/16/23 23:26:28.992
STEP: basic HTTPS GET request without host to path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 07/16/23 23:26:29.017
STEP: basic HTTP POST request without host to path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 07/16/23 23:26:29.044
STEP: basic HTTP POST request without host to path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 07/16/23 23:26:29.06
STEP: basic HTTPS POST request without host to path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 07/16/23 23:26:29.371
STEP: basic HTTPS POST request without host to path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 07/16/23 23:26:29.776
STEP: basic HTTP GET request to host foo.bar.com and path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 07/16/23 23:26:30.197
STEP: basic HTTP GET request to host foo.bar.com and path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 07/16/23 23:26:30.574
STEP: basic HTTPS GET request to host foo.bar.com and path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 07/16/23 23:26:30.98
STEP: basic HTTPS GET request to host foo.bar.com and path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 07/16/23 23:26:31.34
STEP: basic HTTP POST request to host foo.bar.com and path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 07/16/23 23:26:31.743
STEP: basic HTTP POST request to host foo.bar.com and path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 07/16/23 23:26:32.136
STEP: basic HTTPS POST request to host foo.bar.com and path / should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 07/16/23 23:26:32.539
STEP: basic HTTPS POST request to host foo.bar.com and path /demo should return 404 - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:66 @ 07/16/23 23:26:32.97
< Exit [It] should return 404 sending requests when only a default backend is running - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/default_backend.go:33 @ 07/16/23 23:26:33.344 (9.418s)
> Enter [AfterEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:33.344
< Exit [AfterEach] [Default Backend] - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:33.883 (539ms)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:33.885
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:41.697 (7.812s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:26:41.697
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:26:45.787 (4.089s)
> Enter [It] should propagate the w3c header when configured with jaeger - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:197 @ 07/16/23 23:26:45.787
< Exit [It] should propagate the w3c header when configured with jaeger - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:197 @ 07/16/23 23:27:16.141 (30.389s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:16.141
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:16.729 (588ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:27:16.729
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:27:16.729 (0s)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:16.734
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:27.28 (10.546s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:27:27.28
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:27:35.372 (8.127s)
> Enter [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:426 @ 07/16/23 23:27:35.373
STEP: routing requests to the canary upstream when header is set to 'DoCanary' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:451 @ 07/16/23 23:27:52.596
STEP: routing requests to the mainline upstream when header is set to 'always' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:460 @ 07/16/23 23:27:52.607
STEP: routing requests to the mainline upstream when header is set to 'never' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:469 @ 07/16/23 23:27:52.618
STEP: routing requests to the mainline upstream when header is set to anything else - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:478 @ 07/16/23 23:27:52.624
< Exit [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:426 @ 07/16/23 23:27:52.632 (17.259s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:52.632
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:53.184 (552ms)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:53.185
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:01.521 (8.37s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:28:01.521
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:28:05.603 (4.082s)
> Enter [It] should exists opentracing_location_operation_name directive when is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:145 @ 07/16/23 23:28:05.603
< Exit [It] should exists opentracing_location_operation_name directive when is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:145 @ 07/16/23 23:28:22.87 (17.267s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:22.87
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:23.292 (422ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:28:23.292
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:28:23.292 (0s)
-
-
- > Enter [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:23.293
< Exit [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:31.555 (8.296s)
> Enter [It] should set gzip_min_length to 100 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:78 @ 07/16/23 23:28:31.555
< Exit [It] should set gzip_min_length to 100 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:78 @ 07/16/23 23:28:48.825 (17.268s)
> Enter [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:48.825
< Exit [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:49.416 (591ms)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:49.42
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:57.983 (8.563s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:28:57.983
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:29:02.021 (4.072s)
> Enter [It] should not exists opentracing_operation_name directive when is empty - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:100 @ 07/16/23 23:29:02.021
< Exit [It] should not exists opentracing_operation_name directive when is empty - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:100 @ 07/16/23 23:29:19.271 (17.25s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:19.271
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:19.996 (725ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:29:19.996
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:29:19.996 (0s)
-
-
- > Enter [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:19.999
< Exit [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:27.495 (7.496s)
> Enter [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:32 @ 07/16/23 23:29:27.495
< Exit [BeforeEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:32 @ 07/16/23 23:29:31.525 (4.064s)
> Enter [It] should not set invalid proxy send timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:52 @ 07/16/23 23:29:31.525
< Exit [It] should not set invalid proxy send timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_send_timeout.go:52 @ 07/16/23 23:29:48.787 (17.262s)
> Enter [AfterEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:48.787
< Exit [AfterEach] [Setting] proxy-send-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:49.468 (682ms)
-
-
- > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:49.475
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:58.075 (8.6s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 07/16/23 23:29:58.075
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 07/16/23 23:30:09.134 (11.098s)
> Enter [It] should set variables-hash-max-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:88 @ 07/16/23 23:30:09.134
< Exit [It] should set variables-hash-max-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:88 @ 07/16/23 23:30:19.281 (10.147s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:30:19.281
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:30:19.775 (494ms)
-
-
- > Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:30:19.783
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:30:29.478 (9.696s)
> Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 07/16/23 23:30:29.478
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 07/16/23 23:30:33.47 (4.057s)
> Enter [It] should include opentelemetry_trust_incoming_spans on directive when enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:74 @ 07/16/23 23:30:33.471
< Exit [It] should include opentelemetry_trust_incoming_spans on directive when enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:74 @ 07/16/23 23:30:54.972 (21.502s)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:30:54.973
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:00.749 (5.815s)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 07/16/23 23:31:00.749
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 07/16/23 23:31:00.749 (0s)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:00.828
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:08.468 (7.64s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:31:08.468
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:31:16.616 (8.148s)
> Enter [It] always routes traffic to canary if first request was affinitized to canary (explicit sticky behavior) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:1000 @ 07/16/23 23:31:16.616
< Exit [It] always routes traffic to canary if first request was affinitized to canary (explicit sticky behavior) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:1000 @ 07/16/23 23:31:42.294 (25.713s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:42.294
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:42.864 (569ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:42.867
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:51.421 (8.554s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:31:51.421
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:31:55.49 (4.069s)
> Enter [It] should return status code 401 when authentication is configured but Authorization header is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:89 @ 07/16/23 23:31:55.49
< Exit [It] should return status code 401 when authentication is configured but Authorization header is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:89 @ 07/16/23 23:32:06.723 (11.267s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:06.723
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:07.164 (442ms)
-
-
- > Enter [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:07.168
< Exit [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:14.509 (7.341s)
> Enter [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:35 @ 07/16/23 23:32:14.509
< Exit [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:35 @ 07/16/23 23:32:25.596 (11.087s)
> Enter [It] should not trust X-Forwarded headers when setting is false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:92 @ 07/16/23 23:32:25.596
< Exit [It] should not trust X-Forwarded headers when setting is false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:92 @ 07/16/23 23:32:42.761 (17.199s)
> Enter [AfterEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:42.761
< Exit [AfterEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:43.179 (418ms)
-
-
- > Enter [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:43.184
< Exit [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:51.238 (8.053s)
> Enter [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:54 @ 07/16/23 23:32:51.238
< Exit [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:54 @ 07/16/23 23:33:01.441 (10.238s)
> Enter [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:01.442
< Exit [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:02.003 (562ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:02.007
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:11.575 (9.568s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:33:11.575
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:33:19.722 (8.147s)
> Enter [It] should route requests split between mainline and canary if canary weight is 100 and weight total is 200 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:834 @ 07/16/23 23:33:19.722
< Exit [It] should route requests split between mainline and canary if canary weight is 100 and weight total is 200 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:834 @ 07/16/23 23:34:15.058 (55.405s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:15.058
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:15.476 (418ms)
-
-
- > Enter [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:15.477
< Exit [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:23.831 (8.354s)
> Enter [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:32 @ 07/16/23 23:34:23.831
< Exit [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:32 @ 07/16/23 23:34:27.893 (4.061s)
> Enter [It] should set mirror-target to https://test.env.com/$request_uri - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:51 @ 07/16/23 23:34:27.893
< Exit [It] should set mirror-target to https://test.env.com/$request_uri - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:51 @ 07/16/23 23:34:38.318 (10.46s)
> Enter [AfterEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:38.318
< Exit [AfterEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:38.801 (483ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:38.803
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:48.547 (9.744s)
> Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 07/16/23 23:34:48.547
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 07/16/23 23:34:52.605 (4.058s)
> Enter [It] should set backend protocol to $scheme:// and use proxy_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:49 @ 07/16/23 23:34:52.605
< Exit [It] should set backend protocol to $scheme:// and use proxy_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:49 @ 07/16/23 23:35:02.751 (10.18s)
> Enter [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:02.751
< Exit [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:03.297 (546ms)
-
-
- > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:03.312
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:11.68 (8.368s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 07/16/23 23:35:11.68
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 07/16/23 23:35:22.776 (11.096s)
> Enter [It] should disable the log-format-escape-json - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:55 @ 07/16/23 23:35:22.776
< Exit [It] should disable the log-format-escape-json - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:55 @ 07/16/23 23:35:32.97 (10.229s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:32.97
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:33.388 (418ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:33.39
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:41.909 (8.519s)
> Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 07/16/23 23:35:41.909
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 07/16/23 23:35:43.975 (2.066s)
> Enter [It] should return OK for service with backend protocol FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:102 @ 07/16/23 23:35:43.975
< Exit [It] should return OK for service with backend protocol FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:102 @ 07/16/23 23:35:54.184 (10.209s)
> Enter [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:54.184
< Exit [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:54.637 (453ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:54.638
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:04.492 (9.888s)
> Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 07/16/23 23:36:04.492
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 07/16/23 23:36:10.59 (6.098s)
> Enter [It] should set valid proxy-ssl-secret, proxy-ssl-verify to on, proxy-ssl-verify-depth to 2, and proxy-ssl-server-name to on - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:64 @ 07/16/23 23:36:10.59
< Exit [It] should set valid proxy-ssl-secret, proxy-ssl-verify to on, proxy-ssl-verify-depth to 2, and proxy-ssl-server-name to on - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:64 @ 07/16/23 23:36:21.417 (10.826s)
> Enter [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:21.417
< Exit [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:21.909 (492ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:21.91
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:31.441 (9.565s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:36:31.441
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:36:39.575 (8.135s)
> Enter [It] should route requests only to canary if canary weight is 100 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:743 @ 07/16/23 23:36:39.575
< Exit [It] should route requests only to canary if canary weight is 100 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:743 @ 07/16/23 23:36:56.821 (17.246s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:56.821
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:57.222 (400ms)
-
-
- > Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:57.223
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:07.971 (10.783s)
> Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 07/16/23 23:37:07.971
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 07/16/23 23:37:19.071 (11.099s)
> Enter [It] should set keepalive time to upstream server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:77 @ 07/16/23 23:37:19.071
< Exit [It] should set keepalive time to upstream server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:77 @ 07/16/23 23:37:29.282 (10.212s)
> Enter [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:29.283
< Exit [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:29.692 (409ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:29.693
< Exit [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:38.006 (8.347s)
> Enter [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:43 @ 07/16/23 23:37:38.006
< Exit [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:43 @ 07/16/23 23:37:58.271 (20.264s)
> Enter [It] should return status code 200 when accessing '/' authentication - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:68 @ 07/16/23 23:37:58.271
< Exit [It] should return status code 200 when accessing '/' authentication - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:68 @ 07/16/23 23:38:02.529 (4.293s)
> Enter [AfterEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:02.529
< Exit [AfterEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:02.964 (434ms)
-
-
- > Enter [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:02.971
< Exit [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:11.459 (8.488s)
> Enter [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:34 @ 07/16/23 23:38:11.459
< Exit [BeforeEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:34 @ 07/16/23 23:38:22.582 (11.122s)
> Enter [It] Add multiple custom headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:65 @ 07/16/23 23:38:22.582
< Exit [It] Add multiple custom headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/custom_header.go:65 @ 07/16/23 23:38:32.759 (10.211s)
> Enter [AfterEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:32.759
< Exit [AfterEach] [Setting] add-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:33.178 (419ms)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:33.18
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:41.812 (8.632s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:38:41.812
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:38:49.899 (8.087s)
> Enter [It] should enable modsecurity without using 'modsecurity on;' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:110 @ 07/16/23 23:38:49.899
< Exit [It] should enable modsecurity without using 'modsecurity on;' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:110 @ 07/16/23 23:39:07.104 (17.239s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:07.104
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:07.608 (504ms)
-
-
- > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:07.617
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:15.244 (7.627s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 07/16/23 23:39:15.244
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 07/16/23 23:39:21.419 (6.176s)
> Enter [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 07/16/23 23:39:21.42
STEP: configuring certificate_by_lua and skipping Nginx configuration of the new certificate - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:128 @ 07/16/23 23:39:38.597
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:136 @ 07/16/23 23:39:46.821
< Exit [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 07/16/23 23:39:46.84 (25.455s)
> Enter [It] picks up the updated certificate without reloading - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:149 @ 07/16/23 23:39:46.841
STEP: configuring certificate_by_lua and skipping Nginx configuration of the new certificate - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:163 @ 07/16/23 23:39:52.033
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:169 @ 07/16/23 23:39:55.176
STEP: skipping Nginx reload - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:180 @ 07/16/23 23:39:58.206
< Exit [It] picks up the updated certificate without reloading - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:149 @ 07/16/23 23:39:58.206 (11.366s)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:58.206
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:58.754 (548ms)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:58.76
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:07.505 (8.774s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:40:07.505
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:40:13.578 (6.073s)
> Enter [It] should exists opentracing directive when is enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:71 @ 07/16/23 23:40:13.578
< Exit [It] should exists opentracing directive when is enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:71 @ 07/16/23 23:40:30.774 (17.231s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:30.774
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:31.257 (483ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:40:31.257
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:40:31.258 (0s)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:31.26
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:39.618 (8.359s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:40:39.619
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:40:45.749 (6.13s)
> Enter [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 07/16/23 23:40:45.749
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 07/16/23 23:40:50.946
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 07/16/23 23:41:01.126
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 07/16/23 23:41:11.35
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 07/16/23 23:41:21.559
< Exit [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 07/16/23 23:41:36.857 (51.177s)
> Enter [It] should return status code 200 when signed in after auth backend is deleted - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:772 @ 07/16/23 23:41:36.857
< Exit [It] should return status code 200 when signed in after auth backend is deleted - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:772 @ 07/16/23 23:41:43.93 (7.073s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:43.93
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:44.372 (442ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:07:34.287
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:07:49.044 (14.757s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:07:49.044
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:08:05.568 (16.559s)
> Enter [It] should route requests only to mainline if canary weight is 0 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:705 @ 07/16/23 23:08:05.569
< Exit [It] should route requests only to mainline if canary weight is 0 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:705 @ 07/16/23 23:08:27.887 (22.318s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:27.887
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:28.576 (689ms)
-
-
- > Enter [BeforeEach] [Setting] Add no tls redirect locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:28.582
< Exit [BeforeEach] [Setting] Add no tls redirect locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:36.857 (8.309s)
> Enter [It] Check no tls redirect locations config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_tls_redirect_locations.go:31 @ 07/16/23 23:08:36.857
< Exit [It] Check no tls redirect locations config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_tls_redirect_locations.go:31 @ 07/16/23 23:08:57.345 (20.488s)
> Enter [AfterEach] [Setting] Add no tls redirect locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:57.345
< Exit [AfterEach] [Setting] Add no tls redirect locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:57.948 (603ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:57.95
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:06.944 (9.028s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:09:06.944
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:09:25.075 (18.131s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:09:25.075
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 07/16/23 23:09:25.075
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 07/16/23 23:09:35.276
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 07/16/23 23:09:45.533
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:09:55.741 (30.7s)
> Enter [It] should set request-redirect when global-auth-request-redirect is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:237 @ 07/16/23 23:09:55.741
STEP: Adding a global-auth-request-redirect to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:242 @ 07/16/23 23:09:55.741
< Exit [It] should set request-redirect when global-auth-request-redirect is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:237 @ 07/16/23 23:10:05.886 (10.18s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:05.886
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:06.357 (471ms)
-
-
- > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:06.359
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:15.633 (9.274s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 07/16/23 23:10:15.633
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 07/16/23 23:10:26.724 (11.091s)
> Enter [It] log-format default escape - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:105 @ 07/16/23 23:10:26.724
< Exit [It] log-format default escape - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:105 @ 07/16/23 23:10:40.107 (13.418s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:40.107
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:40.707 (600ms)
-
-
- > Enter [BeforeEach] [Setting] [Load Balancer] EWMA - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:40.727
< Exit [BeforeEach] [Setting] [Load Balancer] EWMA - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:49.212 (8.485s)
> Enter [BeforeEach] [Setting] [Load Balancer] EWMA - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/ewma.go:34 @ 07/16/23 23:10:49.212
< Exit [BeforeEach] [Setting] [Load Balancer] EWMA - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/ewma.go:34 @ 07/16/23 23:11:00.338 (11.126s)
> Enter [It] does not fail requests - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/ewma.go:42 @ 07/16/23 23:11:00.338
Jul 16 23:11:14.762: INFO: Request distribution: map[echo-7b6bf466cc-k5lq4:6 echo-7b6bf466cc-xhgrs:9 echo-7b6bf466cc-zm2tc:15]
< Exit [It] does not fail requests - /go/src/k8s.io/ingress-nginx/test/e2e/loadbalance/ewma.go:42 @ 07/16/23 23:11:14.762 (14.48s)
> Enter [AfterEach] [Setting] [Load Balancer] EWMA - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:11:14.762
< Exit [AfterEach] [Setting] [Load Balancer] EWMA - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:11:15.337 (574ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:11:15.344
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:11:23.899 (8.554s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:11:23.899
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:11:28.014 (4.115s)
> Enter [It] should not set affinity across all server locations when using separate ingresses - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:320 @ 07/16/23 23:11:28.014
< Exit [It] should not set affinity across all server locations when using separate ingresses - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:320 @ 07/16/23 23:11:45.272 (17.315s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:11:45.272
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:11:46.053 (781ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:11:46.055
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:11:54.592 (8.537s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:11:54.592
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:12:02.74 (8.185s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:12:02.741
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 07/16/23 23:12:02.741
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 07/16/23 23:12:12.97
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 07/16/23 23:12:23.365
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:12:33.703 (30.997s)
> Enter [It] should add custom error page when global-auth-signin url is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:210 @ 07/16/23 23:12:33.703
STEP: Adding a global-auth-signin to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:215 @ 07/16/23 23:12:33.703
< Exit [It] should add custom error page when global-auth-signin url is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:210 @ 07/16/23 23:12:43.93 (10.227s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:43.93
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:44.68 (750ms)
-
-
- > Enter [BeforeEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:44.681
< Exit [BeforeEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:53.488 (8.807s)
> Enter [It] should not create sync events - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_sync_events.go:80 @ 07/16/23 23:12:53.488
< Exit [It] should not create sync events - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_sync_events.go:80 @ 07/16/23 23:13:16.154 (22.701s)
> Enter [AfterEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:16.154
< Exit [AfterEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:16.68 (526ms)
-
-
- > Enter [BeforeEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:16.682
< Exit [BeforeEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:24.418 (7.736s)
> Enter [It] Balanced affinity mode should balance - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinitymode.go:34 @ 07/16/23 23:13:24.418
< Exit [It] Balanced affinity mode should balance - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinitymode.go:34 @ 07/16/23 23:13:43.022 (18.638s)
> Enter [AfterEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:43.022
< Exit [AfterEach] [Annotations] affinitymode - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:43.557 (535ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:43.569
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:52.109 (8.54s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:13:52.109
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:14:00.22 (8.111s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:14:00.22
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 07/16/23 23:14:00.221
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 07/16/23 23:14:10.357
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 07/16/23 23:14:20.687
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:14:31.22 (31.034s)
> Enter [It] should still return status code 200 after auth backend is deleted using cache - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:155 @ 07/16/23 23:14:31.221
STEP: Adding a global-auth-cache-key to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:163 @ 07/16/23 23:14:31.221
< Exit [It] should still return status code 200 after auth backend is deleted using cache - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:155 @ 07/16/23 23:14:56.908 (25.722s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:56.908
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:57.868 (959ms)
-
-
- > Enter [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:57.873
< Exit [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:07.775 (9.936s)
> Enter [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:32 @ 07/16/23 23:15:07.775
< Exit [BeforeEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:32 @ 07/16/23 23:15:11.846 (4.07s)
> Enter [It] should set mirror-target to http://localhost/mirror - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:36 @ 07/16/23 23:15:11.846
< Exit [It] should set mirror-target to http://localhost/mirror - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/mirror.go:36 @ 07/16/23 23:15:22.158 (10.312s)
> Enter [AfterEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:22.158
< Exit [AfterEach] [Annotations] mirror-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:22.583 (425ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:22.584
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:31.03 (8.446s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:15:31.03
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:15:35.048 (4.052s)
> Enter [It] should set sticky cookie SERVERID - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:42 @ 07/16/23 23:15:35.048
< Exit [It] should set sticky cookie SERVERID - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:42 @ 07/16/23 23:15:45.303 (10.255s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:45.303
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:45.943 (640ms)
-
-
- > Enter [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:45.959
< Exit [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:54.309 (8.35s)
> Enter [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:36 @ 07/16/23 23:15:54.309
< Exit [BeforeEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:36 @ 07/16/23 23:15:58.369 (4.06s)
> Enter [It] should not use the Service Cluster IP and Port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:99 @ 07/16/23 23:15:58.369
STEP: checking if the service is reached - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:113 @ 07/16/23 23:16:15.745
STEP: checking if the Service Cluster IP and Port are not used - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:120 @ 07/16/23 23:16:15.754
< Exit [It] should not use the Service Cluster IP and Port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serviceupstream.go:99 @ 07/16/23 23:16:15.932 (17.597s)
> Enter [AfterEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:15.932
< Exit [AfterEach] [Annotations] service-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:16.329 (396ms)
-
-
- > Enter [BeforeEach] [Annotations] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:16.33
< Exit [BeforeEach] [Annotations] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:24.942 (8.612s)
> Enter [BeforeEach] [Annotations] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/sslciphers.go:31 @ 07/16/23 23:16:24.942
< Exit [BeforeEach] [Annotations] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/sslciphers.go:31 @ 07/16/23 23:16:29.022 (4.08s)
> Enter [It] should change ssl ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/sslciphers.go:35 @ 07/16/23 23:16:29.022
< Exit [It] should change ssl ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/sslciphers.go:35 @ 07/16/23 23:16:39.31 (10.323s)
> Enter [AfterEach] [Annotations] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:39.31
< Exit [AfterEach] [Annotations] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:39.98 (670ms)
-
-
- > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:39.982
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:49.837 (9.855s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 07/16/23 23:16:49.837
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 07/16/23 23:17:00.937 (11.1s)
> Enter [It] should enable the log-format-escape-none - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:63 @ 07/16/23 23:17:00.938
< Exit [It] should enable the log-format-escape-none - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:63 @ 07/16/23 23:17:11.121 (10.218s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:11.121
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:11.607 (486ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:11.608
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:20.212 (8.604s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:17:20.212
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:17:28.342 (8.13s)
> Enter [It] should route requests split between mainline and canary if canary weight is 50 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:808 @ 07/16/23 23:17:28.342
< Exit [It] should route requests split between mainline and canary if canary weight is 50 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:808 @ 07/16/23 23:18:23.842 (55.569s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:23.843
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:24.502 (659ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:24.505
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:31.714 (7.243s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:18:31.714
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:18:35.862 (4.148s)
> Enter [It] should set valid proxy timeouts - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:115 @ 07/16/23 23:18:35.862
< Exit [It] should set valid proxy timeouts - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:115 @ 07/16/23 23:18:46.046 (10.184s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:46.046
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:46.546 (500ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:46.548
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:53.971 (7.423s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:18:53.971
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:18:58.059 (4.088s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:18:58.059
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:19:12.335 (14.31s)
> Enter [It] should not create additional upstream block when auth-keepalive is negative - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:590 @ 07/16/23 23:19:12.335
< Exit [It] should not create additional upstream block when auth-keepalive is negative - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:590 @ 07/16/23 23:19:35.576 (23.275s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:35.576
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:36.255 (679ms)
-
-
- > Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:36.256
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:43.637 (7.381s)
> Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 07/16/23 23:19:43.637
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 07/16/23 23:19:57.933 (14.296s)
> Enter [It] handles an annotation change - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:171 @ 07/16/23 23:19:57.933
< Exit [It] handles an annotation change - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:171 @ 07/16/23 23:20:04.479 (6.58s)
> Enter [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:04.479
< Exit [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:05.013 (534ms)
-
-
-
- > Enter [BeforeEach] [Security] Pod Security Policies with volumes - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:05.015
< Exit [BeforeEach] [Security] Pod Security Policies with volumes - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:14.859 (9.844s)
> Enter [It] should be running with a Pod Security Policy - /go/src/k8s.io/ingress-nginx/test/e2e/settings/pod_security_policy_volumes.go:40 @ 07/16/23 23:20:14.859
[SKIPPED] PSP not supported in this version
In [It] at: /go/src/k8s.io/ingress-nginx/test/e2e/settings/pod_security_policy_volumes.go:53 @ 07/16/23 23:20:14.864
< Exit [It] should be running with a Pod Security Policy - /go/src/k8s.io/ingress-nginx/test/e2e/settings/pod_security_policy_volumes.go:40 @ 07/16/23 23:20:14.864 (5ms)
> Enter [AfterEach] [Security] Pod Security Policies with volumes - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:14.864
< Exit [AfterEach] [Security] Pod Security Policies with volumes - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:15.695 (831ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:15.697
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:23.308 (7.611s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:20:23.308
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:20:27.397 (4.089s)
> Enter [It] should set secure in cookie with provided true annotation on http - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:412 @ 07/16/23 23:20:27.397
< Exit [It] should set secure in cookie with provided true annotation on http - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:412 @ 07/16/23 23:20:37.584 (10.221s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:37.584
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:38.237 (653ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:38.239
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:46.709 (8.47s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 07/16/23 23:20:46.709
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 07/16/23 23:20:50.775 (4.066s)
> Enter [It] should return 200 using auth-tls-match-cn with matching CN from client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:295 @ 07/16/23 23:20:50.775
< Exit [It] should return 200 using auth-tls-match-cn with matching CN from client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:295 @ 07/16/23 23:21:01.786 (11.046s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:01.786
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:02.175 (389ms)
-
-
- > Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:02.177
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:10.721 (8.544s)
> Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 07/16/23 23:21:10.721
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 07/16/23 23:21:14.801 (4.08s)
> Enter [It] should fail to use longest match for documented warning - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:158 @ 07/16/23 23:21:14.801
STEP: creating a regular ingress definition - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:161 @ 07/16/23 23:21:14.801
STEP: creating an ingress definition with the use-regex annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:165 @ 07/16/23 23:21:21.843
STEP: check that '/foo/bar/bar' does not match the longest exact path - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:179 @ 07/16/23 23:21:32.042
< Exit [It] should fail to use longest match for documented warning - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:158 @ 07/16/23 23:21:32.048 (17.282s)
> Enter [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:32.048
< Exit [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:32.461 (413ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:32.463
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:39.797 (7.334s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:21:39.797
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:21:43.865 (4.068s)
> Enter [BeforeEach] Without IngressClass Cluster scoped Permission - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:587 @ 07/16/23 23:21:43.865
< Exit [BeforeEach] Without IngressClass Cluster scoped Permission - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:587 @ 07/16/23 23:21:51.955 (8.09s)
> Enter [It] should ignore Ingress with only IngressClassName - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:652 @ 07/16/23 23:21:51.955
< Exit [It] should ignore Ingress with only IngressClassName - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:652 @ 07/16/23 23:22:02.145 (10.223s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:02.145
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:02.564 (419ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:02.566
< Exit [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:11.193 (8.627s)
> Enter [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:33 @ 07/16/23 23:22:11.193
< Exit [BeforeEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:33 @ 07/16/23 23:22:22.303 (11.11s)
> Enter [It] should block Referers defined in the ConfigMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:88 @ 07/16/23 23:22:22.303
< Exit [It] should block Referers defined in the ConfigMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_access_block.go:88 @ 07/16/23 23:22:32.765 (10.496s)
> Enter [AfterEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:32.765
< Exit [AfterEach] [Setting] [Security] block-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:33.67 (906ms)
-
-
- > Enter [BeforeEach] [Setting] Configmap change - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:33.674
< Exit [BeforeEach] [Setting] Configmap change - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:42.623 (8.949s)
> Enter [BeforeEach] [Setting] Configmap change - /go/src/k8s.io/ingress-nginx/test/e2e/settings/configmap_change.go:32 @ 07/16/23 23:22:42.623
< Exit [BeforeEach] [Setting] Configmap change - /go/src/k8s.io/ingress-nginx/test/e2e/settings/configmap_change.go:32 @ 07/16/23 23:22:46.677 (4.054s)
> Enter [It] should reload after an update in the configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/configmap_change.go:36 @ 07/16/23 23:22:46.677
STEP: adding a whitelist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/settings/configmap_change.go:42 @ 07/16/23 23:22:53.713
STEP: changing error-log-level - /go/src/k8s.io/ingress-nginx/test/e2e/settings/configmap_change.go:61 @ 07/16/23 23:23:03.876
< Exit [It] should reload after an update in the configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/configmap_change.go:36 @ 07/16/23 23:23:17.205 (30.562s)
> Enter [AfterEach] [Setting] Configmap change - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:17.205
< Exit [AfterEach] [Setting] Configmap change - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:17.616 (412ms)
-
-
- > Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:17.617
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:25.915 (8.298s)
> Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 07/16/23 23:23:25.916
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 07/16/23 23:23:40.996 (15.114s)
> Enter [It] should ignore catch all Ingress with backend and rules - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:69 @ 07/16/23 23:23:40.996
< Exit [It] should ignore catch all Ingress with backend and rules - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:69 @ 07/16/23 23:23:51.243 (10.247s)
> Enter [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:51.243
< Exit [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:51.888 (645ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:51.89
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:02.36 (10.505s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:24:02.36
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:24:06.483 (4.123s)
> Enter [It] should set "proxy_set_header 'My-Custom-Header' '42';" when auth-headers are set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:301 @ 07/16/23 23:24:06.483
< Exit [It] should set "proxy_set_header 'My-Custom-Header' '42';" when auth-headers are set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:301 @ 07/16/23 23:24:16.671 (10.187s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:16.671
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:17.137 (467ms)
-
-
- > Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:17.14
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:25.522 (8.382s)
> Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 07/16/23 23:24:25.522
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 07/16/23 23:24:29.596 (4.073s)
> Enter [It] should set client_body_buffer_size to 1m - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:101 @ 07/16/23 23:24:29.596
< Exit [It] should set client_body_buffer_size to 1m - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:101 @ 07/16/23 23:24:39.753 (10.192s)
> Enter [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:39.753
< Exit [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:40.161 (408ms)
-
-
- > Enter [BeforeEach] [Shutdown] ingress controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:40.163
< Exit [BeforeEach] [Shutdown] ingress controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:48.151 (7.988s)
> Enter [BeforeEach] [Shutdown] ingress controller - /go/src/k8s.io/ingress-nginx/test/e2e/gracefulshutdown/shutdown.go:35 @ 07/16/23 23:24:48.151
< Exit [BeforeEach] [Shutdown] ingress controller - /go/src/k8s.io/ingress-nginx/test/e2e/gracefulshutdown/shutdown.go:35 @ 07/16/23 23:24:59.271 (11.12s)
> Enter [It] should shutdown in less than 60 secons without pending connections - /go/src/k8s.io/ingress-nginx/test/e2e/gracefulshutdown/shutdown.go:40 @ 07/16/23 23:24:59.271
< Exit [It] should shutdown in less than 60 secons without pending connections - /go/src/k8s.io/ingress-nginx/test/e2e/gracefulshutdown/shutdown.go:40 @ 07/16/23 23:25:10.518 (11.281s)
> Enter [AfterEach] [Shutdown] ingress controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:10.518
< Exit [AfterEach] [Shutdown] ingress controller - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:10.966 (448ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:10.967
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:18.468 (7.501s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:25:18.468
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:25:22.573 (4.105s)
> Enter [It] should ignore Ingress with a different class annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:68 @ 07/16/23 23:25:22.573
< Exit [It] should ignore Ingress with a different class annotation - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:68 @ 07/16/23 23:25:39.828 (17.29s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:39.828
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:40.22 (391ms)
-
-
- > Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:40.221
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:47.582 (7.361s)
> Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 07/16/23 23:25:47.582
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 07/16/23 23:25:51.699 (4.117s)
> Enter [It] [BAD_ANNOTATIONS] should allow an ingress if there is a default blocklist config in place - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:102 @ 07/16/23 23:25:51.699
< Exit [It] [BAD_ANNOTATIONS] should allow an ingress if there is a default blocklist config in place - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:102 @ 07/16/23 23:26:10.03 (18.365s)
> Enter [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:10.03
< Exit [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:10.792 (762ms)
-
-
- > Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:10.796
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:18.517 (7.721s)
> Enter [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 07/16/23 23:26:18.517
< Exit [BeforeEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:32 @ 07/16/23 23:26:29.612 (11.095s)
> Enter [It] should set proxy-headers-hash-max-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:68 @ 07/16/23 23:26:29.612
< Exit [It] should set proxy-headers-hash-max-size - /go/src/k8s.io/ingress-nginx/test/e2e/settings/hash-size.go:68 @ 07/16/23 23:26:39.848 (10.27s)
> Enter [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:39.848
< Exit [AfterEach] [Setting] hash size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:40.318 (470ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:40.322
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:49.062 (8.74s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:26:49.062
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:26:57.227 (8.165s)
> Enter [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:372 @ 07/16/23 23:26:57.227
STEP: routing requests to the canary upstream when header is set to 'always' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:395 @ 07/16/23 23:27:14.5
STEP: routing requests to the mainline upstream when header is set to 'never' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:404 @ 07/16/23 23:27:14.506
STEP: routing requests to the mainline upstream when header is set to anything else - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:414 @ 07/16/23 23:27:14.512
< Exit [It] should route requests to the correct upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:372 @ 07/16/23 23:27:14.518 (17.326s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:14.518
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:14.982 (464ms)
-
-
- > Enter [BeforeEach] [Setting] proxy-next-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:14.983
< Exit [BeforeEach] [Setting] proxy-next-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:23.621 (8.637s)
> Enter [BeforeEach] [Setting] proxy-next-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_next_upstream.go:32 @ 07/16/23 23:27:23.621
< Exit [BeforeEach] [Setting] proxy-next-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_next_upstream.go:32 @ 07/16/23 23:27:27.678 (4.058s)
> Enter [It] should build proxy next upstream using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_next_upstream.go:36 @ 07/16/23 23:27:27.678
< Exit [It] should build proxy next upstream using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_next_upstream.go:36 @ 07/16/23 23:27:44.864 (17.219s)
> Enter [AfterEach] [Setting] proxy-next-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:44.864
< Exit [AfterEach] [Setting] proxy-next-upstream - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:45.355 (491ms)
-
-
- > Enter [BeforeEach] [Annotations] default-backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:45.356
< Exit [BeforeEach] [Annotations] default-backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:54.361 (9.004s)
> Enter [BeforeEach] [Annotations] default-backend - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/default_backend.go:32 @ 07/16/23 23:27:54.361
< Exit [BeforeEach] [Annotations] default-backend - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/default_backend.go:32 @ 07/16/23 23:27:58.446 (4.085s)
> Enter [It] should use a custom default backend as upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/default_backend.go:37 @ 07/16/23 23:27:58.446
< Exit [It] should use a custom default backend as upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/default_backend.go:37 @ 07/16/23 23:28:08.662 (10.25s)
> Enter [AfterEach] [Annotations] default-backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:08.662
< Exit [AfterEach] [Annotations] default-backend - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:09.492 (830ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:09.495
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:18.198 (8.703s)
> Enter [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 07/16/23 23:28:18.198
< Exit [BeforeEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:33 @ 07/16/23 23:28:20.266 (2.068s)
> Enter [It] should use fastcgi_pass in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:37 @ 07/16/23 23:28:20.266
< Exit [It] should use fastcgi_pass in the configuration file - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fastcgi.go:37 @ 07/16/23 23:28:30.476 (10.21s)
> Enter [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:30.476
< Exit [AfterEach] [Annotations] backend-protocol - FastCGI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:31.049 (608ms)
-
-
- > Enter [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:31.05
< Exit [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:39.51 (8.46s)
> Enter [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:31 @ 07/16/23 23:28:39.51
< Exit [BeforeEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:31 @ 07/16/23 23:28:43.584 (4.073s)
> Enter [It] only deny explicitly denied IPs, allow all others - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:35 @ 07/16/23 23:28:43.584
STEP: sending request from an explicitly denied IP range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:61 @ 07/16/23 23:29:00.77
STEP: sending request from an explicitly denied IP address - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:69 @ 07/16/23 23:29:00.776
STEP: sending request from an implicitly allowed IP range - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:77 @ 07/16/23 23:29:00.783
< Exit [It] only deny explicitly denied IPs, allow all others - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/ipdenylist.go:35 @ 07/16/23 23:29:07.785 (24.235s)
> Enter [AfterEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:07.785
< Exit [AfterEach] [Annotations] denylist-source-range - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:08.219 (434ms)
-
-
- > Enter [BeforeEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:08.222
< Exit [BeforeEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:16.588 (8.366s)
> Enter [It] should return 503 when backend service does not exist - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_backend.go:36 @ 07/16/23 23:29:16.588
< Exit [It] should return 503 when backend service does not exist - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_backend.go:36 @ 07/16/23 23:29:26.783 (10.195s)
> Enter [AfterEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:26.783
< Exit [AfterEach] [Service] backend status code 503 - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:27.308 (525ms)
-
-
- > Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:27.309
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:35.546 (8.271s)
> Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 07/16/23 23:29:35.546
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 07/16/23 23:29:39.603 (4.057s)
> Enter [It] should not exists opentelemetry directive - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:47 @ 07/16/23 23:29:39.603
< Exit [It] should not exists opentelemetry directive - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:47 @ 07/16/23 23:29:56.89 (17.287s)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:56.89
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:57.255 (365ms)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 07/16/23 23:29:57.255
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 07/16/23 23:29:57.255 (0s)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:57.258
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:30:07.638 (10.419s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:30:07.638
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:30:15.827 (8.189s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:30:15.827
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 07/16/23 23:30:15.827
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 07/16/23 23:30:26.122
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 07/16/23 23:30:36.224
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:30:48.339 (32.577s)
> Enter [It] should return status code 401 when request any protected service - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:85 @ 07/16/23 23:30:48.339
STEP: Sending a request to protected service /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:87 @ 07/16/23 23:30:48.339
STEP: Sending a request to protected service /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:94 @ 07/16/23 23:30:48.391
< Exit [It] should return status code 401 when request any protected service - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:85 @ 07/16/23 23:30:48.504 (165ms)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:30:48.504
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:30:55.877 (7.373s)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:30:55.918
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:09.07 (13.19s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:31:09.07
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:31:11.17 (2.1s)
> Enter [It] should enable opentracing using datadog - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:241 @ 07/16/23 23:31:11.17
< Exit [It] should enable opentracing using datadog - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:241 @ 07/16/23 23:31:31.176 (20.041s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:31.176
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:31.616 (439ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:31:31.616
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:31:31.616 (0s)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:31.67
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:40.298 (8.628s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:31:40.298
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:31:44.4 (4.102s)
> Enter [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 07/16/23 23:31:44.402
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 07/16/23 23:31:49.602
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 07/16/23 23:31:59.831
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 07/16/23 23:32:09.984
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 07/16/23 23:32:20.215
< Exit [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 07/16/23 23:32:35.406 (51.073s)
> Enter [It] should deny login for different location on same server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:792 @ 07/16/23 23:32:35.406
STEP: receiving an internal server error without cache on location /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:811 @ 07/16/23 23:32:42.457
< Exit [It] should deny login for different location on same server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:792 @ 07/16/23 23:33:42.399 (1m7.062s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:42.4
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:42.892 (492ms)
-
-
-
- > Enter [BeforeEach] [Security] Pod Security Policies - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:42.896
< Exit [BeforeEach] [Security] Pod Security Policies - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:51.181 (8.285s)
> Enter [It] should be running with a Pod Security Policy - /go/src/k8s.io/ingress-nginx/test/e2e/settings/pod_security_policy.go:44 @ 07/16/23 23:33:51.181
[SKIPPED] PSP not supported in this version
In [It] at: /go/src/k8s.io/ingress-nginx/test/e2e/settings/pod_security_policy.go:56 @ 07/16/23 23:33:51.184
< Exit [It] should be running with a Pod Security Policy - /go/src/k8s.io/ingress-nginx/test/e2e/settings/pod_security_policy.go:44 @ 07/16/23 23:33:51.184 (3ms)
> Enter [AfterEach] [Security] Pod Security Policies - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:51.184
< Exit [AfterEach] [Security] Pod Security Policies - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:51.664 (480ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:51.666
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:00.007 (8.341s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:34:00.007
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:34:08.102 (8.129s)
> Enter [It] should route requests to the correct upstream if the mainline ingress is modified - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:250 @ 07/16/23 23:34:08.102
STEP: routing requests destined fro the mainline ingress to the mainline upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:288 @ 07/16/23 23:34:29.661
STEP: routing requests destined for the canary ingress to the canary upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:297 @ 07/16/23 23:34:29.668
< Exit [It] should route requests to the correct upstream if the mainline ingress is modified - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:250 @ 07/16/23 23:34:29.676 (21.575s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:29.676
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:30.248 (571ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:30.253
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:39.68 (9.461s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:34:39.68
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:34:45.772 (6.092s)
> Enter [BeforeEach] With ingress-class-by-name flag - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:518 @ 07/16/23 23:34:45.772
< Exit [BeforeEach] With ingress-class-by-name flag - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:518 @ 07/16/23 23:34:54.823 (9.051s)
> Enter [It] should watch Ingress that uses the class name even if spec is different - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:539 @ 07/16/23 23:34:54.823
< Exit [It] should watch Ingress that uses the class name even if spec is different - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:539 @ 07/16/23 23:35:19.068 (24.279s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:19.068
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:19.459 (391ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:19.461
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:27.831 (8.37s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:35:27.831
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:35:31.866 (4.07s)
> Enter [It] should allow origin for cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:110 @ 07/16/23 23:35:31.866
< Exit [It] should allow origin for cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:110 @ 07/16/23 23:35:38.908 (7.042s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:38.908
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:39.497 (588ms)
-
-
- > Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:39.502
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:48.362 (8.86s)
> Enter [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 07/16/23 23:35:48.362
< Exit [BeforeEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:45 @ 07/16/23 23:36:02.591 (14.263s)
> Enter [It] handles endpoints only changes - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:62 @ 07/16/23 23:36:02.591
< Exit [It] handles endpoints only changes - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_configuration.go:62 @ 07/16/23 23:36:15.012 (12.421s)
> Enter [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:15.012
< Exit [AfterEach] [Lua] dynamic configuration - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:15.419 (407ms)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:15.421
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:22.799 (7.379s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:36:22.799
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:36:26.895 (4.096s)
> Enter [It] should exists opentracing_operation_name directive when is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:115 @ 07/16/23 23:36:26.895
< Exit [It] should exists opentracing_operation_name directive when is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:115 @ 07/16/23 23:36:44.072 (17.211s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:44.072
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:44.573 (501ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:36:44.573
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:36:44.573 (0s)
-
-
- > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:44.575
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:52.863 (8.288s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 07/16/23 23:36:52.863
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 07/16/23 23:37:03.994 (11.165s)
> Enter [It] log-format-escape-none enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:128 @ 07/16/23 23:37:03.994
< Exit [It] log-format-escape-none enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:128 @ 07/16/23 23:37:17.209 (13.215s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:17.209
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:17.698 (489ms)
-
-
- > Enter [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:17.7
< Exit [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:25.25 (7.55s)
> Enter [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:31 @ 07/16/23 23:37:25.25
< Exit [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:31 @ 07/16/23 23:37:29.308 (4.058s)
> Enter [It] should not add X-Forwarded-Prefix if the annotation value is empty - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:57 @ 07/16/23 23:37:29.308
< Exit [It] should not add X-Forwarded-Prefix if the annotation value is empty - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:57 @ 07/16/23 23:37:39.541 (10.267s)
> Enter [AfterEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:39.541
< Exit [AfterEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:40.249 (708ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:40.25
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:50.903 (10.653s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:37:50.903
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:37:56.972 (6.069s)
> Enter [It] should allow correct origins - missing subdomain + origin with wildcard origin and correct origin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:535 @ 07/16/23 23:37:56.972
< Exit [It] should allow correct origins - missing subdomain + origin with wildcard origin and correct origin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:535 @ 07/16/23 23:38:04.012 (7.074s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:04.012
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:04.575 (562ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:04.576
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:13.092 (8.516s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:38:13.092
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:38:21.224 (8.132s)
> Enter [It] should not use canary as a catch-all server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:863 @ 07/16/23 23:38:21.224
< Exit [It] should not use canary as a catch-all server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:863 @ 07/16/23 23:38:38.446 (17.256s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:38.446
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:38.972 (525ms)
-
-
- > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:38.973
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:47.576 (8.603s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 07/16/23 23:38:47.576
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 07/16/23 23:39:00.694 (13.151s)
> Enter [It] should disable the log-format-escape-none - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:71 @ 07/16/23 23:39:00.694
< Exit [It] should disable the log-format-escape-none - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:71 @ 07/16/23 23:39:10.972 (10.278s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:10.972
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:11.554 (582ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:11.557
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:21.757 (10.2s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:39:21.757
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:39:25.828 (4.071s)
> Enter [It] should set cors methods to only allow POST, GET - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:62 @ 07/16/23 23:39:25.828
< Exit [It] should set cors methods to only allow POST, GET - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:62 @ 07/16/23 23:39:35.962 (10.168s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:35.962
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:36.474 (511ms)
-
-
- > Enter [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:36.475
< Exit [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:45.251 (8.776s)
> Enter [It] should be enabled with default settings - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:39 @ 07/16/23 23:39:45.251
< Exit [It] should be enabled with default settings - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:39 @ 07/16/23 23:39:55.449 (10.198s)
> Enter [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:55.449
< Exit [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:55.846 (396ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:55.848
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:04.392 (8.579s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:40:04.392
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:40:12.535 (8.142s)
> Enter [It] should expose headers for cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:153 @ 07/16/23 23:40:12.535
< Exit [It] should expose headers for cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:153 @ 07/16/23 23:40:22.872 (10.337s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:22.872
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:23.35 (478ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:23.353
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:31.723 (8.405s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:40:31.724
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:40:35.786 (4.063s)
> Enter [It] should ignore Ingress without IngressClass configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:164 @ 07/16/23 23:40:35.786
< Exit [It] should ignore Ingress without IngressClass configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:164 @ 07/16/23 23:40:53.138 (17.352s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:53.138
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:54.07 (932ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:54.097
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:41:02.625 (8.562s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 07/16/23 23:41:02.625
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 07/16/23 23:41:06.715 (4.09s)
> Enter [It] should 302 redirect to error page instead of 400 when auth-tls-error-page is set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:114 @ 07/16/23 23:41:06.715
< Exit [It] should 302 redirect to error page instead of 400 when auth-tls-error-page is set - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:114 @ 07/16/23 23:41:20.837 (14.122s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:20.837
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:21.278 (441ms)
-
-
- > Enter [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:41:21.3
< Exit [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:41:29.247 (7.948s)
> Enter [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:32 @ 07/16/23 23:41:29.248
< Exit [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:32 @ 07/16/23 23:41:31.27 (2.057s)
> Enter [It] should set valid proxy read timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:36 @ 07/16/23 23:41:31.27
< Exit [It] should set valid proxy read timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:36 @ 07/16/23 23:41:48.597 (17.327s)
> Enter [AfterEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:48.597
< Exit [AfterEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:48.993 (395ms)
-
-
- > Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:07:34.242
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:07:51.069 (16.827s)
> Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 07/16/23 23:07:51.069
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 07/16/23 23:08:07.17 (16.135s)
> Enter [It] should set client_body_buffer_size to 1M - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:123 @ 07/16/23 23:08:07.17
< Exit [It] should set client_body_buffer_size to 1M - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:123 @ 07/16/23 23:08:18.073 (10.903s)
> Enter [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:18.073
< Exit [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:21.927 (3.855s)
-
-
- > Enter [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:21.964
< Exit [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:34.164 (12.234s)
> Enter [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:31 @ 07/16/23 23:08:34.164
< Exit [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:31 @ 07/16/23 23:08:38.275 (4.111s)
> Enter [It] disable-access-log set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:35 @ 07/16/23 23:08:38.275
< Exit [It] disable-access-log set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:35 @ 07/16/23 23:08:55.61 (17.335s)
> Enter [AfterEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:55.61
< Exit [AfterEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:56.065 (455ms)
-
-
- > Enter [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:56.067
< Exit [BeforeEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:04.727 (8.695s)
> Enter [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:42 @ 07/16/23 23:09:04.727
< Exit [It] use the specified configuration - /go/src/k8s.io/ingress-nginx/test/e2e/settings/access_log.go:42 @ 07/16/23 23:09:15.337 (10.61s)
> Enter [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:15.337
< Exit [AfterEach] [Setting] access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:16.059 (722ms)
-
-
- > Enter [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:16.064
< Exit [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:26.631 (10.567s)
> Enter [It] should set gzip_disable to msie6 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:67 @ 07/16/23 23:09:26.631
< Exit [It] should set gzip_disable to msie6 - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:67 @ 07/16/23 23:09:43.812 (17.216s)
> Enter [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:43.816
< Exit [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:44.481 (664ms)
-
-
- > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:44.483
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:52.854 (8.371s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 07/16/23 23:09:52.854
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 07/16/23 23:09:56.947 (4.093s)
> Enter [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 07/16/23 23:09:56.947
STEP: configuring certificate_by_lua and skipping Nginx configuration of the new certificate - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:128 @ 07/16/23 23:10:14.472
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:136 @ 07/16/23 23:10:22.717
< Exit [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 07/16/23 23:10:22.74 (25.827s)
> Enter [It] removes HTTPS configuration when we delete TLS spec - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:233 @ 07/16/23 23:10:22.74
< Exit [It] removes HTTPS configuration when we delete TLS spec - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:233 @ 07/16/23 23:10:27.764 (5.024s)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:27.764
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:28.249 (485ms)
-
-
- > Enter [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:28.252
< Exit [BeforeEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:36.867 (8.65s)
> Enter [It] should set gzip_types to application/javascript - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:89 @ 07/16/23 23:10:36.867
< Exit [It] should set gzip_types to application/javascript - /go/src/k8s.io/ingress-nginx/test/e2e/settings/gzip.go:89 @ 07/16/23 23:10:54.131 (17.264s)
> Enter [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:54.131
< Exit [AfterEach] [Setting] gzip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:10:54.62 (489ms)
-
-
- > Enter [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:54.623
< Exit [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:11:02.922 (8.355s)
> Enter [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:31 @ 07/16/23 23:11:02.922
< Exit [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:31 @ 07/16/23 23:11:07.043 (4.12s)
> Enter [It] drops server snippet if disabled by the administrator - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:61 @ 07/16/23 23:11:07.043
< Exit [It] drops server snippet if disabled by the administrator - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:61 @ 07/16/23 23:11:36.273 (29.286s)
> Enter [AfterEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:11:36.273
< Exit [AfterEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:11:36.734 (462ms)
-
-
- > Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:11:36.736
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:11:45.28 (8.543s)
> Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 07/16/23 23:11:45.28
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 07/16/23 23:11:49.471 (4.191s)
> Enter [It] should set client_body_buffer_size to 1000 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:35 @ 07/16/23 23:11:49.471
< Exit [It] should set client_body_buffer_size to 1000 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:35 @ 07/16/23 23:11:59.696 (10.224s)
> Enter [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:11:59.696
< Exit [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:00.22 (525ms)
-
-
- > Enter [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:00.222
< Exit [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:07.673 (7.488s)
> Enter [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:32 @ 07/16/23 23:12:07.673
< Exit [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:32 @ 07/16/23 23:12:11.802 (4.129s)
> Enter [It] should set valid proxy timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:36 @ 07/16/23 23:12:11.802
< Exit [It] should set valid proxy timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:36 @ 07/16/23 23:12:29.118 (17.317s)
> Enter [AfterEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:29.119
< Exit [AfterEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:29.598 (479ms)
-
-
- > Enter [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:29.6
< Exit [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:38.338 (8.773s)
> Enter [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:33 @ 07/16/23 23:12:38.338
< Exit [BeforeEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:33 @ 07/16/23 23:12:42.421 (4.083s)
> Enter [It] should get information for a specific backend server - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:56 @ 07/16/23 23:12:42.421
< Exit [It] should get information for a specific backend server - /go/src/k8s.io/ingress-nginx/test/e2e/dbg/main.go:56 @ 07/16/23 23:12:53.144 (10.723s)
> Enter [AfterEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:53.144
< Exit [AfterEach] Debug CLI - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:53.923 (779ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:53.953
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:02.253 (8.335s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:13:02.254
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:13:06.383 (4.13s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:13:06.383
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:13:20.773 (14.39s)
> Enter [It] should return status code 200 when signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:485 @ 07/16/23 23:13:20.773
< Exit [It] should return status code 200 when signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:485 @ 07/16/23 23:13:20.8 (27ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:20.8
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:21.451 (651ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:21.454
< Exit [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:32.274 (10.854s)
> Enter [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:43 @ 07/16/23 23:13:32.274
< Exit [BeforeEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:43 @ 07/16/23 23:13:51.868 (19.594s)
> Enter [It] should return status code 200 when accessing '/noauth' unauthenticated - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:82 @ 07/16/23 23:13:51.868
< Exit [It] should return status code 200 when accessing '/noauth' unauthenticated - /go/src/k8s.io/ingress-nginx/test/e2e/settings/no_auth_locations.go:82 @ 07/16/23 23:13:55.053 (3.185s)
> Enter [AfterEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:55.053
< Exit [AfterEach] [Setting] [Security] no-auth-locations - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:55.451 (398ms)
-
-
- > Enter [BeforeEach] [Annotations] force-ssl-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:55.453
< Exit [BeforeEach] [Annotations] force-ssl-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:03.927 (8.508s)
> Enter [BeforeEach] [Annotations] force-ssl-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/forcesslredirect.go:30 @ 07/16/23 23:14:03.927
< Exit [BeforeEach] [Annotations] force-ssl-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/forcesslredirect.go:30 @ 07/16/23 23:14:08.019 (4.092s)
> Enter [It] should redirect to https - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/forcesslredirect.go:34 @ 07/16/23 23:14:08.019
< Exit [It] should redirect to https - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/forcesslredirect.go:34 @ 07/16/23 23:14:15.059 (7.04s)
> Enter [AfterEach] [Annotations] force-ssl-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:15.059
< Exit [AfterEach] [Annotations] force-ssl-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:15.545 (486ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:15.546
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:25.303 (9.757s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:14:25.303
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:14:31.39 (6.086s)
> Enter [It] should allow - matching origin with wildcard origin (2 subdomains) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:425 @ 07/16/23 23:14:31.39
< Exit [It] should allow - matching origin with wildcard origin (2 subdomains) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:425 @ 07/16/23 23:14:38.906 (7.55s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:38.906
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:50.983 (12.078s)
-
-
- > Enter [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:51.107
< Exit [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:05.828 (14.755s)
> Enter [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:42 @ 07/16/23 23:15:05.828
< Exit [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:42 @ 07/16/23 23:15:05.835 (7ms)
> Enter [It] should reload after an update in the configuration - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:169 @ 07/16/23 23:15:05.835
STEP: setting up a first deployment - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:171 @ 07/16/23 23:15:05.835
STEP: updating the tcp service to a second deployment - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:196 @ 07/16/23 23:15:13.198
< Exit [It] should reload after an update in the configuration - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:169 @ 07/16/23 23:15:23.493 (17.658s)
> Enter [AfterEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:23.493
< Exit [AfterEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:23.916 (423ms)
-
-
- > Enter [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:23.918
< Exit [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:32.462 (8.579s)
> Enter [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:31 @ 07/16/23 23:15:32.462
< Exit [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:31 @ 07/16/23 23:15:36.539 (4.076s)
> Enter [It] should add global server-snippet and drop annotations per admin config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:92 @ 07/16/23 23:15:36.539
< Exit [It] should add global server-snippet and drop annotations per admin config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:92 @ 07/16/23 23:16:08.955 (32.451s)
> Enter [AfterEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:08.955
< Exit [AfterEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:09.389 (434ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:09.392
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:17.757 (8.366s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:16:17.757
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:16:21.842 (4.084s)
> Enter [It] should not allow - single origin with port and origin without port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:386 @ 07/16/23 23:16:21.842
< Exit [It] should not allow - single origin with port and origin without port - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:386 @ 07/16/23 23:16:28.878 (7.036s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:28.878
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:29.277 (399ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:29.279
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:36.677 (7.433s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:16:36.678
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:16:40.761 (4.083s)
> Enter [It] should set cookie with domain - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:225 @ 07/16/23 23:16:40.761
< Exit [It] should set cookie with domain - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:225 @ 07/16/23 23:16:50.994 (10.233s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:50.994
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:51.379 (385ms)
-
-
- > Enter [BeforeEach] [Setting] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:51.381
< Exit [BeforeEach] [Setting] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:59.709 (8.329s)
> Enter [It] Add ssl ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_ciphers.go:31 @ 07/16/23 23:16:59.71
< Exit [It] Add ssl ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ssl_ciphers.go:31 @ 07/16/23 23:17:09.861 (10.185s)
> Enter [AfterEach] [Setting] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:09.861
< Exit [AfterEach] [Setting] ssl-ciphers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:10.282 (421ms)
-
-
- > Enter [BeforeEach] [Ingress] [PathType] exact - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:10.283
< Exit [BeforeEach] [Ingress] [PathType] exact - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:18.723 (8.44s)
> Enter [BeforeEach] [Ingress] [PathType] exact - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_exact.go:33 @ 07/16/23 23:17:18.724
< Exit [BeforeEach] [Ingress] [PathType] exact - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_exact.go:33 @ 07/16/23 23:17:22.807 (4.083s)
> Enter [It] should choose exact location for /exact - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_exact.go:37 @ 07/16/23 23:17:22.807
< Exit [It] should choose exact location for /exact - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_exact.go:37 @ 07/16/23 23:17:50.668 (27.896s)
> Enter [AfterEach] [Ingress] [PathType] exact - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:50.668
< Exit [AfterEach] [Ingress] [PathType] exact - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:51.179 (511ms)
-
-
- > Enter [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:51.181
< Exit [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:59.818 (8.637s)
> Enter [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:31 @ 07/16/23 23:17:59.819
< Exit [BeforeEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:31 @ 07/16/23 23:18:03.954 (4.169s)
> Enter [It] should add value of server-snippet setting to all ingress config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:35 @ 07/16/23 23:18:03.954
< Exit [It] should add value of server-snippet setting to all ingress config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_snippet.go:35 @ 07/16/23 23:18:36.609 (32.69s)
> Enter [AfterEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:36.609
< Exit [AfterEach] [Setting] configmap server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:37.003 (394ms)
-
-
- > Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:37.005
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:45.497 (8.492s)
> Enter [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 07/16/23 23:18:45.497
< Exit [BeforeEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:33 @ 07/16/23 23:18:56.635 (11.138s)
> Enter [It] should enable the log-format-escape-json - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:47 @ 07/16/23 23:18:56.635
< Exit [It] should enable the log-format-escape-json - /go/src/k8s.io/ingress-nginx/test/e2e/settings/log-format.go:47 @ 07/16/23 23:19:06.818 (10.218s)
> Enter [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:06.819
< Exit [AfterEach] [Setting] log-format-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:07.2 (381ms)
-
-
- > Enter [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:07.202
< Exit [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:15.79 (8.588s)
> Enter [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:31 @ 07/16/23 23:19:15.79
< Exit [BeforeEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:31 @ 07/16/23 23:19:19.867 (4.077s)
> Enter [It] add valid directives to server via server snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:35 @ 07/16/23 23:19:19.867
< Exit [It] add valid directives to server via server snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/serversnippet.go:35 @ 07/16/23 23:19:30.126 (10.259s)
> Enter [AfterEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:30.126
< Exit [AfterEach] [Annotations] server-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:30.554 (428ms)
-
-
- > Enter [BeforeEach] [Ingress] [PathType] prefix checks - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:30.555
< Exit [BeforeEach] [Ingress] [PathType] prefix checks - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:38.942 (8.421s)
> Enter [BeforeEach] [Ingress] [PathType] prefix checks - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_prefix.go:31 @ 07/16/23 23:19:38.942
< Exit [BeforeEach] [Ingress] [PathType] prefix checks - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_prefix.go:31 @ 07/16/23 23:19:43.029 (4.087s)
> Enter [It] should return 404 when prefix /aaa does not match request /aaaccc - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_prefix.go:35 @ 07/16/23 23:19:43.029
< Exit [It] should return 404 when prefix /aaa does not match request /aaaccc - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/pathtype_prefix.go:35 @ 07/16/23 23:19:53.271 (10.241s)
> Enter [AfterEach] [Ingress] [PathType] prefix checks - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:53.271
< Exit [AfterEach] [Ingress] [PathType] prefix checks - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:53.823 (553ms)
-
-
- > Enter [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:53.836
< Exit [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:02.051 (8.25s)
> Enter [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:34 @ 07/16/23 23:20:02.051
< Exit [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:34 @ 07/16/23 23:20:06.14 (4.089s)
> Enter [It] should not exists Server header in the response - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:38 @ 07/16/23 23:20:06.14
< Exit [It] should not exists Server header in the response - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:38 @ 07/16/23 23:20:23.477 (17.337s)
> Enter [AfterEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:23.477
< Exit [AfterEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:23.967 (489ms)
-
-
- > Enter [BeforeEach] [Default Backend] custom service - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:23.968
< Exit [BeforeEach] [Default Backend] custom service - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:32.478 (8.544s)
> Enter [It] uses custom default backend that returns 200 as status code - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/custom_default_backend.go:36 @ 07/16/23 23:20:32.478
< Exit [It] uses custom default backend that returns 200 as status code - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/custom_default_backend.go:36 @ 07/16/23 23:20:48.821 (16.343s)
> Enter [AfterEach] [Default Backend] custom service - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:48.821
< Exit [AfterEach] [Default Backend] custom service - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:49.341 (520ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:49.348
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:57.865 (8.517s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 07/16/23 23:20:57.865
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 07/16/23 23:21:01.925 (4.094s)
> Enter [It] should return 403 using auth-tls-match-cn with no matching CN from client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:266 @ 07/16/23 23:21:01.925
< Exit [It] should return 403 using auth-tls-match-cn with no matching CN from client - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:266 @ 07/16/23 23:21:13.025 (11.101s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:13.025
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:13.59 (565ms)
-
-
- > Enter [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:13.591
< Exit [BeforeEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:23.49 (9.898s)
> Enter [It] should return 200 for service type=ExternalName using FQDN with trailing dot - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:217 @ 07/16/23 23:21:23.49
< Exit [It] should return 200 for service type=ExternalName using FQDN with trailing dot - /go/src/k8s.io/ingress-nginx/test/e2e/servicebackend/service_externalname.go:217 @ 07/16/23 23:21:33.747 (10.292s)
> Enter [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:33.747
< Exit [AfterEach] [Service] Type ExternalName - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:34.172 (424ms)
-
-
- > Enter [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:34.173
< Exit [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:43.009 (8.836s)
> Enter [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:32 @ 07/16/23 23:21:43.009
< Exit [BeforeEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:32 @ 07/16/23 23:21:47.1 (4.091s)
> Enter [It] should not set invalid proxy read timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:52 @ 07/16/23 23:21:47.1
< Exit [It] should not set invalid proxy read timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_read_timeout.go:52 @ 07/16/23 23:22:04.345 (17.279s)
> Enter [AfterEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:04.345
< Exit [AfterEach] [Setting] proxy-read-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:04.959 (614ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:04.961
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:13.436 (8.476s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:22:13.436
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:22:17.548 (4.111s)
> Enter [It] should set cookie with expires - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:194 @ 07/16/23 23:22:17.548
< Exit [It] should set cookie with expires - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:194 @ 07/16/23 23:22:27.746 (10.199s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:27.746
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:28.164 (417ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:28.165
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:36.999 (8.868s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:22:36.999
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:22:41.09 (4.09s)
> Enter [It] should not set snippet "proxy_set_header My-Custom-Header 42;" when external auth is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:284 @ 07/16/23 23:22:41.09
< Exit [It] should not set snippet "proxy_set_header My-Custom-Header 42;" when external auth is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:284 @ 07/16/23 23:22:51.266 (10.177s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:51.266
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:51.761 (495ms)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:51.771
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:00.105 (8.333s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:23:00.105
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:23:04.146 (4.075s)
> Enter [It] should not exists opentracing directive - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:58 @ 07/16/23 23:23:04.146
< Exit [It] should not exists opentracing directive - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:58 @ 07/16/23 23:23:21.518 (17.372s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:21.518
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:21.932 (414ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:23:21.932
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:23:21.932 (0s)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:21.935
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:31.384 (9.483s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:23:31.384
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:23:35.475 (4.091s)
> Enter [It] should enable opentracing using jaeger with sampler host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:184 @ 07/16/23 23:23:35.475
< Exit [It] should enable opentracing using jaeger with sampler host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:184 @ 07/16/23 23:23:55.524 (20.049s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:55.524
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:56.075 (551ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:23:56.075
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:23:56.075 (0s)
-
-
- > Enter [BeforeEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:56.077
< Exit [BeforeEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:04.518 (8.476s)
> Enter [It] should set ingress details variables for ingresses with host without IngressRuleValue, only Backend - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/without_host.go:55 @ 07/16/23 23:24:04.518
< Exit [It] should set ingress details variables for ingresses with host without IngressRuleValue, only Backend - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/without_host.go:55 @ 07/16/23 23:24:18.775 (14.257s)
> Enter [AfterEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:18.775
< Exit [AfterEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:19.228 (452ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:19.229
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:27.5 (8.272s)
> Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 07/16/23 23:24:27.501
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 07/16/23 23:24:31.562 (4.096s)
> Enter [It] should set backend protocol to '' and use fastcgi_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:94 @ 07/16/23 23:24:31.562
< Exit [It] should set backend protocol to '' and use fastcgi_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:94 @ 07/16/23 23:24:42.129 (10.566s)
> Enter [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:42.129
< Exit [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:42.874 (745ms)
-
-
- > Enter [BeforeEach] [Security] request smuggling - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:42.875
< Exit [BeforeEach] [Security] request smuggling - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:51.845 (8.97s)
> Enter [BeforeEach] [Security] request smuggling - /go/src/k8s.io/ingress-nginx/test/e2e/security/request_smuggling.go:35 @ 07/16/23 23:24:51.845
< Exit [BeforeEach] [Security] request smuggling - /go/src/k8s.io/ingress-nginx/test/e2e/security/request_smuggling.go:35 @ 07/16/23 23:24:55.921 (4.076s)
> Enter [It] should not return body content from error_page - /go/src/k8s.io/ingress-nginx/test/e2e/security/request_smuggling.go:39 @ 07/16/23 23:24:55.921
< Exit [It] should not return body content from error_page - /go/src/k8s.io/ingress-nginx/test/e2e/security/request_smuggling.go:39 @ 07/16/23 23:25:18.165 (22.279s)
> Enter [AfterEach] [Security] request smuggling - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:18.165
< Exit [AfterEach] [Security] request smuggling - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:18.624 (459ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:18.626
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:26.989 (8.37s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:25:26.996
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:25:31.086 (4.091s)
> Enter [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:383 @ 07/16/23 23:25:31.087
< Exit [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:383 @ 07/16/23 23:25:52.393 (21.341s)
> Enter [It] user does not retain cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:422 @ 07/16/23 23:25:52.393
< Exit [It] user does not retain cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:422 @ 07/16/23 23:25:52.403 (10ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:52.403
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:52.851 (448ms)
-
-
- > Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:52.853
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:01.147 (8.328s)
> Enter [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 07/16/23 23:26:01.147
< Exit [BeforeEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:41 @ 07/16/23 23:26:05.234 (4.087s)
> Enter [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 07/16/23 23:26:05.234
STEP: configuring certificate_by_lua and skipping Nginx configuration of the new certificate - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:128 @ 07/16/23 23:26:22.995
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:136 @ 07/16/23 23:26:31.133
< Exit [BeforeEach] given an ingress with TLS correctly configured - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:113 @ 07/16/23 23:26:31.179 (25.98s)
> Enter [It] picks up a non-certificate only change - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:218 @ 07/16/23 23:26:31.179
STEP: serving the configured certificate on HTTPS endpoint - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:229 @ 07/16/23 23:26:36.206
< Exit [It] picks up a non-certificate only change - /go/src/k8s.io/ingress-nginx/test/e2e/lua/dynamic_certificates.go:218 @ 07/16/23 23:26:36.237 (5.058s)
> Enter [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:36.237
< Exit [AfterEach] [Lua] dynamic certificates - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:37.018 (782ms)
-
-
- > Enter [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:37.021
< Exit [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:45.616 (8.596s)
> Enter [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:31 @ 07/16/23 23:26:45.616
< Exit [BeforeEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:31 @ 07/16/23 23:26:49.683 (4.066s)
> Enter [It] disable-stream-access-log set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:71 @ 07/16/23 23:26:49.683
< Exit [It] disable-stream-access-log set access_log off - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/disableaccesslog.go:71 @ 07/16/23 23:27:06.949 (17.301s)
> Enter [AfterEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:06.949
< Exit [AfterEach] [Annotations] disable-access-log disable-http-access-log disable-stream-access-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:07.445 (496ms)
-
-
- > Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:07.447
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:15.777 (8.33s)
> Enter [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 07/16/23 23:27:15.778
< Exit [BeforeEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:36 @ 07/16/23 23:27:30.909 (15.132s)
> Enter [It] should delete Ingress updated to catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:81 @ 07/16/23 23:27:30.909
< Exit [It] should delete Ingress updated to catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_catch_all.go:81 @ 07/16/23 23:27:45.291 (14.415s)
> Enter [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:45.291
< Exit [AfterEach] [Flag] disable-catch-all - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:45.766 (475ms)
-
-
- > Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:45.767
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:54.396 (8.629s)
> Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 07/16/23 23:27:54.396
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 07/16/23 23:27:58.524 (4.127s)
> Enter [It] should set client_body_buffer_size to 1k - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:79 @ 07/16/23 23:27:58.524
< Exit [It] should set client_body_buffer_size to 1k - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:79 @ 07/16/23 23:28:08.725 (10.235s)
> Enter [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:08.725
< Exit [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:09.625 (900ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:09.63
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:17.428 (7.798s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:28:17.428
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:28:21.486 (4.058s)
> Enter [It] should work with server-alias annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:372 @ 07/16/23 23:28:21.486
< Exit [It] should work with server-alias annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:372 @ 07/16/23 23:28:31.88 (10.429s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:31.88
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:32.319 (438ms)
-
-
- > Enter [BeforeEach] [Default Backend] SSL - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:32.324
< Exit [BeforeEach] [Default Backend] SSL - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:41.907 (9.584s)
> Enter [It] should return a self generated SSL certificate - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/ssl.go:29 @ 07/16/23 23:28:41.907
STEP: checking SSL Certificate using the NGINX IP address - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/ssl.go:30 @ 07/16/23 23:28:41.908
STEP: checking SSL Certificate using the NGINX catch all server - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/ssl.go:45 @ 07/16/23 23:28:46.925
< Exit [It] should return a self generated SSL certificate - /go/src/k8s.io/ingress-nginx/test/e2e/defaultbackend/ssl.go:29 @ 07/16/23 23:28:46.943 (5.036s)
> Enter [AfterEach] [Default Backend] SSL - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:46.943
< Exit [AfterEach] [Default Backend] SSL - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:47.34 (397ms)
-
-
- > Enter [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:47.341
< Exit [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:55.857 (8.516s)
> Enter [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:34 @ 07/16/23 23:28:55.857
< Exit [BeforeEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:34 @ 07/16/23 23:28:59.917 (4.06s)
> Enter [It] should exists Server header in the response when is enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:50 @ 07/16/23 23:28:59.917
< Exit [It] should exists Server header in the response when is enabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/server_tokens.go:50 @ 07/16/23 23:29:17.172 (17.289s)
> Enter [AfterEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:17.172
< Exit [AfterEach] [Setting] server-tokens - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:17.73 (558ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] modsecurity-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:17.734
< Exit [BeforeEach] [Setting] [Security] modsecurity-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:26.783 (9.049s)
> Enter [It] should add value of modsecurity-snippet setting to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/modsecurity/modsecurity_snippet.go:30 @ 07/16/23 23:29:26.783
< Exit [It] should add value of modsecurity-snippet setting to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/modsecurity/modsecurity_snippet.go:30 @ 07/16/23 23:29:37.377 (10.63s)
> Enter [AfterEach] [Setting] [Security] modsecurity-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:37.377
< Exit [AfterEach] [Setting] [Security] modsecurity-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:37.857 (480ms)
-
-
- > Enter [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:37.859
< Exit [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:45.315 (7.456s)
> Enter [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:30 @ 07/16/23 23:29:45.315
< Exit [BeforeEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:30 @ 07/16/23 23:29:49.393 (4.078s)
> Enter [It] set rewrite_log on - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:49 @ 07/16/23 23:29:49.393
< Exit [It] set rewrite_log on - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/log.go:49 @ 07/16/23 23:29:59.716 (10.323s)
> Enter [AfterEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:59.716
< Exit [AfterEach] [Annotations] enable-access-log enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:30:00.218 (501ms)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:30:00.22
< Exit [BeforeEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:30:08.82 (8.64s)
> Enter [It] should return OK for service with backend protocol GRPCS - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:199 @ 07/16/23 23:30:08.82
< Exit [It] should return OK for service with backend protocol GRPCS - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/grpc.go:199 @ 07/16/23 23:30:23.242 (14.421s)
> Enter [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:30:23.242
< Exit [AfterEach] [Annotations] backend-protocol - GRPC - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:30:23.721 (479ms)
-
-
- > Enter [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:30:23.724
< Exit [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:30:32.155 (8.497s)
> Enter [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:37 @ 07/16/23 23:30:32.155
< Exit [BeforeEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:37 @ 07/16/23 23:30:36.238 (4.083s)
> Enter [It] should add stream-snippet and drop annotations per admin config - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:85 @ 07/16/23 23:30:36.238
< Exit [It] should add stream-snippet and drop annotations per admin config - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/streamsnippet.go:85 @ 07/16/23 23:31:06.15 (29.95s)
> Enter [AfterEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:06.15
< Exit [AfterEach] [Setting] stream-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:06.581 (431ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:06.583
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:15.201 (8.619s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:31:15.201
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:31:19.262 (4.061s)
> Enter [It] should set sticky cookie without host - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:352 @ 07/16/23 23:31:19.262
< Exit [It] should set sticky cookie without host - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:352 @ 07/16/23 23:31:29.469 (10.206s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:29.469
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:29.882 (413ms)
-
-
- > Enter [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:29.885
< Exit [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:40.12 (10.27s)
> Enter [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:31 @ 07/16/23 23:31:40.12
< Exit [BeforeEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:31 @ 07/16/23 23:31:44.185 (4.066s)
> Enter [It] set snippet "more_set_headers "Foo1: Bar1";" in all locations" - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:35 @ 07/16/23 23:31:44.185
< Exit [It] set snippet "more_set_headers "Foo1: Bar1";" in all locations" - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/snippet.go:35 @ 07/16/23 23:31:54.361 (10.176s)
> Enter [AfterEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:54.361
< Exit [AfterEach] [Annotations] configuration-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:31:54.803 (442ms)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:31:54.805
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:03.07 (8.3s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:32:03.07
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:32:07.143 (4.072s)
> Enter [It] should enable opentracing using jaeger - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:172 @ 07/16/23 23:32:07.143
< Exit [It] should enable opentracing using jaeger - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:172 @ 07/16/23 23:32:27.197 (20.054s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:27.197
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:27.565 (368ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:32:27.565
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:32:27.565 (0s)
-
-
- > Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:27.566
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:35.926 (8.394s)
> Enter [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 07/16/23 23:32:35.926
< Exit [BeforeEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:30 @ 07/16/23 23:32:40.026 (4.1s)
> Enter [It] should set backend protocol to '' and use ajp_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:109 @ 07/16/23 23:32:40.026
< Exit [It] should set backend protocol to '' and use ajp_pass - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/backendprotocol.go:109 @ 07/16/23 23:32:50.274 (10.248s)
> Enter [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:50.274
< Exit [AfterEach] [Annotations] backend-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:32:50.832 (558ms)
-
-
- > Enter [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:50.833
< Exit [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:32:59.336 (8.503s)
> Enter [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:35 @ 07/16/23 23:32:59.336
< Exit [BeforeEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:35 @ 07/16/23 23:33:10.405 (11.103s)
> Enter [It] should trust X-Forwarded headers when setting is true - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:40 @ 07/16/23 23:33:10.405
STEP: ensuring single values are parsed correctly - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:54 @ 07/16/23 23:33:27.663
STEP: ensuring that first entry in X-Forwarded-Host is used as the best host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:75 @ 07/16/23 23:33:27.674
< Exit [It] should trust X-Forwarded headers when setting is true - /go/src/k8s.io/ingress-nginx/test/e2e/settings/forwarded_headers.go:40 @ 07/16/23 23:33:27.683 (17.278s)
> Enter [AfterEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:27.683
< Exit [AfterEach] [Setting] use-forwarded-headers - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:28.126 (443ms)
-
-
- > Enter [BeforeEach] [Endpointslices] long service name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:28.128
< Exit [BeforeEach] [Endpointslices] long service name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:35.418 (7.324s)
> Enter [BeforeEach] [Endpointslices] long service name - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/longname.go:34 @ 07/16/23 23:33:35.418
< Exit [BeforeEach] [Endpointslices] long service name - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/longname.go:34 @ 07/16/23 23:33:39.517 (4.099s)
> Enter [It] should return 200 when service name has max allowed number of characters 63 - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/longname.go:38 @ 07/16/23 23:33:39.517
STEP: checking if the service is reached - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/longname.go:48 @ 07/16/23 23:33:49.731
< Exit [It] should return 200 when service name has max allowed number of characters 63 - /go/src/k8s.io/ingress-nginx/test/e2e/endpointslices/longname.go:38 @ 07/16/23 23:33:49.739 (10.222s)
> Enter [AfterEach] [Endpointslices] long service name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:49.739
< Exit [AfterEach] [Endpointslices] long service name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:33:50.184 (444ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:50.185
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:33:58.583 (8.398s)
> Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 07/16/23 23:33:58.583
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 07/16/23 23:34:02.597 (4.049s)
> Enter [It] should set valid proxy-ssl-secret, proxy-ssl-ciphers to HIGH:!AES - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:94 @ 07/16/23 23:34:02.598
< Exit [It] should set valid proxy-ssl-secret, proxy-ssl-ciphers to HIGH:!AES - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:94 @ 07/16/23 23:34:13.497 (10.899s)
> Enter [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:13.497
< Exit [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:13.905 (409ms)
-
-
- > Enter [BeforeEach] [Setting] main-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:13.907
< Exit [BeforeEach] [Setting] main-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:22.216 (8.309s)
> Enter [It] should add value of main-snippet setting to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/main_snippet.go:31 @ 07/16/23 23:34:22.216
< Exit [It] should add value of main-snippet setting to nginx config - /go/src/k8s.io/ingress-nginx/test/e2e/settings/main_snippet.go:31 @ 07/16/23 23:34:32.368 (10.187s)
> Enter [AfterEach] [Setting] main-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:32.368
< Exit [AfterEach] [Setting] main-snippet - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:34:32.925 (557ms)
-
-
- > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:32.927
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:34:41.551 (8.624s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 07/16/23 23:34:41.551
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 07/16/23 23:34:47.637 (6.086s)
> Enter [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 07/16/23 23:34:47.637
< Exit [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 07/16/23 23:34:57.01 (9.372s)
> Enter [It] overriding what's set from the upstream - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:166 @ 07/16/23 23:34:57.01
< Exit [It] overriding what's set from the upstream - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:166 @ 07/16/23 23:35:04.275 (7.3s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:04.275
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:04.736 (461ms)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:04.742
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:14.56 (9.817s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:35:14.56
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:35:18.617 (4.057s)
> Enter [It] should disable modsecurity - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:74 @ 07/16/23 23:35:18.617
< Exit [It] should disable modsecurity - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:74 @ 07/16/23 23:35:28.832 (10.214s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:28.832
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:29.223 (392ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:29.225
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:38.691 (9.501s)
> Enter [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 07/16/23 23:35:38.692
< Exit [BeforeEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:32 @ 07/16/23 23:35:42.8 (4.108s)
> Enter [It] should set valid auth-tls-secret, sslVerify to off, and sslVerifyDepth to 2 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:84 @ 07/16/23 23:35:42.8
< Exit [It] should set valid auth-tls-secret, sslVerify to off, and sslVerifyDepth to 2 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/authtls.go:84 @ 07/16/23 23:35:53.62 (10.82s)
> Enter [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:53.62
< Exit [AfterEach] [Annotations] auth-tls-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:35:54.081 (461ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:35:54.084
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:03.891 (9.841s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:36:03.891
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:36:09.979 (6.088s)
> Enter [It] should change cookie name on ingress definition change - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:64 @ 07/16/23 23:36:09.979
< Exit [It] should change cookie name on ingress definition change - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:64 @ 07/16/23 23:36:25.241 (15.261s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:25.241
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:25.701 (460ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:25.703
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:33.605 (7.936s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:36:33.605
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:36:37.682 (4.077s)
> Enter [It] should enable cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:35 @ 07/16/23 23:36:37.682
< Exit [It] should enable cors - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:35 @ 07/16/23 23:36:47.901 (10.219s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:47.901
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:36:48.375 (474ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:48.376
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:36:56.928 (8.552s)
> Enter [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 07/16/23 23:36:56.928
< Exit [BeforeEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:33 @ 07/16/23 23:37:03.013 (6.119s)
> Enter [It] should set valid proxy-ssl-secret, proxy-ssl-protocols - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:122 @ 07/16/23 23:37:03.013
< Exit [It] should set valid proxy-ssl-secret, proxy-ssl-protocols - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxyssl.go:122 @ 07/16/23 23:37:14.194 (11.181s)
> Enter [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:14.194
< Exit [AfterEach] [Annotations] proxy-ssl-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:14.663 (469ms)
-
-
- > Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:14.665
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:22.951 (8.286s)
> Enter [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 07/16/23 23:37:22.951
< Exit [BeforeEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:31 @ 07/16/23 23:37:27.087 (4.136s)
> Enter [It] should set client_body_buffer_size to 1K - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:57 @ 07/16/23 23:37:27.087
< Exit [It] should set client_body_buffer_size to 1K - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/clientbodybuffersize.go:57 @ 07/16/23 23:37:37.286 (10.233s)
> Enter [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:37.286
< Exit [AfterEach] [Annotations] client-body-buffer-size - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:37:37.719 (433ms)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:37.721
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:37:47.137 (9.416s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:37:47.137
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:37:51.362 (4.225s)
> Enter [It] should enable modsecurity with snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:91 @ 07/16/23 23:37:51.362
< Exit [It] should enable modsecurity with snippet - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:91 @ 07/16/23 23:38:01.535 (10.206s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:01.535
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:02.216 (682ms)
-
-
- > Enter [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:02.219
< Exit [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:09.728 (7.509s)
> Enter [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:32 @ 07/16/23 23:38:09.729
< Exit [BeforeEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:32 @ 07/16/23 23:38:13.797 (4.069s)
> Enter [It] should not set invalid proxy timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:52 @ 07/16/23 23:38:13.797
< Exit [It] should not set invalid proxy timeouts using configmap values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_connect_timeout.go:52 @ 07/16/23 23:38:31.175 (17.412s)
> Enter [AfterEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:31.175
< Exit [AfterEach] [Setting] proxy-connect-timeout - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:38:31.552 (376ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:31.553
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:38:40.919 (9.366s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:38:40.919
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:38:46.993 (6.074s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:38:46.993
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:39:03.307 (16.348s)
> Enter [It] should not create additional upstream block when auth-keepalive is set with HTTP/2 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:609 @ 07/16/23 23:39:03.307
< Exit [It] should not create additional upstream block when auth-keepalive is set with HTTP/2 - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:609 @ 07/16/23 23:39:07.472 (4.165s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:07.472
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:08.148 (676ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:08.153
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:16.57 (8.417s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:39:16.57
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:39:22.657 (6.087s)
> Enter [It] should set the path to /something on the generated cookie - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:99 @ 07/16/23 23:39:22.657
< Exit [It] should set the path to /something on the generated cookie - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:99 @ 07/16/23 23:39:32.838 (10.215s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:32.838
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:33.231 (394ms)
-
-
- > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:33.235
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:40.596 (7.361s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 07/16/23 23:39:40.596
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 07/16/23 23:39:44.718 (4.122s)
> Enter [It] should not use ports or X-Forwarded-Host during the HTTP to HTTPS redirection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:205 @ 07/16/23 23:39:44.718
Jul 16 23:40:00.953: INFO: Unexpected TLS error: tls: failed to verify certificate: x509: certificate is valid for ingress.local, not settings-tls
< Exit [It] should not use ports or X-Forwarded-Host during the HTTP to HTTPS redirection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:205 @ 07/16/23 23:40:02.967 (18.283s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:02.967
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:03.473 (506ms)
-
-
- > Enter [BeforeEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:03.475
< Exit [BeforeEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:14.008 (10.533s)
> Enter [It] should set ingress details variables for ingresses without a host - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/without_host.go:34 @ 07/16/23 23:40:14.008
< Exit [It] should set ingress details variables for ingresses without a host - /go/src/k8s.io/ingress-nginx/test/e2e/ingress/without_host.go:34 @ 07/16/23 23:40:28.273 (14.265s)
> Enter [AfterEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:28.274
< Exit [AfterEach] [Ingress] definition without host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:29.069 (795ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:29.07
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:36.48 (7.444s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:40:36.48
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:40:40.607 (4.127s)
> Enter [It] should not allow - unmatching origin with wildcard origin (2 subdomains) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:468 @ 07/16/23 23:40:40.607
< Exit [It] should not allow - unmatching origin with wildcard origin (2 subdomains) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:468 @ 07/16/23 23:40:47.651 (7.043s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:47.651
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:48.174 (524ms)
-
-
- > Enter [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:48.176
< Exit [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:56.86 (8.684s)
> Enter [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:32 @ 07/16/23 23:40:56.86
< Exit [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:32 @ 07/16/23 23:41:00.951 (4.125s)
> Enter [It] should exist a proxy_host using the upstream-vhost annotation value - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:57 @ 07/16/23 23:41:00.951
< Exit [It] should exist a proxy_host using the upstream-vhost annotation value - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:57 @ 07/16/23 23:41:11.126 (10.175s)
> Enter [AfterEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:11.126
< Exit [AfterEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:11.617 (491ms)
-
-
- > Enter [BeforeEach] [Annotations] connection-proxy-header - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:41:11.624
< Exit [BeforeEach] [Annotations] connection-proxy-header - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:41:20.141 (8.516s)
> Enter [BeforeEach] [Annotations] connection-proxy-header - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/connection.go:32 @ 07/16/23 23:41:20.141
< Exit [BeforeEach] [Annotations] connection-proxy-header - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/connection.go:32 @ 07/16/23 23:41:22.214 (2.074s)
> Enter [It] set connection header to keep-alive - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/connection.go:36 @ 07/16/23 23:41:22.214
< Exit [It] set connection header to keep-alive - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/connection.go:36 @ 07/16/23 23:41:32.382 (10.202s)
> Enter [AfterEach] [Annotations] connection-proxy-header - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:32.382
< Exit [AfterEach] [Annotations] connection-proxy-header - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:32.85 (468ms)
-
-
- > Enter [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:41:32.854
< Exit [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:41:40.227 (7.374s)
> Enter [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:34 @ 07/16/23 23:41:40.227
< Exit [BeforeEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:34 @ 07/16/23 23:41:44.297 (4.07s)
> Enter [It] should redirect from www HTTPS to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:64 @ 07/16/23 23:41:44.297
STEP: setting up server for redirect from www - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:65 @ 07/16/23 23:41:44.297
STEP: sending request to www should redirect to domain - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:91 @ 07/16/23 23:41:59.768
STEP: sending request to domain should not redirect to www - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:103 @ 07/16/23 23:41:59.784
< Exit [It] should redirect from www HTTPS to HTTPS - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/fromtowwwredirect.go:64 @ 07/16/23 23:41:59.805 (15.508s)
> Enter [AfterEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:59.805
< Exit [AfterEach] [Annotations] from-to-www-redirect - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:42:00.18 (409ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:07:34.241
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:07:48.51 (14.268s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:07:48.51
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:08:06.784 (18.308s)
> Enter [It] should allow - single origin for multiple cors values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:169 @ 07/16/23 23:08:06.784
< Exit [It] should allow - single origin for multiple cors values - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:169 @ 07/16/23 23:08:13.874 (7.09s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:13.874
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:15.012 (1.138s)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:15.026
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:31.711 (16.684s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:08:31.711
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:08:35.749 (4.073s)
> Enter [It] should turn off proxy-request-buffering - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:179 @ 07/16/23 23:08:35.749
< Exit [It] should turn off proxy-request-buffering - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:179 @ 07/16/23 23:08:45.914 (10.164s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:45.914
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:08:46.502 (588ms)
-
-
- > Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:46.507
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:08:58.795 (12.288s)
> Enter [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 07/16/23 23:08:58.795
< Exit [BeforeEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:40 @ 07/16/23 23:09:02.852 (4.092s)
> Enter [It] should exists opentelemetry_operation_name directive when is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:104 @ 07/16/23 23:09:02.852
< Exit [It] should exists opentelemetry_operation_name directive when is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:104 @ 07/16/23 23:09:20.835 (17.983s)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:20.835
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:21.688 (853ms)
> Enter [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 07/16/23 23:09:21.688
< Exit [AfterEach] Configure Opentelemetry - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentelemetry.go:44 @ 07/16/23 23:09:21.688 (0s)
-
-
- > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:21.694
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:29.368 (7.675s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 07/16/23 23:09:29.369
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 07/16/23 23:09:33.396 (4.061s)
> Enter [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 07/16/23 23:09:33.396
Jul 16 23:09:42.839: INFO: Unexpected TLS error: tls: failed to verify certificate: x509: certificate is valid for ingress.local, not settings-tls
< Exit [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 07/16/23 23:09:44.841 (11.445s)
> Enter [It] setting includeSubDomains parameter - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:127 @ 07/16/23 23:09:44.841
< Exit [It] setting includeSubDomains parameter - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:127 @ 07/16/23 23:09:55.117 (10.276s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:55.117
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:09:55.595 (478ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:09:55.621
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:10:03.902 (8.315s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:10:03.902
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:10:07.984 (4.082s)
> Enter [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 07/16/23 23:10:07.984
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 07/16/23 23:10:23.092
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 07/16/23 23:10:33.264
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:754 @ 07/16/23 23:10:43.654
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:761 @ 07/16/23 23:10:53.881
< Exit [BeforeEach] when external authentication with caching is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:730 @ 07/16/23 23:11:09.227 (1m1.333s)
> Enter [It] should deny login for different servers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:820 @ 07/16/23 23:11:09.227
STEP: logging into server thisHost /foo - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:821 @ 07/16/23 23:11:09.227
STEP: receiving an internal server error without cache on thisHost location /bar - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:833 @ 07/16/23 23:11:16.27
< Exit [It] should deny login for different servers - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:820 @ 07/16/23 23:12:16.192 (1m7.058s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:16.192
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:16.811 (619ms)
-
-
- > Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:16.817
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:25.674 (8.857s)
> Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 07/16/23 23:12:25.674
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 07/16/23 23:12:36.81 (11.17s)
> Enter [It] should set the request count to upstream server through one keep alive connection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:86 @ 07/16/23 23:12:36.81
< Exit [It] should set the request count to upstream server through one keep alive connection - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:86 @ 07/16/23 23:12:47.088 (10.278s)
> Enter [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:47.088
< Exit [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:12:47.718 (631ms)
-
-
- > Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:47.72
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:12:56.863 (9.143s)
> Enter [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 07/16/23 23:12:56.863
< Exit [BeforeEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:33 @ 07/16/23 23:13:07.932 (11.103s)
> Enter [It] should set keepalive_timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:40 @ 07/16/23 23:13:07.932
< Exit [It] should set keepalive_timeout - /go/src/k8s.io/ingress-nginx/test/e2e/settings/keep-alive.go:40 @ 07/16/23 23:13:18.203 (10.272s)
> Enter [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:18.203
< Exit [AfterEach] [Setting] keep-alive keep-alive-requests - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:18.842 (639ms)
-
-
- > Enter [BeforeEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:18.844
< Exit [BeforeEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:28.621 (9.777s)
> Enter [It] should be enabled when set to true - /go/src/k8s.io/ingress-nginx/test/e2e/settings/multi_accept.go:39 @ 07/16/23 23:13:28.621
< Exit [It] should be enabled when set to true - /go/src/k8s.io/ingress-nginx/test/e2e/settings/multi_accept.go:39 @ 07/16/23 23:13:39.052 (10.465s)
> Enter [AfterEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:39.052
< Exit [AfterEach] [Setting] enable-multi-accept - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:13:39.573 (521ms)
-
-
- > Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:39.576
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:13:47.884 (8.308s)
> Enter [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:13:47.884
< Exit [BeforeEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:47 @ 07/16/23 23:13:51.979 (4.095s)
> Enter [It] should serve Ingress when class is updated between annotation and ingressClassName - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:323 @ 07/16/23 23:13:51.979
< Exit [It] should serve Ingress when class is updated between annotation and ingressClassName - /go/src/k8s.io/ingress-nginx/test/e2e/settings/ingress_class.go:323 @ 07/16/23 23:14:17.414 (25.47s)
> Enter [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:17.414
< Exit [AfterEach] [Flag] ingress-class - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:18.388 (973ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:18.39
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:27.699 (9.309s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:14:27.699
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:14:34.284 (6.619s)
> Enter [It] should response with a 200 status from the mainline upstream when requests are made to the mainline ingress - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:48 @ 07/16/23 23:14:34.284
< Exit [It] should response with a 200 status from the mainline upstream when requests are made to the mainline ingress - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:48 @ 07/16/23 23:14:57.094 (22.81s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:57.094
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:14:58.009 (914ms)
-
-
- > Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:14:58.012
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:08.991 (11.014s)
> Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 07/16/23 23:15:08.991
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 07/16/23 23:15:15.072 (6.08s)
> Enter [It] should use correct longest path match - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:66 @ 07/16/23 23:15:15.072
STEP: creating a regular ingress definition - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:69 @ 07/16/23 23:15:15.072
STEP: making a request to the non-rewritten location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:78 @ 07/16/23 23:15:25.351
STEP: creating an ingress definition with the rewrite-target annotation set on the "/" location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:88 @ 07/16/23 23:15:25.361
STEP: making a second request to the non-rewritten location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:102 @ 07/16/23 23:15:35.543
< Exit [It] should use correct longest path match - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:66 @ 07/16/23 23:15:35.551 (20.514s)
> Enter [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:35.551
< Exit [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:15:36 (449ms)
-
-
- > Enter [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:36.002
< Exit [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:15:44.55 (8.548s)
> Enter [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:31 @ 07/16/23 23:15:44.55
< Exit [BeforeEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:31 @ 07/16/23 23:15:50.604 (6.055s)
> Enter [It] should set the X-Forwarded-Prefix to the annotation value - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:35 @ 07/16/23 23:15:50.604
< Exit [It] should set the X-Forwarded-Prefix to the annotation value - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/xforwardedprefix.go:35 @ 07/16/23 23:16:00.832 (10.227s)
> Enter [AfterEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:00.832
< Exit [AfterEach] [Annotations] x-forwarded-prefix - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:01.23 (398ms)
-
-
- > Enter [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:01.232
< Exit [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:09.619 (8.421s)
> Enter [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:36 @ 07/16/23 23:16:09.619
< Exit [BeforeEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:36 @ 07/16/23 23:16:13.742 (4.123s)
> Enter [It] should not appear references to secret updates not used in ingress rules - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:40 @ 07/16/23 23:16:13.742
< Exit [It] should not appear references to secret updates not used in ingress rules - /go/src/k8s.io/ingress-nginx/test/e2e/ssl/secret_update.go:40 @ 07/16/23 23:16:37.172 (23.465s)
> Enter [AfterEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:37.172
< Exit [AfterEach] [SSL] secret update - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:16:37.786 (614ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:37.787
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:16:46.283 (8.495s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:16:46.283
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:16:54.442 (8.159s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:16:54.442
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 07/16/23 23:16:54.442
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 07/16/23 23:17:04.664
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 07/16/23 23:17:15.032
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:17:25.212 (30.804s)
> Enter [It] should set snippet when global external auth is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:250 @ 07/16/23 23:17:25.212
STEP: Adding a global-auth-snippet to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:254 @ 07/16/23 23:17:25.212
< Exit [It] should set snippet when global external auth is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:250 @ 07/16/23 23:17:35.375 (10.198s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:35.375
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:35.767 (391ms)
-
-
- > Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:35.769
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:44.223 (8.454s)
> Enter [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:17:44.223
< Exit [BeforeEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:31 @ 07/16/23 23:17:48.3 (4.077s)
> Enter [It] should not allow - portless origin with wildcard origin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:515 @ 07/16/23 23:17:48.3
< Exit [It] should not allow - portless origin with wildcard origin - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/cors.go:515 @ 07/16/23 23:17:55.341 (7.041s)
> Enter [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:55.341
< Exit [AfterEach] [Annotations] cors-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:17:55.791 (449ms)
-
-
- > Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:17:55.792
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:04.137 (8.379s)
> Enter [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:18:04.137
< Exit [BeforeEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:38 @ 07/16/23 23:18:08.248 (4.112s)
> Enter [It] does not set the path to / on the generated cookie if there's more than one rule referring to the same backend - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:121 @ 07/16/23 23:18:08.249
< Exit [It] does not set the path to / on the generated cookie if there's more than one rule referring to the same backend - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/affinity.go:121 @ 07/16/23 23:18:18.49 (10.241s)
> Enter [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:18.49
< Exit [AfterEach] [Annotations] affinity session-cookie-name - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:18.911 (422ms)
-
-
- > Enter [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:18.912
< Exit [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:27.287 (8.374s)
> Enter [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:38 @ 07/16/23 23:18:27.287
< Exit [BeforeEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:38 @ 07/16/23 23:18:31.349 (4.062s)
> Enter [It] should allow multiple auth with satisfy any - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:84 @ 07/16/23 23:18:31.349
< Exit [It] should allow multiple auth with satisfy any - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/satisfy.go:84 @ 07/16/23 23:18:47.764 (16.45s)
> Enter [AfterEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:47.764
< Exit [AfterEach] [Annotations] satisfy - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:18:48.191 (427ms)
-
-
- > Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:48.193
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:18:56.623 (8.43s)
> Enter [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 07/16/23 23:18:56.623
< Exit [BeforeEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:32 @ 07/16/23 23:19:00.738 (4.115s)
> Enter [It] [BAD_ANNOTATIONS] should drop an ingress if there is a custom blocklist config in place and allow others to pass - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:133 @ 07/16/23 23:19:00.738
< Exit [It] [BAD_ANNOTATIONS] should drop an ingress if there is a custom blocklist config in place and allow others to pass - /go/src/k8s.io/ingress-nginx/test/e2e/settings/badannotationvalues.go:133 @ 07/16/23 23:19:26.161 (25.457s)
> Enter [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:26.161
< Exit [AfterEach] [Annotations] Bad annotation values - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:26.559 (398ms)
-
-
- > Enter [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:26.564
< Exit [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:35.081 (8.55s)
> Enter [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:32 @ 07/16/23 23:19:35.081
< Exit [BeforeEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:32 @ 07/16/23 23:19:39.133 (4.052s)
> Enter [It] should exist a proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:36 @ 07/16/23 23:19:39.133
< Exit [It] should exist a proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_host.go:36 @ 07/16/23 23:19:49.376 (10.244s)
> Enter [AfterEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:49.376
< Exit [AfterEach] Dynamic $proxy_host - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:19:49.802 (425ms)
-
-
- > Enter [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:49.804
< Exit [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:19:58.14 (8.336s)
> Enter [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:40 @ 07/16/23 23:19:58.14
< Exit [BeforeEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:40 @ 07/16/23 23:20:13.506 (15.401s)
> Enter [It] uses default ssl certificate for catch-all ingress - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:64 @ 07/16/23 23:20:13.506
STEP: making sure new ingress is deployed - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:68 @ 07/16/23 23:20:20.544
STEP: making sure new ingress is responding - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:74 @ 07/16/23 23:20:23.704
STEP: making sure the configured default ssl certificate is being used - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:76 @ 07/16/23 23:20:23.704
< Exit [It] uses default ssl certificate for catch-all ingress - /go/src/k8s.io/ingress-nginx/test/e2e/settings/default_ssl_certificate.go:64 @ 07/16/23 23:20:25.721 (12.215s)
> Enter [AfterEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:25.721
< Exit [AfterEach] [SSL] [Flag] default-ssl-certificate - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:26.267 (546ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:26.269
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:34.686 (8.452s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:20:34.686
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:20:38.757 (4.07s)
> Enter [BeforeEach] with invalid auth-url should deny whole location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:866 @ 07/16/23 23:20:38.757
< Exit [BeforeEach] with invalid auth-url should deny whole location - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:866 @ 07/16/23 23:20:48.932 (10.175s)
> Enter [It] should add error to the config - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:887 @ 07/16/23 23:20:48.932
< Exit [It] should add error to the config - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:887 @ 07/16/23 23:20:52.115 (3.183s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:52.115
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:20:52.579 (463ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:20:52.58
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:00.264 (7.684s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:21:00.264
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:21:04.298 (4.069s)
> Enter [It] should return status code 401 when authentication is configured and Authorization header is sent with invalid credentials - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:116 @ 07/16/23 23:21:04.298
< Exit [It] should return status code 401 when authentication is configured and Authorization header is sent with invalid credentials - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:116 @ 07/16/23 23:21:15.98 (11.682s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:15.98
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:16.663 (683ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:16.666
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:26.922 (10.256s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:21:26.922
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:21:30.978 (4.056s)
> Enter [It] should return status code 401 and cors headers when authentication and cors is configured but Authorization header is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:144 @ 07/16/23 23:21:30.978
< Exit [It] should return status code 401 and cors headers when authentication and cors is configured but Authorization header is not configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:144 @ 07/16/23 23:21:42.285 (11.341s)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:42.285
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:21:42.816 (531ms)
-
-
- > Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:42.818
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:21:51.43 (8.612s)
> Enter [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 07/16/23 23:21:51.43
< Exit [BeforeEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:35 @ 07/16/23 23:21:55.497 (4.067s)
> Enter [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 07/16/23 23:21:55.497
Jul 16 23:22:04.729: INFO: Unexpected TLS error: tls: failed to verify certificate: x509: certificate is valid for ingress.local, not settings-tls
< Exit [BeforeEach] should configure HSTS policy header - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:100 @ 07/16/23 23:22:06.734 (11.271s)
> Enter [It] setting preload parameter - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:146 @ 07/16/23 23:22:06.734
< Exit [It] setting preload parameter - /go/src/k8s.io/ingress-nginx/test/e2e/settings/tls.go:146 @ 07/16/23 23:22:16.936 (10.203s)
> Enter [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:16.937
< Exit [AfterEach] [Setting] [SSL] TLS protocols, ciphers and headers) - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:22:17.423 (487ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:17.424
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:22:25.824 (8.4s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:22:25.824
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:22:33.95 (8.16s)
> Enter [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:301 @ 07/16/23 23:22:33.95
< Exit [BeforeEach] cookie set by external authentication server - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:301 @ 07/16/23 23:23:02.307 (28.392s)
> Enter [It] user does not retain cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:337 @ 07/16/23 23:23:02.308
< Exit [It] user does not retain cookie if upstream returns error status code - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:337 @ 07/16/23 23:23:02.317 (10ms)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:02.317
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:02.727 (409ms)
-
-
- > Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:02.729
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:11.096 (8.368s)
> Enter [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:23:11.097
< Exit [BeforeEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:39 @ 07/16/23 23:23:17.255 (6.159s)
> Enter [It] always routes traffic to canary if first request was affinitized to canary (default behavior) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:943 @ 07/16/23 23:23:17.255
< Exit [It] always routes traffic to canary if first request was affinitized to canary (default behavior) - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/canary.go:943 @ 07/16/23 23:23:42.874 (25.653s)
> Enter [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:42.874
< Exit [AfterEach] [Annotations] canary-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:23:43.4 (525ms)
-
-
- > Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:43.401
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:23:52.034 (8.633s)
> Enter [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:23:52.034
< Exit [BeforeEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:51 @ 07/16/23 23:24:00.279 (8.245s)
> Enter [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:24:00.279
STEP: Adding an ingress rule for /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:61 @ 07/16/23 23:24:00.279
STEP: Adding an ingress rule for /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:69 @ 07/16/23 23:24:10.446
STEP: Adding a global-auth-url to configMap - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:77 @ 07/16/23 23:24:20.663
< Exit [BeforeEach] when global external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:58 @ 07/16/23 23:24:30.894 (30.65s)
> Enter [It] should return status code 200 when request whitelisted (via ingress annotation) service and 401 when request protected service - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:126 @ 07/16/23 23:24:30.894
STEP: Adding an ingress rule for /bar with annotation enable-global-auth = false - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:128 @ 07/16/23 23:24:30.894
STEP: Sending a request to protected service /foo - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:140 @ 07/16/23 23:24:35.071
STEP: Sending a request to whitelisted service /bar - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:147 @ 07/16/23 23:24:35.079
< Exit [It] should return status code 200 when request whitelisted (via ingress annotation) service and 401 when request protected service - /go/src/k8s.io/ingress-nginx/test/e2e/settings/global_external_auth.go:126 @ 07/16/23 23:24:35.086 (4.226s)
> Enter [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:35.086
< Exit [AfterEach] [Setting] [Security] global-auth-url - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:24:35.565 (479ms)
-
-
- > Enter [BeforeEach] [Annotations] annotation-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:35.566
< Exit [BeforeEach] [Annotations] annotation-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:24:44.981 (9.415s)
> Enter [BeforeEach] [Annotations] annotation-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/globalratelimit.go:34 @ 07/16/23 23:24:44.981
< Exit [BeforeEach] [Annotations] annotation-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/globalratelimit.go:34 @ 07/16/23 23:24:49.116 (4.135s)
> Enter [It] generates correct configuration - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/globalratelimit.go:38 @ 07/16/23 23:24:49.116
STEP: regenerating the correct configuration after update - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/globalratelimit.go:65 @ 07/16/23 23:25:11.373
< Exit [It] generates correct configuration - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/globalratelimit.go:38 @ 07/16/23 23:25:22.684 (33.602s)
> Enter [AfterEach] [Annotations] annotation-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:22.684
< Exit [AfterEach] [Annotations] annotation-global-rate-limit - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:25:23.246 (562ms)
-
-
- > Enter [BeforeEach] brotli - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:23.247
< Exit [BeforeEach] brotli - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:25:31.61 (8.398s)
> Enter [BeforeEach] brotli - /go/src/k8s.io/ingress-nginx/test/e2e/settings/brotli.go:35 @ 07/16/23 23:25:31.61
< Exit [BeforeEach] brotli - /go/src/k8s.io/ingress-nginx/test/e2e/settings/brotli.go:35 @ 07/16/23 23:25:35.714 (4.104s)
> Enter [It] should only compress responses that meet the `brotli-min-length` condition - /go/src/k8s.io/ingress-nginx/test/e2e/settings/brotli.go:39 @ 07/16/23 23:25:35.715
< Exit [It] should only compress responses that meet the `brotli-min-length` condition - /go/src/k8s.io/ingress-nginx/test/e2e/settings/brotli.go:39 @ 07/16/23 23:26:07.011 (31.33s)
> Enter [AfterEach] brotli - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:07.011
< Exit [AfterEach] brotli - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:07.5 (489ms)
-
-
- > Enter [BeforeEach] [Annotations] preserve-trailing-slash - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:07.503
< Exit [BeforeEach] [Annotations] preserve-trailing-slash - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:16.195 (8.692s)
> Enter [BeforeEach] [Annotations] preserve-trailing-slash - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/preservetrailingslash.go:30 @ 07/16/23 23:26:16.195
< Exit [BeforeEach] [Annotations] preserve-trailing-slash - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/preservetrailingslash.go:30 @ 07/16/23 23:26:20.306 (4.111s)
> Enter [It] should allow preservation of trailing slashes - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/preservetrailingslash.go:34 @ 07/16/23 23:26:20.306
< Exit [It] should allow preservation of trailing slashes - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/preservetrailingslash.go:34 @ 07/16/23 23:26:27.349 (7.044s)
> Enter [AfterEach] [Annotations] preserve-trailing-slash - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:27.349
< Exit [AfterEach] [Annotations] preserve-trailing-slash - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:26:27.949 (600ms)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:27.952
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:26:36.662 (8.744s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:26:36.662
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:26:40.824 (4.163s)
> Enter [It] should enable modsecurity with snippet and block requests - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:153 @ 07/16/23 23:26:40.824
< Exit [It] should enable modsecurity with snippet and block requests - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:153 @ 07/16/23 23:27:03.024 (22.234s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:03.024
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:03.527 (504ms)
-
-
- > Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:03.528
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:11.896 (8.368s)
> Enter [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:27:11.896
< Exit [BeforeEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:42 @ 07/16/23 23:27:15.977 (4.081s)
> Enter [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:27:15.977
< Exit [BeforeEach] when external authentication is configured - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:458 @ 07/16/23 23:27:30.444 (14.468s)
> Enter [It] should redirect to signin url when not signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:494 @ 07/16/23 23:27:30.445
< Exit [It] should redirect to signin url when not signed in - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/auth.go:494 @ 07/16/23 23:27:30.455 (11ms)
> Enter [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:30.455
< Exit [AfterEach] [Annotations] auth-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:31.001 (545ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:31.003
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:39.402 (8.434s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:27:39.403
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:27:43.461 (4.058s)
> Enter [It] should turn on proxy-buffering - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:157 @ 07/16/23 23:27:43.461
< Exit [It] should turn on proxy-buffering - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:157 @ 07/16/23 23:27:53.686 (10.226s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:53.687
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:27:54.173 (486ms)
-
-
- > Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:27:54.174
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:02.854 (8.714s)
> Enter [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 07/16/23 23:28:02.854
< Exit [BeforeEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:33 @ 07/16/23 23:28:06.916 (4.062s)
> Enter [It] should use ~* location modifier if regex annotation is present - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:111 @ 07/16/23 23:28:06.916
STEP: creating a regular ingress definition - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:114 @ 07/16/23 23:28:06.917
STEP: creating an ingress definition with the use-regex amd rewrite-target annotation - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:123 @ 07/16/23 23:28:17.092
STEP: ensuring '/foo' matches '~* ^/foo' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:137 @ 07/16/23 23:28:27.312
STEP: ensuring '/foo/bar' matches '~* ^/foo.+' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:147 @ 07/16/23 23:28:27.32
< Exit [It] should use ~* location modifier if regex annotation is present - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/rewrite.go:111 @ 07/16/23 23:28:27.329 (20.413s)
> Enter [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:27.329
< Exit [AfterEach] [Annotations] rewrite-target use-regex enable-rewrite-log - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:27.758 (429ms)
-
-
- > Enter [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:27.76
< Exit [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:35.027 (7.302s)
> Enter [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:42 @ 07/16/23 23:28:35.027
< Exit [BeforeEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:42 @ 07/16/23 23:28:35.031 (4ms)
> Enter [It] should expose an ExternalName TCP service - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:80 @ 07/16/23 23:28:35.031
< Exit [It] should expose an ExternalName TCP service - /go/src/k8s.io/ingress-nginx/test/e2e/tcpudp/tcp.go:80 @ 07/16/23 23:28:38.754 (3.722s)
> Enter [AfterEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:38.754
< Exit [AfterEach] [TCP] tcp-services - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:28:39.199 (446ms)
-
-
- > Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:39.205
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:28:47.511 (8.307s)
> Enter [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:28:47.511
< Exit [BeforeEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:31 @ 07/16/23 23:28:51.575 (4.064s)
> Enter [It] should disable modsecurity using 'modsecurity off;' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:132 @ 07/16/23 23:28:51.575
< Exit [It] should disable modsecurity using 'modsecurity off;' - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/modsecurity/modsecurity.go:132 @ 07/16/23 23:29:08.745 (17.204s)
> Enter [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:08.745
< Exit [AfterEach] [Annotations] modsecurity owasp - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:29:09.129 (383ms)
-
-
- > Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:09.13
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:29:17.772 (8.641s)
> Enter [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 07/16/23 23:29:17.772
< Exit [BeforeEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:41 @ 07/16/23 23:29:28.874 (11.102s)
> Enter [It] should enable PROXY Protocol for TCP - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:155 @ 07/16/23 23:29:28.874
Automatically polling progress:
[Setting] use-proxy-protocol should enable PROXY Protocol for TCP (Spec Runtime: 3m19.498s)
/go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:155
In [It] (Node Runtime: 2m59.754s)
/go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:155
Spec Goroutine
goroutine 2683 [IO wait, 2 minutes]
internal/poll.runtime_pollWait(0x7f5468c3dd40, 0x72)
/usr/local/go/src/runtime/netpoll.go:306
internal/poll.(*pollDesc).wait(0xc000c86a00?, 0xc000daf725?, 0x0)
/usr/local/go/src/internal/poll/fd_poll_runtime.go:84
internal/poll.(*pollDesc).waitRead(...)
/usr/local/go/src/internal/poll/fd_poll_runtime.go:89
internal/poll.(*FD).Read(0xc000c86a00, {0xc000daf725, 0x15b, 0x15b})
/usr/local/go/src/internal/poll/fd_unix.go:167
net.(*netFD).Read(0xc000c86a00, {0xc000daf725?, 0x453656?, 0x380?})
/usr/local/go/src/net/fd_posix.go:55
net.(*conn).Read(0xc000126120, {0xc000daf725?, 0x19913c0?, 0xc000daf500?})
/usr/local/go/src/net/net.go:183
io.ReadAll({0x1f62e00, 0xc000126120})
/usr/local/go/src/io/io.go:701
> k8s.io/ingress-nginx/test/e2e/settings.glob..func38.5()
/go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:211
github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func3({0xa0558e, 0xc000cfc300})
/go/src/k8s.io/ingress-nginx/.modcache/github.com/onsi/ginkgo/v2@v2.9.0/internal/node.go:463
github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3()
/go/src/k8s.io/ingress-nginx/.modcache/github.com/onsi/ginkgo/v2@v2.9.0/internal/suite.go:863
github.com/onsi/ginkgo/v2/internal.(*Suite).runNode
/go/src/k8s.io/ingress-nginx/.modcache/github.com/onsi/ginkgo/v2@v2.9.0/internal/suite.go:850
< Exit [It] should enable PROXY Protocol for TCP - /go/src/k8s.io/ingress-nginx/test/e2e/settings/proxy_protocol.go:155 @ 07/16/23 23:39:43.452 (10m15.338s)
> Enter [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:43.452
< Exit [AfterEach] [Setting] use-proxy-protocol - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:39:44.02 (568ms)
-
-
- > Enter [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:44.023
< Exit [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:39:52.324 (8.301s)
> Enter [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:35 @ 07/16/23 23:39:52.324
< Exit [BeforeEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:35 @ 07/16/23 23:40:01.39 (9.101s)
> Enter [It] trusts X-Forwarded-For header only when setting is true - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:40 @ 07/16/23 23:40:01.39
STEP: ensuring single values are parsed correctly - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:54 @ 07/16/23 23:40:18.685
< Exit [It] trusts X-Forwarded-For header only when setting is true - /go/src/k8s.io/ingress-nginx/test/e2e/settings/enable_real_ip.go:40 @ 07/16/23 23:40:18.693 (17.302s)
> Enter [AfterEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:18.693
< Exit [AfterEach] [Setting] enable-real-ip - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:19.14 (448ms)
-
-
- > Enter [BeforeEach] [Setting] [Lua] lua-shared-dicts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:19.154
< Exit [BeforeEach] [Setting] [Lua] lua-shared-dicts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:27.75 (8.595s)
> Enter [It] configures lua shared dicts - /go/src/k8s.io/ingress-nginx/test/e2e/settings/lua_shared_dicts.go:29 @ 07/16/23 23:40:27.75
< Exit [It] configures lua shared dicts - /go/src/k8s.io/ingress-nginx/test/e2e/settings/lua_shared_dicts.go:29 @ 07/16/23 23:40:39.948 (12.232s)
> Enter [AfterEach] [Setting] [Lua] lua-shared-dicts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:39.948
< Exit [AfterEach] [Setting] [Lua] lua-shared-dicts - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:40:40.361 (413ms)
-
-
- > Enter [BeforeEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:40.362
< Exit [BeforeEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:40:49.01 (8.647s)
> Enter [It] should create sync events - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_sync_events.go:53 @ 07/16/23 23:40:49.01
< Exit [It] should create sync events - /go/src/k8s.io/ingress-nginx/test/e2e/settings/disable_sync_events.go:53 @ 07/16/23 23:41:11.382 (22.406s)
> Enter [AfterEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:11.382
< Exit [AfterEach] [Flag] disable-sync-events - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:12.084 (702ms)
-
-
- > Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:41:12.087
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:41:19.624 (7.537s)
> Enter [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:41:19.624
< Exit [BeforeEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:32 @ 07/16/23 23:41:23.694 (4.07s)
> Enter [It] should build proxy next upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:194 @ 07/16/23 23:41:23.694
< Exit [It] should build proxy next upstream - /go/src/k8s.io/ingress-nginx/test/e2e/annotations/proxy.go:194 @ 07/16/23 23:41:33.973 (10.314s)
> Enter [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:33.974
< Exit [AfterEach] [Annotations] proxy-* - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:41:34.437 (464ms)
-
-
- > Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:41:34.439
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:83 @ 07/16/23 23:41:42.983 (8.544s)
> Enter [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:41:42.983
< Exit [BeforeEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:51 @ 07/16/23 23:41:47.055 (4.073s)
> Enter [It] should include opentracing_trust_incoming_span off directive when disabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:85 @ 07/16/23 23:41:47.055
< Exit [It] should include opentracing_trust_incoming_span off directive when disabled - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:85 @ 07/16/23 23:42:04.248 (17.227s)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:42:04.248
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/framework/framework.go:84 @ 07/16/23 23:42:04.658 (410ms)
> Enter [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:42:04.658
< Exit [AfterEach] Configure OpenTracing - /go/src/k8s.io/ingress-nginx/test/e2e/settings/opentracing.go:55 @ 07/16/23 23:42:04.658 (0s)
-
-
-
\ No newline at end of file
From be6f1d54c75af5c7ce6db646fe99deb0f77b6570 Mon Sep 17 00:00:00 2001
From: Nicholas Orlowsky
Date: Mon, 17 Jul 2023 00:04:41 -0400
Subject: [PATCH 024/283] gofmt
---
test/e2e/e2e.go | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/test/e2e/e2e.go b/test/e2e/e2e.go
index a61c368ee..5d410248a 100644
--- a/test/e2e/e2e.go
+++ b/test/e2e/e2e.go
@@ -32,6 +32,7 @@ import (
_ "k8s.io/ingress-nginx/test/e2e/admission"
_ "k8s.io/ingress-nginx/test/e2e/annotations"
_ "k8s.io/ingress-nginx/test/e2e/annotations/modsecurity"
+ _ "k8s.io/ingress-nginx/test/e2e/cgroups"
_ "k8s.io/ingress-nginx/test/e2e/dbg"
_ "k8s.io/ingress-nginx/test/e2e/defaultbackend"
_ "k8s.io/ingress-nginx/test/e2e/endpointslices"
@@ -50,7 +51,6 @@ import (
_ "k8s.io/ingress-nginx/test/e2e/ssl"
_ "k8s.io/ingress-nginx/test/e2e/status"
_ "k8s.io/ingress-nginx/test/e2e/tcpudp"
- _ "k8s.io/ingress-nginx/test/e2e/cgroups"
)
// RunE2ETests checks configuration parameters (specified through flags) and then runs
From 0a01f555d19a9456a9924ce19e5ad51808805e91 Mon Sep 17 00:00:00 2001
From: Nicholas Orlowsky
Date: Wed, 21 Feb 2024 16:41:41 +0000
Subject: [PATCH 025/283] bump to rerun ci
---
SECURITY.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/SECURITY.md b/SECURITY.md
index 2083d44cd..d297924d6 100644
--- a/SECURITY.md
+++ b/SECURITY.md
@@ -20,3 +20,4 @@ Information about supported Kubernetes versions can be found on the
[kubernetes-security-announce-rss]: https://groups.google.com/forum/feed/kubernetes-security-announce/msgs/rss_v2_0.xml?num=50
[Kubernetes version and version skew support policy]: https://kubernetes.io/docs/setup/release/version-skew-policy/#supported-versions
[Kubernetes Security and Disclosure Information]: https://kubernetes.io/docs/reference/issues-security/security/#report-a-vulnerability
+
From 63fb4c65126347dd7d578bfaf699d0843852708c Mon Sep 17 00:00:00 2001
From: Nicholas Orlowsky
Date: Wed, 21 Feb 2024 16:41:48 +0000
Subject: [PATCH 026/283] bump to rerun ci
---
SECURITY.md | 1 -
1 file changed, 1 deletion(-)
diff --git a/SECURITY.md b/SECURITY.md
index d297924d6..2083d44cd 100644
--- a/SECURITY.md
+++ b/SECURITY.md
@@ -20,4 +20,3 @@ Information about supported Kubernetes versions can be found on the
[kubernetes-security-announce-rss]: https://groups.google.com/forum/feed/kubernetes-security-announce/msgs/rss_v2_0.xml?num=50
[Kubernetes version and version skew support policy]: https://kubernetes.io/docs/setup/release/version-skew-policy/#supported-versions
[Kubernetes Security and Disclosure Information]: https://kubernetes.io/docs/reference/issues-security/security/#report-a-vulnerability
-
From ebc61bdea4eecea14ee168ff30b4359d218f09f4 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 8 Apr 2024 03:50:43 -0700
Subject: [PATCH 027/283] Bump the all group with 3 updates (#11225)
Bumps the all group with 3 updates: [docker/setup-buildx-action](https://github.com/docker/setup-buildx-action), [dorny/test-reporter](https://github.com/dorny/test-reporter) and [github/codeql-action](https://github.com/github/codeql-action).
Updates `docker/setup-buildx-action` from 3.2.0 to 3.3.0
- [Release notes](https://github.com/docker/setup-buildx-action/releases)
- [Commits](https://github.com/docker/setup-buildx-action/compare/2b51285047da1547ffb1b2203d8be4c0af6b1f20...d70bba72b1f3fd22344832f00baa16ece964efeb)
Updates `dorny/test-reporter` from 1.8.0 to 1.9.0
- [Release notes](https://github.com/dorny/test-reporter/releases)
- [Changelog](https://github.com/dorny/test-reporter/blob/main/CHANGELOG.md)
- [Commits](https://github.com/dorny/test-reporter/compare/eaa763f6ffc21c7a37837f56cd5f9737f27fc6c8...c40d89d5e987cd80f3a32b3c233556e22bdca958)
Updates `github/codeql-action` from 3.24.9 to 3.24.10
- [Release notes](https://github.com/github/codeql-action/releases)
- [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md)
- [Commits](https://github.com/github/codeql-action/compare/1b1aada464948af03b950897e5eb522f92603cc2...4355270be187e1b672a7a1c7c7bae5afdc1ab94a)
---
updated-dependencies:
- dependency-name: docker/setup-buildx-action
dependency-type: direct:production
update-type: version-update:semver-minor
dependency-group: all
- dependency-name: dorny/test-reporter
dependency-type: direct:production
update-type: version-update:semver-minor
dependency-group: all
- dependency-name: github/codeql-action
dependency-type: direct:production
update-type: version-update:semver-patch
dependency-group: all
...
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
.github/workflows/ci.yaml | 2 +-
.github/workflows/images.yaml | 2 +-
.github/workflows/junit-reports.yaml | 2 +-
.github/workflows/scorecards.yml | 2 +-
.github/workflows/vulnerability-scans.yaml | 2 +-
5 files changed, 5 insertions(+), 5 deletions(-)
diff --git a/.github/workflows/ci.yaml b/.github/workflows/ci.yaml
index f19b7158f..3e7067b8f 100644
--- a/.github/workflows/ci.yaml
+++ b/.github/workflows/ci.yaml
@@ -124,7 +124,7 @@ jobs:
- name: Set up Docker Buildx
id: buildx
- uses: docker/setup-buildx-action@2b51285047da1547ffb1b2203d8be4c0af6b1f20 # v3.2.0
+ uses: docker/setup-buildx-action@d70bba72b1f3fd22344832f00baa16ece964efeb # v3.3.0
with:
version: latest
diff --git a/.github/workflows/images.yaml b/.github/workflows/images.yaml
index e5684ba79..4afc27aa2 100644
--- a/.github/workflows/images.yaml
+++ b/.github/workflows/images.yaml
@@ -200,7 +200,7 @@ jobs:
uses: docker/setup-qemu-action@68827325e0b33c7199eb31dd4e31fbe9023e06e3 # v3.0.0
- name: Set up Docker Buildx
id: buildx
- uses: docker/setup-buildx-action@2b51285047da1547ffb1b2203d8be4c0af6b1f20 # v3.2.0
+ uses: docker/setup-buildx-action@d70bba72b1f3fd22344832f00baa16ece964efeb # v3.3.0
with:
version: latest
platforms: ${{ env.PLATFORMS }}
diff --git a/.github/workflows/junit-reports.yaml b/.github/workflows/junit-reports.yaml
index 3b3318def..0d76abbfb 100644
--- a/.github/workflows/junit-reports.yaml
+++ b/.github/workflows/junit-reports.yaml
@@ -9,7 +9,7 @@ jobs:
report:
runs-on: ubuntu-latest
steps:
- - uses: dorny/test-reporter@eaa763f6ffc21c7a37837f56cd5f9737f27fc6c8 # v1.8.0
+ - uses: dorny/test-reporter@c40d89d5e987cd80f3a32b3c233556e22bdca958 # v1.9.0
with:
artifact: /e2e-test-reports-(.*)/
name: JEST Tests $1 # Name of the check run which will be created
diff --git a/.github/workflows/scorecards.yml b/.github/workflows/scorecards.yml
index 3018dee65..d00db6ba3 100644
--- a/.github/workflows/scorecards.yml
+++ b/.github/workflows/scorecards.yml
@@ -59,6 +59,6 @@ jobs:
# Upload the results to GitHub's code scanning dashboard.
- name: "Upload to code-scanning"
- uses: github/codeql-action/upload-sarif@1b1aada464948af03b950897e5eb522f92603cc2 # v3.24.9
+ uses: github/codeql-action/upload-sarif@4355270be187e1b672a7a1c7c7bae5afdc1ab94a # v3.24.10
with:
sarif_file: results.sarif
diff --git a/.github/workflows/vulnerability-scans.yaml b/.github/workflows/vulnerability-scans.yaml
index 2d671d966..3a34541a5 100644
--- a/.github/workflows/vulnerability-scans.yaml
+++ b/.github/workflows/vulnerability-scans.yaml
@@ -75,7 +75,7 @@ jobs:
# This step checks out a copy of your repository.
- name: Upload SARIF file
- uses: github/codeql-action/upload-sarif@1b1aada464948af03b950897e5eb522f92603cc2 # v3.24.9
+ uses: github/codeql-action/upload-sarif@4355270be187e1b672a7a1c7c7bae5afdc1ab94a # v3.24.10
with:
token: ${{ github.token }}
# Path to SARIF file relative to the root of the repository
From a93e9b938d91dc50b5eb46b420a640f427d3665e Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 8 Apr 2024 04:20:12 -0700
Subject: [PATCH 028/283] Bump github.com/prometheus/client_model in the all
group (#11226)
Bumps the all group with 1 update: [github.com/prometheus/client_model](https://github.com/prometheus/client_model).
Updates `github.com/prometheus/client_model` from 0.6.0 to 0.6.1
- [Release notes](https://github.com/prometheus/client_model/releases)
- [Commits](https://github.com/prometheus/client_model/compare/v0.6.0...v0.6.1)
---
updated-dependencies:
- dependency-name: github.com/prometheus/client_model
dependency-type: direct:production
update-type: version-update:semver-patch
dependency-group: all
...
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 2 +-
go.sum | 4 ++--
2 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/go.mod b/go.mod
index a0bb140a0..81c402358 100644
--- a/go.mod
+++ b/go.mod
@@ -18,7 +18,7 @@ require (
github.com/opencontainers/runc v1.1.12
github.com/pmezard/go-difflib v1.0.0
github.com/prometheus/client_golang v1.19.0
- github.com/prometheus/client_model v0.6.0
+ github.com/prometheus/client_model v0.6.1
github.com/prometheus/common v0.51.1
github.com/spf13/cobra v1.8.0
github.com/spf13/pflag v1.0.5
diff --git a/go.sum b/go.sum
index 4edd9fe56..c7a4596f4 100644
--- a/go.sum
+++ b/go.sum
@@ -317,8 +317,8 @@ github.com/prometheus/client_model v0.0.0-20180712105110-5c3871d89910/go.mod h1:
github.com/prometheus/client_model v0.0.0-20190129233127-fd36f4220a90/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
github.com/prometheus/client_model v0.0.0-20190812154241-14fe0d1b01d4/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
github.com/prometheus/client_model v0.2.0/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
-github.com/prometheus/client_model v0.6.0 h1:k1v3CzpSRUTrKMppY35TLwPvxHqBu0bYgxZzqGIgaos=
-github.com/prometheus/client_model v0.6.0/go.mod h1:NTQHnmxFpouOD0DpvP4XujX3CdOAGQPoaGhyTchlyt8=
+github.com/prometheus/client_model v0.6.1 h1:ZKSh/rekM+n3CeS952MLRAdFwIKqeY8b62p8ais2e9E=
+github.com/prometheus/client_model v0.6.1/go.mod h1:OrxVMOVHjw3lKMa8+x6HeMGkHMQyHDk9E3jmP2AmGiY=
github.com/prometheus/common v0.4.1/go.mod h1:TNfzLD0ON7rHzMJeJkieUDPYmFC7Snx/y86RQel1bk4=
github.com/prometheus/common v0.10.0/go.mod h1:Tlit/dnDKsSWFlCLTWaA1cyBgKHSMdTB80sz/V91rCo=
github.com/prometheus/common v0.26.0/go.mod h1:M7rCNAaPfAosfx8veZJCuw84e35h3Cfd9VFqTh1DIvc=
From 3c2cf13bb693ef185258d634a20764fa851a8666 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 8 Apr 2024 04:23:07 -0700
Subject: [PATCH 029/283] Bump golang.org/x/crypto from 0.21.0 to 0.22.0
(#11229)
Bumps [golang.org/x/crypto](https://github.com/golang/crypto) from 0.21.0 to 0.22.0.
- [Commits](https://github.com/golang/crypto/compare/v0.21.0...v0.22.0)
---
updated-dependencies:
- dependency-name: golang.org/x/crypto
dependency-type: direct:production
update-type: version-update:semver-minor
...
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 6 +++---
go.sum | 12 ++++++------
2 files changed, 9 insertions(+), 9 deletions(-)
diff --git a/go.mod b/go.mod
index 81c402358..7b8c3beb5 100644
--- a/go.mod
+++ b/go.mod
@@ -25,7 +25,7 @@ require (
github.com/stretchr/testify v1.9.0
github.com/yudai/gojsondiff v1.0.0
github.com/zakjan/cert-chain-resolver v0.0.0-20221221105603-fcedb00c5b30
- golang.org/x/crypto v0.21.0
+ golang.org/x/crypto v0.22.0
google.golang.org/grpc v1.62.1
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab
gopkg.in/go-playground/pool.v3 v3.1.1
@@ -107,8 +107,8 @@ require (
golang.org/x/net v0.22.0 // indirect
golang.org/x/oauth2 v0.18.0 // indirect
golang.org/x/sync v0.6.0 // indirect
- golang.org/x/sys v0.18.0 // indirect
- golang.org/x/term v0.18.0 // indirect
+ golang.org/x/sys v0.19.0 // indirect
+ golang.org/x/term v0.19.0 // indirect
golang.org/x/text v0.14.0 // indirect
golang.org/x/time v0.5.0 // indirect
golang.org/x/tools v0.18.0 // indirect
diff --git a/go.sum b/go.sum
index c7a4596f4..4b635c2ad 100644
--- a/go.sum
+++ b/go.sum
@@ -401,8 +401,8 @@ golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8U
golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
golang.org/x/crypto v0.0.0-20210616213533-5ff15b29337e/go.mod h1:GvvjBRRGRdwPK5ydBHafDWAxML/pGHZbMvKqRZ5+Abc=
golang.org/x/crypto v0.0.0-20210921155107-089bfa567519/go.mod h1:GvvjBRRGRdwPK5ydBHafDWAxML/pGHZbMvKqRZ5+Abc=
-golang.org/x/crypto v0.21.0 h1:X31++rzVUdKhX5sWmSOFZxx8UW/ldWx55cbf08iNAMA=
-golang.org/x/crypto v0.21.0/go.mod h1:0BP7YvVV9gBbVKyeTG0Gyn+gZm94bibOW5BjDEYAOMs=
+golang.org/x/crypto v0.22.0 h1:g1v0xeRhjcugydODzvb3mEM9SQ0HGp9s/nh3COQ/C30=
+golang.org/x/crypto v0.22.0/go.mod h1:vr6Su+7cTlO45qkww3VDJlzDn0ctJvRgYbC2NvXHt+M=
golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
golang.org/x/exp v0.0.0-20190306152737-a1d7652674e8/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
golang.org/x/exp v0.0.0-20190510132918-efd6b22b2522/go.mod h1:ZjyILWgesfNpC6sMxTJOJm9Kp84zZh5NQWvqDGG3Qr8=
@@ -543,12 +543,12 @@ golang.org/x/sys v0.0.0-20220715151400-c0bba94af5f8/go.mod h1:oPkhp1MJrh7nUepCBc
golang.org/x/sys v0.0.0-20220722155257-8c9f86f7a55f/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.0.0-20220811171246-fbc7d0a398ab/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.18.0 h1:DBdB3niSjOA/O0blCZBqDefyWNYveAYMNF1Wum0DYQ4=
-golang.org/x/sys v0.18.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
+golang.org/x/sys v0.19.0 h1:q5f1RH2jigJ1MoAWp2KTp3gm5zAGFUTarQZ5U386+4o=
+golang.org/x/sys v0.19.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8=
-golang.org/x/term v0.18.0 h1:FcHjZXDMxI8mM3nwhX9HlKop4C0YQvCVCdwYl2wOtE8=
-golang.org/x/term v0.18.0/go.mod h1:ILwASektA3OnRv7amZ1xhE/KTR+u50pbXfZ03+6Nx58=
+golang.org/x/term v0.19.0 h1:+ThwsDv+tYfnJFhF4L8jITxu1tdTWRTZpdsWgEgjL6Q=
+golang.org/x/term v0.19.0/go.mod h1:2CuTdWZ7KHSQwUzKva0cbMg6q2DMI3Mmxp+gKJbskEk=
golang.org/x/text v0.0.0-20170915032832-14c0d48ead0c/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
golang.org/x/text v0.3.1-0.20180807135948-17ff2d5776d2/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
From cb315d2db437ed8f037c2d3184e8560cf2d1c6e5 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 8 Apr 2024 05:24:01 -0700
Subject: [PATCH 030/283] Bump github.com/prometheus/common from 0.51.1 to
0.52.2 (#11227)
Bumps [github.com/prometheus/common](https://github.com/prometheus/common) from 0.51.1 to 0.52.2.
- [Release notes](https://github.com/prometheus/common/releases)
- [Commits](https://github.com/prometheus/common/compare/v0.51.1...v0.52.2)
---
updated-dependencies:
- dependency-name: github.com/prometheus/common
dependency-type: direct:production
update-type: version-update:semver-minor
...
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 2 +-
go.sum | 4 ++--
2 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/go.mod b/go.mod
index 7b8c3beb5..22b5fa450 100644
--- a/go.mod
+++ b/go.mod
@@ -19,7 +19,7 @@ require (
github.com/pmezard/go-difflib v1.0.0
github.com/prometheus/client_golang v1.19.0
github.com/prometheus/client_model v0.6.1
- github.com/prometheus/common v0.51.1
+ github.com/prometheus/common v0.52.2
github.com/spf13/cobra v1.8.0
github.com/spf13/pflag v1.0.5
github.com/stretchr/testify v1.9.0
diff --git a/go.sum b/go.sum
index 4b635c2ad..2d7c137b5 100644
--- a/go.sum
+++ b/go.sum
@@ -323,8 +323,8 @@ github.com/prometheus/common v0.4.1/go.mod h1:TNfzLD0ON7rHzMJeJkieUDPYmFC7Snx/y8
github.com/prometheus/common v0.10.0/go.mod h1:Tlit/dnDKsSWFlCLTWaA1cyBgKHSMdTB80sz/V91rCo=
github.com/prometheus/common v0.26.0/go.mod h1:M7rCNAaPfAosfx8veZJCuw84e35h3Cfd9VFqTh1DIvc=
github.com/prometheus/common v0.29.0/go.mod h1:vu+V0TpY+O6vW9J44gczi3Ap/oXXR10b+M/gUGO4Hls=
-github.com/prometheus/common v0.51.1 h1:eIjN50Bwglz6a/c3hAgSMcofL3nD+nFQkV6Dd4DsQCw=
-github.com/prometheus/common v0.51.1/go.mod h1:lrWtQx+iDfn2mbH5GUzlH9TSHyfZpHkSiG1W7y3sF2Q=
+github.com/prometheus/common v0.52.2 h1:LW8Vk7BccEdONfrJBDffQGRtpSzi5CQaRZGtboOO2ck=
+github.com/prometheus/common v0.52.2/go.mod h1:lrWtQx+iDfn2mbH5GUzlH9TSHyfZpHkSiG1W7y3sF2Q=
github.com/prometheus/exporter-toolkit v0.7.0/go.mod h1:ZUBIj498ePooX9t/2xtDjeQYwvRpiPP2lh5u4iblj2g=
github.com/prometheus/procfs v0.0.0-20181005140218-185b4288413d/go.mod h1:c3At6R/oaqEKCNdg8wHV1ftS6bRYblBhIjjI8uT2IGk=
github.com/prometheus/procfs v0.0.2/go.mod h1:TjEm7ze935MbeOT/UhFTIMYKhuLP4wbCsTZCD3I8kEA=
From d808e389117b90ce1766a8b35278306271116bc1 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 8 Apr 2024 05:26:39 -0700
Subject: [PATCH 031/283] Bump google.golang.org/grpc from 1.62.1 to 1.63.0
(#11228)
Bumps [google.golang.org/grpc](https://github.com/grpc/grpc-go) from 1.62.1 to 1.63.0.
- [Release notes](https://github.com/grpc/grpc-go/releases)
- [Commits](https://github.com/grpc/grpc-go/compare/v1.62.1...v1.63.0)
---
updated-dependencies:
- dependency-name: google.golang.org/grpc
dependency-type: direct:production
update-type: version-update:semver-minor
...
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 4 ++--
go.sum | 8 ++++----
2 files changed, 6 insertions(+), 6 deletions(-)
diff --git a/go.mod b/go.mod
index 22b5fa450..2c63151a8 100644
--- a/go.mod
+++ b/go.mod
@@ -26,7 +26,7 @@ require (
github.com/yudai/gojsondiff v1.0.0
github.com/zakjan/cert-chain-resolver v0.0.0-20221221105603-fcedb00c5b30
golang.org/x/crypto v0.22.0
- google.golang.org/grpc v1.62.1
+ google.golang.org/grpc v1.63.0
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab
gopkg.in/go-playground/pool.v3 v3.1.1
gopkg.in/mcuadros/go-syslog.v2 v2.3.0
@@ -113,7 +113,7 @@ require (
golang.org/x/time v0.5.0 // indirect
golang.org/x/tools v0.18.0 // indirect
google.golang.org/appengine v1.6.8 // indirect
- google.golang.org/genproto/googleapis/rpc v0.0.0-20240221002015-b0ce06bbee7c // indirect
+ google.golang.org/genproto/googleapis/rpc v0.0.0-20240227224415-6ceb2ff114de // indirect
google.golang.org/protobuf v1.33.0 // indirect
gopkg.in/evanphx/json-patch.v5 v5.9.0 // indirect
gopkg.in/go-playground/assert.v1 v1.2.1 // indirect
diff --git a/go.sum b/go.sum
index 2d7c137b5..77c8836fc 100644
--- a/go.sum
+++ b/go.sum
@@ -670,8 +670,8 @@ google.golang.org/genproto v0.0.0-20200618031413-b414f8b61790/go.mod h1:jDfRM7Fc
google.golang.org/genproto v0.0.0-20200729003335-053ba62fc06f/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
google.golang.org/genproto v0.0.0-20200804131852-c06518451d9c/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
google.golang.org/genproto v0.0.0-20200825200019-8632dd797987/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
-google.golang.org/genproto/googleapis/rpc v0.0.0-20240221002015-b0ce06bbee7c h1:NUsgEN92SQQqzfA+YtqYNqYmB3DMMYLlIwUZAQFVFbo=
-google.golang.org/genproto/googleapis/rpc v0.0.0-20240221002015-b0ce06bbee7c/go.mod h1:H4O17MA/PE9BsGx3w+a+W2VOLLD1Qf7oJneAoU6WktY=
+google.golang.org/genproto/googleapis/rpc v0.0.0-20240227224415-6ceb2ff114de h1:cZGRis4/ot9uVm639a+rHCUaG0JJHEsdyzSQTMX+suY=
+google.golang.org/genproto/googleapis/rpc v0.0.0-20240227224415-6ceb2ff114de/go.mod h1:H4O17MA/PE9BsGx3w+a+W2VOLLD1Qf7oJneAoU6WktY=
google.golang.org/grpc v1.19.0/go.mod h1:mqu4LbDTu4XGKhr4mRzUsmM4RtVoemTSY81AxZiDr8c=
google.golang.org/grpc v1.20.1/go.mod h1:10oTOabMzJvdu6/UiuZezV6QK5dSlG84ov/aaiqXj38=
google.golang.org/grpc v1.21.1/go.mod h1:oYelfM1adQP15Ek0mdvEgi9Df8B9CZIaU1084ijfRaM=
@@ -684,8 +684,8 @@ google.golang.org/grpc v1.28.0/go.mod h1:rpkK4SK4GF4Ach/+MFLZUBavHOvF2JJB5uozKKa
google.golang.org/grpc v1.29.1/go.mod h1:itym6AZVZYACWQqET3MqgPpjcuV5QH3BxFS3IjizoKk=
google.golang.org/grpc v1.30.0/go.mod h1:N36X2cJ7JwdamYAgDz+s+rVMFjt3numwzf/HckM8pak=
google.golang.org/grpc v1.31.0/go.mod h1:N36X2cJ7JwdamYAgDz+s+rVMFjt3numwzf/HckM8pak=
-google.golang.org/grpc v1.62.1 h1:B4n+nfKzOICUXMgyrNd19h/I9oH0L1pizfk1d4zSgTk=
-google.golang.org/grpc v1.62.1/go.mod h1:IWTG0VlJLCh1SkC58F7np9ka9mx/WNkjl4PGJaiq+QE=
+google.golang.org/grpc v1.63.0 h1:WjKe+dnvABXyPJMD7KDNLxtoGk5tgk+YFWN6cBWjZE8=
+google.golang.org/grpc v1.63.0/go.mod h1:WAX/8DgncnokcFUldAxq7GeB5DXHDbMF+lLvDomNkRA=
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab h1:tg8hvIl5RmFBuXlcJMuL0h4Psh1gx5Q5xEMwzBZIzWA=
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab/go.mod h1:liVNnGuZDITxuksuZ+BBvdy7FcJfeNk+efF9qgqNUmc=
google.golang.org/protobuf v0.0.0-20200109180630-ec00e32a8dfd/go.mod h1:DFci5gLYBciE7Vtevhsrf46CRTquxDuWsQurQQe4oz8=
From b4cae70b52d23b7fc09f8409345bf4f2cf60e05e Mon Sep 17 00:00:00 2001
From: Tony Li
Date: Tue, 9 Apr 2024 03:32:21 +0800
Subject: [PATCH 032/283] remove _ssl_expire_time_seconds metric by identifier
(#9706)
Signed-off-by: xiayu.lyt
---
internal/ingress/controller/controller.go | 3 +--
.../ingress/metric/collectors/controller.go | 24 ++++++++++++-------
.../metric/collectors/controller_test.go | 13 ++++++++--
internal/ingress/metric/dummy.go | 2 +-
internal/ingress/metric/main.go | 6 ++---
5 files changed, 31 insertions(+), 17 deletions(-)
diff --git a/internal/ingress/controller/controller.go b/internal/ingress/controller/controller.go
index db786a15c..a43c143e3 100644
--- a/internal/ingress/controller/controller.go
+++ b/internal/ingress/controller/controller.go
@@ -253,9 +253,8 @@ func (n *NGINXController) syncIngress(interface{}) error {
}
ri := utilingress.GetRemovedIngresses(n.runningConfig, pcfg)
- re := utilingress.GetRemovedHosts(n.runningConfig, pcfg)
rc := utilingress.GetRemovedCertificateSerialNumbers(n.runningConfig, pcfg)
- n.metricCollector.RemoveMetrics(ri, re, rc)
+ n.metricCollector.RemoveMetrics(ri, rc)
n.runningConfig = pcfg
diff --git a/internal/ingress/metric/collectors/controller.go b/internal/ingress/metric/collectors/controller.go
index e1d6789bb..4ee84bc56 100644
--- a/internal/ingress/metric/collectors/controller.go
+++ b/internal/ingress/metric/collectors/controller.go
@@ -30,7 +30,7 @@ import (
var (
operation = []string{"controller_namespace", "controller_class", "controller_pod"}
ingressOperation = []string{"controller_namespace", "controller_class", "controller_pod", "namespace", "ingress"}
- sslLabelHost = []string{"namespace", "class", "host", "secret_name"}
+ sslLabelHost = []string{"namespace", "class", "host", "secret_name", "identifier"}
sslInfoLabels = []string{"namespace", "class", "host", "secret_name", "identifier", "issuer_organization", "issuer_common_name", "serial_number", "public_key_algorithm"}
orphanityLabels = []string{"controller_namespace", "controller_class", "controller_pod", "namespace", "ingress", "type"}
)
@@ -305,6 +305,7 @@ func (cm *Controller) SetSSLExpireTime(servers []*ingress.Server) {
}
labels["host"] = s.Hostname
labels["secret_name"] = s.SSLCert.Name
+ labels["identifier"] = s.SSLCert.Identifier()
cm.sslExpireTime.With(labels).Set(float64(s.SSLCert.ExpireTime.Unix()))
}
@@ -337,9 +338,9 @@ func (cm *Controller) SetSSLInfo(servers []*ingress.Server) {
}
}
-// RemoveMetrics removes metrics for hostnames not available anymore
-func (cm *Controller) RemoveMetrics(hosts, certificates []string, registry prometheus.Gatherer) {
- cm.removeSSLExpireMetrics(true, hosts, registry)
+// RemoveMetrics removes metrics for certificates not available anymore by identifier
+func (cm *Controller) RemoveMetrics(certificates []string, registry prometheus.Gatherer) {
+ cm.removeSSLExpireMetrics(true, certificates, registry)
cm.removeCertificatesMetrics(true, certificates, registry)
}
@@ -390,14 +391,14 @@ func (cm *Controller) removeCertificatesMetrics(onlyDefinedHosts bool, certifica
}
}
-func (cm *Controller) removeSSLExpireMetrics(onlyDefinedHosts bool, hosts []string, registry prometheus.Gatherer) {
+func (cm *Controller) removeSSLExpireMetrics(onlyDefinedCerts bool, certificates []string, registry prometheus.Gatherer) {
mfs, err := registry.Gather()
if err != nil {
klog.ErrorS(err, "Error gathering metrics")
return
}
- toRemove := sets.NewString(hosts...)
+ toRemove := sets.NewString(certificates...)
for _, mf := range mfs {
metricName := mf.GetName()
@@ -414,19 +415,24 @@ func (cm *Controller) removeSSLExpireMetrics(onlyDefinedHosts bool, hosts []stri
// remove labels that are constant
deleteConstants(labels)
+ identifier, ok := labels["identifier"]
+ if !ok {
+ continue
+ }
+
host, ok := labels["host"]
if !ok {
continue
}
- if onlyDefinedHosts && !toRemove.Has(host) {
+ if onlyDefinedCerts && !toRemove.Has(identifier) {
continue
}
- klog.V(2).InfoS("Removing prometheus metric", "gauge", metricName, "host", host)
+ klog.V(2).InfoS("Removing prometheus metric", "gauge", metricName, "host", host, "identifier", identifier)
removed := cm.sslExpireTime.Delete(labels)
if !removed {
- klog.V(2).InfoS("metric removed", "metric", metricName, "host", host, "labels", labels)
+ klog.V(2).InfoS("metric removed", "metric", metricName, "host", host, "identifier", identifier, "labels", labels)
}
}
}
diff --git a/internal/ingress/metric/collectors/controller_test.go b/internal/ingress/metric/collectors/controller_test.go
index 53a0fd31a..7c7ea8a67 100644
--- a/internal/ingress/metric/collectors/controller_test.go
+++ b/internal/ingress/metric/collectors/controller_test.go
@@ -88,6 +88,15 @@ func TestControllerCounters(t *testing.T) {
Hostname: "demo",
SSLCert: &ingress.SSLCert{
ExpireTime: t1,
+ Certificate: &x509.Certificate{
+ PublicKeyAlgorithm: x509.ECDSA,
+ Issuer: pkix.Name{
+ CommonName: "certificate issuer",
+ SerialNumber: "abcd1234",
+ Organization: []string{"issuer org"},
+ },
+ SerialNumber: big.NewInt(100),
+ },
},
},
{
@@ -102,7 +111,7 @@ func TestControllerCounters(t *testing.T) {
want: `
# HELP nginx_ingress_controller_ssl_expire_time_seconds Number of seconds since 1970 to the SSL Certificate expire.\n An example to check if this certificate will expire in 10 days is: "nginx_ingress_controller_ssl_expire_time_seconds < (time() + (10 * 24 * 3600))"
# TYPE nginx_ingress_controller_ssl_expire_time_seconds gauge
- nginx_ingress_controller_ssl_expire_time_seconds{class="nginx",host="demo",namespace="default",secret_name=""} 1.351807721e+09
+ nginx_ingress_controller_ssl_expire_time_seconds{class="nginx",host="demo",identifier="abcd1234-100",namespace="default",secret_name=""} 1.351807721e+09
`,
metrics: []string{"nginx_ingress_controller_ssl_expire_time_seconds"},
},
@@ -262,7 +271,7 @@ func TestRemoveMetrics(t *testing.T) {
cm.SetSSLExpireTime(servers)
cm.SetSSLInfo(servers)
- cm.RemoveMetrics([]string{"demo"}, []string{"abcd1234-100"}, reg)
+ cm.RemoveMetrics([]string{"abcd1234-100"}, reg)
if err := GatherAndCompare(cm, "", []string{"nginx_ingress_controller_ssl_expire_time_seconds"}, reg); err != nil {
t.Errorf("unexpected collecting result:\n%s", err)
diff --git a/internal/ingress/metric/dummy.go b/internal/ingress/metric/dummy.go
index a619ccbd8..7b1485280 100644
--- a/internal/ingress/metric/dummy.go
+++ b/internal/ingress/metric/dummy.go
@@ -54,7 +54,7 @@ func (dc DummyCollector) IncCheckCount(string, string) {}
func (dc DummyCollector) IncCheckErrorCount(string, string) {}
// RemoveMetrics dummy implementation
-func (dc DummyCollector) RemoveMetrics(_, _, _ []string) {}
+func (dc DummyCollector) RemoveMetrics(_, _ []string) {}
// Start dummy implementation
func (dc DummyCollector) Start(_ string) {}
diff --git a/internal/ingress/metric/main.go b/internal/ingress/metric/main.go
index aa35a5c51..93c31622c 100644
--- a/internal/ingress/metric/main.go
+++ b/internal/ingress/metric/main.go
@@ -46,7 +46,7 @@ type Collector interface {
IncOrphanIngress(string, string, string)
DecOrphanIngress(string, string, string)
- RemoveMetrics(ingresses, endpoints, certificates []string)
+ RemoveMetrics(ingresses, certificates []string)
SetSSLExpireTime([]*ingress.Server)
SetSSLInfo(servers []*ingress.Server)
@@ -131,9 +131,9 @@ func (c *collector) IncReloadErrorCount() {
c.ingressController.IncReloadErrorCount()
}
-func (c *collector) RemoveMetrics(ingresses, hosts, certificates []string) {
+func (c *collector) RemoveMetrics(ingresses, certificates []string) {
c.socket.RemoveMetrics(ingresses, c.registry)
- c.ingressController.RemoveMetrics(hosts, certificates, c.registry)
+ c.ingressController.RemoveMetrics(certificates, c.registry)
}
func (c *collector) Start(admissionStatus string) {
From d56aacdb31a0abe59ecb78d0ad078bd833c11da1 Mon Sep 17 00:00:00 2001
From: Tony Li
Date: Tue, 9 Apr 2024 17:08:48 +0800
Subject: [PATCH 033/283] Bump google.golang.org/grpc from 1.63.0 to 1.63.2
(#11237)
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Signed-off-by: 遐宇
---
go.mod | 2 +-
go.sum | 4 ++--
go.work.sum | 5 +++--
3 files changed, 6 insertions(+), 5 deletions(-)
diff --git a/go.mod b/go.mod
index 2c63151a8..780ce5959 100644
--- a/go.mod
+++ b/go.mod
@@ -26,7 +26,7 @@ require (
github.com/yudai/gojsondiff v1.0.0
github.com/zakjan/cert-chain-resolver v0.0.0-20221221105603-fcedb00c5b30
golang.org/x/crypto v0.22.0
- google.golang.org/grpc v1.63.0
+ google.golang.org/grpc v1.63.2
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab
gopkg.in/go-playground/pool.v3 v3.1.1
gopkg.in/mcuadros/go-syslog.v2 v2.3.0
diff --git a/go.sum b/go.sum
index 77c8836fc..b7f63c02f 100644
--- a/go.sum
+++ b/go.sum
@@ -684,8 +684,8 @@ google.golang.org/grpc v1.28.0/go.mod h1:rpkK4SK4GF4Ach/+MFLZUBavHOvF2JJB5uozKKa
google.golang.org/grpc v1.29.1/go.mod h1:itym6AZVZYACWQqET3MqgPpjcuV5QH3BxFS3IjizoKk=
google.golang.org/grpc v1.30.0/go.mod h1:N36X2cJ7JwdamYAgDz+s+rVMFjt3numwzf/HckM8pak=
google.golang.org/grpc v1.31.0/go.mod h1:N36X2cJ7JwdamYAgDz+s+rVMFjt3numwzf/HckM8pak=
-google.golang.org/grpc v1.63.0 h1:WjKe+dnvABXyPJMD7KDNLxtoGk5tgk+YFWN6cBWjZE8=
-google.golang.org/grpc v1.63.0/go.mod h1:WAX/8DgncnokcFUldAxq7GeB5DXHDbMF+lLvDomNkRA=
+google.golang.org/grpc v1.63.2 h1:MUeiw1B2maTVZthpU5xvASfTh3LDbxHd6IJ6QQVU+xM=
+google.golang.org/grpc v1.63.2/go.mod h1:WAX/8DgncnokcFUldAxq7GeB5DXHDbMF+lLvDomNkRA=
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab h1:tg8hvIl5RmFBuXlcJMuL0h4Psh1gx5Q5xEMwzBZIzWA=
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab/go.mod h1:liVNnGuZDITxuksuZ+BBvdy7FcJfeNk+efF9qgqNUmc=
google.golang.org/protobuf v0.0.0-20200109180630-ec00e32a8dfd/go.mod h1:DFci5gLYBciE7Vtevhsrf46CRTquxDuWsQurQQe4oz8=
diff --git a/go.work.sum b/go.work.sum
index af236d3b1..4e1cead39 100644
--- a/go.work.sum
+++ b/go.work.sum
@@ -535,7 +535,6 @@ github.com/klauspost/cpuid/v2 v2.2.5/go.mod h1:Lcz8mBdAVJIBVzewtcLocK12l3Y+JytZY
github.com/kr/fs v0.1.0/go.mod h1:FFnZGqtBN9Gxj7eW1uZ42v5BccTP0vu6NEaFoC2HwRg=
github.com/ledongthuc/pdf v0.0.0-20220302134840-0c2507a12d80/go.mod h1:imJHygn/1yfhB7XSJJKlFZKl/J+dCPAknuiaGOshXAs=
github.com/lyft/protoc-gen-star/v2 v2.0.3/go.mod h1:amey7yeodaJhXSbf/TlLvWiqQfLOSpEk//mLlc+axEk=
-github.com/mattn/go-isatty v0.0.19/go.mod h1:W+V8PltTTMOvKvAeJH7IuucS94S2C6jfK/D7dTCTo3Y=
github.com/matttproud/golang_protobuf_extensions/v2 v2.0.0/go.mod h1:QUyp042oQthUoa9bqDv0ER0wrtXnBruoNd7aNjkbP+k=
github.com/minio/asm2plan9s v0.0.0-20200509001527-cdd76441f9d8/go.mod h1:mC1jAcsrzbxHt8iiaC+zU4b1ylILSosueou12R++wfY=
github.com/minio/c2goasm v0.0.0-20190812172519-36a3d3bbc4f3/go.mod h1:RagcQ7I8IeTMnF8JTXieKnO4Z6JCsikNEzj0DwauVzE=
@@ -583,6 +582,7 @@ golang.org/x/crypto v0.13.0/go.mod h1:y6Z2r+Rw4iayiXXAIxJIDAJ1zMW4yaTpebo8fPOliY
golang.org/x/crypto v0.14.0/go.mod h1:MVFd36DqK4CsrnJYDkBA3VC4m2GkXAM0PvzMCn4JQf4=
golang.org/x/crypto v0.18.0/go.mod h1:R0j02AL6hcrfOiy9T4ZYp/rcWeMxM3L6QYxlOuEG1mg=
golang.org/x/crypto v0.19.0/go.mod h1:Iy9bg/ha4yyC70EfRS8jz+B6ybOBKMaSxLj6P6oBDfU=
+golang.org/x/crypto v0.21.0/go.mod h1:0BP7YvVV9gBbVKyeTG0Gyn+gZm94bibOW5BjDEYAOMs=
golang.org/x/lint v0.0.0-20201208152925-83fdc39ff7b5/go.mod h1:3xt1FjdF8hUf6vQPIChWIBhFzV8gjjsPE/fR3IyQdNY=
golang.org/x/mod v0.4.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
golang.org/x/mod v0.4.1/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
@@ -602,6 +602,7 @@ golang.org/x/net v0.16.0/go.mod h1:NxSsAGuq816PNPmqtQdLE42eU2Fs7NoRIZrHJAlaCOE=
golang.org/x/net v0.17.0/go.mod h1:NxSsAGuq816PNPmqtQdLE42eU2Fs7NoRIZrHJAlaCOE=
golang.org/x/net v0.18.0/go.mod h1:/czyP5RqHAH4odGYxBJ1qz0+CE5WZ+2j1YgoEo8F2jQ=
golang.org/x/net v0.20.0/go.mod h1:z8BVo6PvndSri0LbOE3hAn0apkU+1YvI6E70E9jsnvY=
+golang.org/x/net v0.21.0/go.mod h1:bIjVDfnllIU7BJ2DNgfnXvpSvtn8VRwhlsaeUTyUS44=
golang.org/x/oauth2 v0.0.0-20200902213428-5d25da1a8d43/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A=
golang.org/x/oauth2 v0.0.0-20201109201403-9fd604954f58/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A=
golang.org/x/oauth2 v0.0.0-20201208152858-08078c50e5b5/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A=
@@ -625,7 +626,6 @@ golang.org/x/sys v0.0.0-20210225134936-a50acf3fe073/go.mod h1:h1NjWce9XRLGQEsW7w
golang.org/x/sys v0.0.0-20210423185535-09eb48e85fd7/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20220310020820-b874c991c1a5/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.5.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.8.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.11.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.12.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
@@ -684,6 +684,7 @@ google.golang.org/genproto v0.0.0-20240123012728-ef4313101c80/go.mod h1:cc8bqMqt
google.golang.org/genproto v0.0.0-20240125205218-1f4bbc51befe/go.mod h1:cc8bqMqtv9gMOr0zHg2Vzff5ULhhL2IXP4sbcn32Dro=
google.golang.org/genproto v0.0.0-20240213162025-012b6fc9bca9 h1:9+tzLLstTlPTRyJTh+ah5wIMsBW5c4tQwGTN3thOW9Y=
google.golang.org/genproto v0.0.0-20240213162025-012b6fc9bca9/go.mod h1:mqHbVIp48Muh7Ywss/AD6I5kNVKZMmAa/QEW58Gxp2s=
+google.golang.org/genproto v0.0.0-20240227224415-6ceb2ff114de h1:F6qOa9AZTYJXOUEr4jDysRDLrm4PHePlge4v4TGAlxY=
google.golang.org/genproto/googleapis/api v0.0.0-20230530153820-e85fd2cbaebc/go.mod h1:vHYtlOoi6TsQ3Uk2yxR7NI5z8uoV+3pZtR4jmHIkRig=
google.golang.org/genproto/googleapis/api v0.0.0-20230822172742-b8732ec3820d/go.mod h1:KjSP20unUpOx5kyQUFa7k4OJg0qeJ7DEZflGDu2p6Bk=
google.golang.org/genproto/googleapis/api v0.0.0-20230920204549-e6e6cdab5c13/go.mod h1:RdyHbowztCGQySiCvQPgWQWgWhGnouTdCflKoDBt32U=
From 1f4ee0e235bfbc55d750b6a20cf4133381fa7dd7 Mon Sep 17 00:00:00 2001
From: Christian Groschupp
Date: Tue, 9 Apr 2024 12:25:22 +0200
Subject: [PATCH 034/283] feat: add annotation to allow to add custom response
headers (#9742)
* add custom headers
Signed-off-by: Christian Groschupp
* add tests
Signed-off-by: Christian Groschupp
* add docs
* update copyright
* change comments
* add e2e test customheaders
* add custom headers validation
* remove escapeLiteralDollar filter
* validate value in custom headers
* add regex for header value
* fix annotation test
* Revert "remove escapeLiteralDollar filter"
This reverts commit ab48392b60dee4ce146a4c17e046849f9633c7fb.
* add annotationConfig
* fix test
* fix golangci-lint findings
* fix: add missung exp module
---------
Signed-off-by: Christian Groschupp
---
.../nginx-configuration/annotations.md | 17 +++
.../nginx-configuration/configmap.md | 5 +
go.mod | 1 +
go.work.sum | 77 +++++++++++
internal/ingress/annotations/annotations.go | 3 +
.../ingress/annotations/annotations_test.go | 55 +++++++-
.../ingress/annotations/customheaders/main.go | 124 ++++++++++++++++++
.../annotations/customheaders/main_test.go | 113 ++++++++++++++++
internal/ingress/controller/config/config.go | 1 +
internal/ingress/controller/controller.go | 1 +
.../ingress/controller/template/configmap.go | 20 +++
internal/ingress/defaults/main.go | 3 +
pkg/apis/ingress/types.go | 4 +-
rootfs/etc/nginx/template/nginx.tmpl | 7 +
test/e2e/annotations/customheaders.go | 110 ++++++++++++++++
15 files changed, 537 insertions(+), 4 deletions(-)
create mode 100644 internal/ingress/annotations/customheaders/main.go
create mode 100644 internal/ingress/annotations/customheaders/main_test.go
create mode 100644 test/e2e/annotations/customheaders.go
diff --git a/docs/user-guide/nginx-configuration/annotations.md b/docs/user-guide/nginx-configuration/annotations.md
index 184c4993b..2230f80f7 100755
--- a/docs/user-guide/nginx-configuration/annotations.md
+++ b/docs/user-guide/nginx-configuration/annotations.md
@@ -50,6 +50,7 @@ You can add these Kubernetes annotations to specific Ingress objects to customiz
|[nginx.ingress.kubernetes.io/client-body-buffer-size](#client-body-buffer-size)|string|
|[nginx.ingress.kubernetes.io/configuration-snippet](#configuration-snippet)|string|
|[nginx.ingress.kubernetes.io/custom-http-errors](#custom-http-errors)|[]int|
+|[nginx.ingress.kubernetes.io/custom-headers](#custom-headers)|string|
|[nginx.ingress.kubernetes.io/default-backend](#default-backend)|string|
|[nginx.ingress.kubernetes.io/enable-cors](#enable-cors)|"true" or "false"|
|[nginx.ingress.kubernetes.io/cors-allow-origin](#enable-cors)|string|
@@ -338,6 +339,22 @@ Example usage:
nginx.ingress.kubernetes.io/custom-http-errors: "404,415"
```
+### Custom Headers
+This annotation is of the form `nginx.ingress.kubernetes.io/custom-headers: custom-headers-configmap` to specify a configmap name that contains custom headers. This annotation uses `more_set_headers` nginx directive.
+
+Example configmap:
+```yaml
+apiVersion: v1
+data:
+ Content-Type: application/json
+kind: ConfigMap
+metadata:
+ name: custom-headers-configmap
+```
+
+!!! attention
+ First define the allowed response headers in [global-allowed-response-headers](https://github.com/kubernetes/ingress-nginx/blob/main/docs/user-guide/nginx-configuration/configmap.md#global-allowed-response-headers).
+
### Default Backend
This annotation is of the form `nginx.ingress.kubernetes.io/default-backend: ` to specify a custom default backend. This `` is a reference to a service inside of the same namespace in which you are applying this annotation. This annotation overrides the global default backend. In case the service has [multiple ports](https://kubernetes.io/docs/concepts/services-networking/service/#multi-port-services), the first one is the one which will receive the backend traffic.
diff --git a/docs/user-guide/nginx-configuration/configmap.md b/docs/user-guide/nginx-configuration/configmap.md
index 89a35b07b..52c54c4fe 100644
--- a/docs/user-guide/nginx-configuration/configmap.md
+++ b/docs/user-guide/nginx-configuration/configmap.md
@@ -209,6 +209,7 @@ The following table shows a configuration option's name, type, and the default v
|[syslog-host](#syslog-host)| string | "" ||
|[syslog-port](#syslog-port)| int | 514 ||
|[no-tls-redirect-locations](#no-tls-redirect-locations)| string | "/.well-known/acme-challenge" ||
+|[global-allowed-response-headers](#global-allowed-response-headers)|string|""||
|[global-auth-url](#global-auth-url)| string | "" ||
|[global-auth-method](#global-auth-method)| string | "" ||
|[global-auth-signin](#global-auth-signin)| string | "" ||
@@ -1285,6 +1286,10 @@ Sets the port of syslog server. _**default:**_ 514
A comma-separated list of locations on which http requests will never get redirected to their https counterpart.
_**default:**_ "/.well-known/acme-challenge"
+## global-allowed-response-headers
+
+A comma-separated list of allowed response headers inside the [custom headers annotations](https://github.com/kubernetes/ingress-nginx/blob/main/docs/user-guide/nginx-configuration/annotations.md#custom-headers)
+
## global-auth-url
A url to an existing service that provides authentication for all the locations.
diff --git a/go.mod b/go.mod
index 780ce5959..228ac7511 100644
--- a/go.mod
+++ b/go.mod
@@ -26,6 +26,7 @@ require (
github.com/yudai/gojsondiff v1.0.0
github.com/zakjan/cert-chain-resolver v0.0.0-20221221105603-fcedb00c5b30
golang.org/x/crypto v0.22.0
+ golang.org/x/exp v0.0.0-20220722155223-a9213eeb770e
google.golang.org/grpc v1.63.2
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab
gopkg.in/go-playground/pool.v3 v3.1.1
diff --git a/go.work.sum b/go.work.sum
index 4e1cead39..4ce702139 100644
--- a/go.work.sum
+++ b/go.work.sum
@@ -379,6 +379,7 @@ cloud.google.com/go/spanner v1.49.0/go.mod h1:eGj9mQGK8+hkgSVbHNQ06pQ4oS+cyc4tXX
cloud.google.com/go/spanner v1.51.0/go.mod h1:c5KNo5LQ1X5tJwma9rSQZsXNBDNvj4/n8BVc3LNahq0=
cloud.google.com/go/spanner v1.55.0/go.mod h1:HXEznMUVhC+PC+HDyo9YFG2Ajj5BQDkcbqB9Z2Ffxi0=
cloud.google.com/go/spanner v1.56.0/go.mod h1:DndqtUKQAt3VLuV2Le+9Y3WTnq5cNKrnLb/Piqcj+h0=
+cloud.google.com/go/spanner v1.57.0/go.mod h1:aXQ5QDdhPRIqVhYmnkAdwPYvj/DRN0FguclhEWw+jOo=
cloud.google.com/go/speech v1.17.1/go.mod h1:8rVNzU43tQvxDaGvqOhpDqgkJTFowBpDvCJ14kGlJYo=
cloud.google.com/go/speech v1.19.0/go.mod h1:8rVNzU43tQvxDaGvqOhpDqgkJTFowBpDvCJ14kGlJYo=
cloud.google.com/go/speech v1.20.1/go.mod h1:wwolycgONvfz2EDU8rKuHRW3+wc9ILPsAWoikBEWavY=
@@ -442,14 +443,18 @@ github.com/NYTimes/gziphandler v1.1.1/go.mod h1:n/CVRwUEOgIxrgPvAQhUUr9oeUtvrhMo
github.com/alecthomas/kingpin/v2 v2.4.0/go.mod h1:0gyi0zQnjuFk8xrkNKamJoyUo382HRL7ATRpFZCw6tE=
github.com/alecthomas/units v0.0.0-20211218093645-b94a6e3cc137/go.mod h1:OMCwj8VM1Kc9e19TLln2VL61YJF0x1XFtfdL4JdbSyE=
github.com/andybalholm/brotli v1.0.4/go.mod h1:fO7iG3H7G2nSZ7m0zPUDn85XEX2GTukHGRSepvi9Eig=
+github.com/antlr/antlr4/runtime/Go/antlr/v4 v4.0.0-20230305170008-8188dc5388df/go.mod h1:pSwJ0fSY5KhvocuWSx4fz3BA8OrA1bQn+K1Eli3BRwM=
github.com/apache/thrift v0.16.0/go.mod h1:PHK3hniurgQaNMZYaCLEqXKsYK8upmhPbmdP2FXSqgU=
github.com/armon/go-socks5 v0.0.0-20160902184237-e75332964ef5/go.mod h1:wHh0iHkYZB8zMSxRWpUBQtwG5a7fFgvEO+odwuTv2gs=
github.com/asaskevich/govalidator v0.0.0-20190424111038-f61b66f89f4a/go.mod h1:lB+ZfQJz7igIIfQNfa7Ml4HSf2uFQQRzpGGRXenZAgY=
github.com/asaskevich/govalidator v0.0.0-20230301143203-a9d515a09cc2/go.mod h1:WaHUgvxTVq04UNunO+XhnAqY/wQc+bxr74GqbsZ/Jqw=
github.com/blang/semver v3.5.1+incompatible h1:cQNTCjp13qL8KC3Nbxr/y2Bqb63oX6wdnnjpJbkM4JQ=
+github.com/bytedance/sonic v1.9.1/go.mod h1:i736AoUSYt75HyZLoJW9ERYxcy6eaN6h4BZXU064P/U=
+github.com/cenkalti/backoff/v4 v4.2.1/go.mod h1:Y3VNntkOUPxTVeUxJ/G5vcM//AlwfmyYozVcomhLiZE=
github.com/census-instrumentation/opencensus-proto v0.4.1/go.mod h1:4T9NM4+4Vw91VeyqjLS6ao50K5bOcLKN6Q42XnYaRYw=
github.com/cespare/xxhash v1.1.0 h1:a6HrQnmkObjyL+Gs60czilIUGqrzKutQD6XZog3p+ko=
github.com/checkpoint-restore/go-criu/v5 v5.3.0/go.mod h1:E/eQpaFtUKGOOSEBZgmKAcn+zUUwWxqcaKZlF54wK8E=
+github.com/chenzhuoyu/base64x v0.0.0-20221115062448-fe3a3abad311/go.mod h1:b583jCggY9gE99b6G5LEC39OIiVsWj+R97kbl5odCEk=
github.com/chromedp/cdproto v0.0.0-20230802225258-3cf4e6d46a89/go.mod h1:GKljq0VrfU4D5yc+2qA6OVr8pmO/MBbPEWqWQ/oqGEs=
github.com/chromedp/chromedp v0.9.2/go.mod h1:LkSXJKONWTCHAfQasKFUZI+mxqS4tZqhmtGzzhLsnLs=
github.com/chromedp/sysutil v1.0.0/go.mod h1:kgWmDdq8fTzXYcKIBqIYvRRTnYb9aNS9moAV0xufSww=
@@ -468,6 +473,7 @@ github.com/cncf/xds/go v0.0.0-20231109132714-523115ebc101/go.mod h1:eXthEFrGJvWH
github.com/cncf/xds/go v0.0.0-20231128003011-0fa0005c9caa/go.mod h1:x/1Gn8zydmfq8dk6e9PdstVsDgu9RuyIIJqAaF//0IM=
github.com/containerd/console v1.0.3/go.mod h1:7LqA/THxQ86k76b8c/EMSiaJ3h1eZkMkXar0TQ1gf3U=
github.com/coreos/go-oidc v2.2.1+incompatible/go.mod h1:CgnwVTmzoESiwO9qyAFEMiHoZ1nMCKZlZ9V6mm3/LKc=
+github.com/coreos/go-semver v0.3.1/go.mod h1:irMmmIw/7yzSRPWryHsK7EYSg09caPQL03VsM8rvUec=
github.com/coreos/go-systemd v0.0.0-20190321100706-95778dfbb74e h1:Wf6HqHfScWJN9/ZjdUKyjop4mf3Qdd+1TvvltAvM3m8=
github.com/docker/go-units v0.4.0/go.mod h1:fgPhTUdO+D/Jk86RDLlptpiXQzgHJF7gydDDbaIK4Dk=
github.com/dustin/go-humanize v1.0.1/go.mod h1:Mu1zIs6XwVuF/gI1OepvI0qD18qycQx+mFykh5fBlto=
@@ -480,7 +486,12 @@ github.com/envoyproxy/go-control-plane v0.11.1/go.mod h1:uhMcXKCQMEJHiAb0w+YGefQ
github.com/envoyproxy/go-control-plane v0.12.0/go.mod h1:ZBTaoJ23lqITozF0M6G4/IragXCQKCnYbmlmtHvwRG0=
github.com/envoyproxy/protoc-gen-validate v1.0.2/go.mod h1:GpiZQP3dDbg4JouG/NNS7QWXpgx6x8QiMKdmN72jogE=
github.com/envoyproxy/protoc-gen-validate v1.0.4/go.mod h1:qys6tmnRsYrQqIhm2bvKZH4Blx/1gTIZ2UKVY1M+Yew=
+github.com/felixge/httpsnoop v1.0.3/go.mod h1:m8KPJKqk1gH5J9DgRY2ASl2lWCfGKXixSwevea8zH2U=
github.com/felixge/httpsnoop v1.0.4/go.mod h1:m8KPJKqk1gH5J9DgRY2ASl2lWCfGKXixSwevea8zH2U=
+github.com/gabriel-vasile/mimetype v1.4.2/go.mod h1:zApsH/mKG4w07erKIaJPFiX0Tsq9BFQgN3qGY5GnNgA=
+github.com/getsentry/sentry-go v0.21.0/go.mod h1:lc76E2QywIyW8WuBnwl8Lc4bkmQH4+w1gwTf25trprY=
+github.com/gin-contrib/sse v0.1.0/go.mod h1:RHrZQHXnP2xjPF+u1gW/2HnVO7nvIa9PG3Gm+fLHvGI=
+github.com/gin-gonic/gin v1.9.1/go.mod h1:hPrL7YrpYKXt5YId3A/Tnip5kqbEAP+KLuI3SUcPTeU=
github.com/go-kit/log v0.2.1/go.mod h1:NwTd00d/i8cPZ3xOwwiv2PO5MOcx78fFErGNcVmBjv0=
github.com/go-logfmt/logfmt v0.5.1/go.mod h1:WYhtIu8zTZfxdn5+rREduYbwxfcBr/Vr6KEVveWlfTs=
github.com/go-logr/logr v1.2.0/go.mod h1:jdQByPbusPIv2/zmleS9BjJVeZ6kBagPoEUsqbVz/1A=
@@ -491,6 +502,9 @@ github.com/go-logr/stdr v1.2.2/go.mod h1:mMo/vtBO5dYbehREoey6XUKy/eSumjCCveDpRre
github.com/go-openapi/jsonreference v0.20.1/go.mod h1:Bl1zwGIM8/wsvqjsOQLJ/SH+En5Ap4rVB5KVcIDZG2k=
github.com/go-openapi/swag v0.22.5/go.mod h1:Gl91UqO+btAM0plGGxHqJcQZ1ZTy6jbmridBTsDy8A0=
github.com/go-openapi/swag v0.22.6/go.mod h1:Gl91UqO+btAM0plGGxHqJcQZ1ZTy6jbmridBTsDy8A0=
+github.com/go-playground/locales v0.14.1/go.mod h1:hxrqLVvrK65+Rwrd5Fc6F2O76J/NuW9t0sjnWqG1slY=
+github.com/go-playground/universal-translator v0.18.1/go.mod h1:xekY+UJKNuX9WP91TpwSH2VMlDf28Uj24BCp08ZFTUY=
+github.com/go-playground/validator/v10 v10.14.0/go.mod h1:9iXMNT7sEkjXb0I+enO7QXmzG6QCsPWY4zveKFVRSyU=
github.com/gobwas/httphead v0.1.0/go.mod h1:O/RXo79gxV8G+RqlR/otEwx4Q36zl9rqC5u12GKvMCM=
github.com/gobwas/pool v0.2.1/go.mod h1:q8bcK0KcYlCgd9e7WYLm9LpyS+YeLd8JVDW6WezmKEw=
github.com/gobwas/ws v1.2.1/go.mod h1:hRKAFb8wOxFROYNsT1bqfWnhX+b5MFeJM9r2ZSwg/KY=
@@ -500,8 +514,10 @@ github.com/golang-jwt/jwt/v4 v4.5.0/go.mod h1:m21LjoU+eqJr34lmDMbreY2eSTRJ1cv77w
github.com/golang/glog v1.1.0/go.mod h1:pfYeQZ3JWZoXTV5sFc986z3HTpwQs9At6P4ImfuP3NQ=
github.com/golang/glog v1.1.2/go.mod h1:zR+okUeTbrL6EL3xHUDxZuEtGv04p5shwip1+mL/rLQ=
github.com/golang/glog v1.2.0/go.mod h1:6AhwSGph0fcJtXVM/PEHPqZlFeoLxhs7/t5UDAwmO+w=
+github.com/golang/protobuf v1.5.3/go.mod h1:XVQd3VNwM+JqD3oG2Ue2ip4fOMUkwXdXDdiuN0vRsmY=
github.com/golang/snappy v0.0.3/go.mod h1:/XxbfmMg8lxefKM7IXC3fBNl/7bRcc72aCRzEWrmP2Q=
github.com/golang/snappy v0.0.4/go.mod h1:/XxbfmMg8lxefKM7IXC3fBNl/7bRcc72aCRzEWrmP2Q=
+github.com/google/cel-go v0.17.7/go.mod h1:HXZKzB0LXqer5lHHgfWAnlYwJaQBDKMjxjulNQzhwhY=
github.com/google/flatbuffers v2.0.8+incompatible/go.mod h1:1AeVuKshWv4vARoZatz6mlQ0JxURH0Kv5+zNeJKJCa8=
github.com/google/go-cmp v0.5.3/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
github.com/google/go-pkcs11 v0.2.1-0.20230907215043-c6f79328ddf9/go.mod h1:6eQoGcuNJpa7jnd5pMGdkSaQpNDYvPlXWMcjXXThLlY=
@@ -522,27 +538,42 @@ github.com/googleapis/gax-go/v2 v2.10.0/go.mod h1:4UOEnMCrxsSqQ940WnTiD6qJ63le2e
github.com/googleapis/gax-go/v2 v2.11.0/go.mod h1:DxmR61SGKkGLa2xigwuZIQpkCI2S5iydzRfb3peWZJI=
github.com/googleapis/gax-go/v2 v2.12.0/go.mod h1:y+aIqrI5eb1YGMVJfuV3185Ts/D7qKpsEkdD5+I6QGU=
github.com/googleapis/google-cloud-go-testing v0.0.0-20200911160855-bcd43fbb19e8/go.mod h1:dvDLG8qkwmyD9a/MJJN3XJcT3xFxOKAvTZGvuZmac9g=
+github.com/gorilla/websocket v1.5.0/go.mod h1:YR8l580nyteQvAITg2hZ9XVh4b55+EU/adAjf1fMHhE=
+github.com/grpc-ecosystem/go-grpc-middleware v1.3.0/go.mod h1:z0ButlSOZa5vEBq9m2m2hlwIgKw+rp3sdCBRoJY+30Y=
+github.com/grpc-ecosystem/go-grpc-prometheus v1.2.0/go.mod h1:8NvIoxWQoOIhqOTXgfV/d3M/q6VIi02HzZEHgUlZvzk=
+github.com/grpc-ecosystem/grpc-gateway v1.16.0/go.mod h1:BDjrQk3hbvj6Nolgz8mAMFbcEtjT1g+wF4CSlocrBnw=
+github.com/grpc-ecosystem/grpc-gateway/v2 v2.16.0/go.mod h1:YN5jB8ie0yfIUg6VvR9Kz84aCaG7AsGZnLjhHbUqwPg=
github.com/iancoleman/strcase v0.3.0/go.mod h1:iwCmte+B7n89clKwxIoIXy/HfoL7AsD47ZCWhYzw7ho=
github.com/ianlancetaylor/demangle v0.0.0-20200824232613-28f6c0f3b639/go.mod h1:aSSvb/t6k1mPoxDqO4vJh6VOCGPwU4O0C2/Eqndh1Sc=
github.com/ianlancetaylor/demangle v0.0.0-20230524184225-eabc099b10ab/go.mod h1:gx7rwoVhcfuVKG5uya9Hs3Sxj7EIvldVofAWIUtGouw=
github.com/imdario/mergo v0.3.13 h1:lFzP57bqS/wsqKssCGmtLAb8A0wKjLGrve2q3PPVcBk=
github.com/jessevdk/go-flags v1.4.0/go.mod h1:4FA24M0QyGHXBuZZK/XkWh8h0e1EYbRYJSGM75WSRxI=
+github.com/jonboulle/clockwork v0.2.2/go.mod h1:Pkfl5aHPm1nk2H9h0bjmnJD/BcgbGXUBGnn1kMkgxc8=
github.com/klauspost/asmfmt v1.3.2/go.mod h1:AG8TuvYojzulgDAMCnYn50l/5QV3Bs/tp6j0HLHbNSE=
github.com/klauspost/compress v1.15.9/go.mod h1:PhcZ0MbTNciWF3rruxRgKxI5NkcHHrHUDtV4Yw2GlzU=
github.com/klauspost/compress v1.16.7/go.mod h1:ntbaceVETuRiXiv4DpjP66DpAtAGkEQskQzEyD//IeE=
github.com/klauspost/cpuid/v2 v2.0.9/go.mod h1:FInQzS24/EEf25PyTYn52gqo7WaD8xa0213Md/qVLRg=
+github.com/klauspost/cpuid/v2 v2.2.4/go.mod h1:RVVoqg1df56z8g3pUjL/3lE5UfnlrJX8tyFgg4nqhuY=
github.com/klauspost/cpuid/v2 v2.2.5/go.mod h1:Lcz8mBdAVJIBVzewtcLocK12l3Y+JytZYpaMropDUws=
github.com/kr/fs v0.1.0/go.mod h1:FFnZGqtBN9Gxj7eW1uZ42v5BccTP0vu6NEaFoC2HwRg=
+github.com/labstack/echo/v4 v4.10.2/go.mod h1:OEyqf2//K1DFdE57vw2DRgWY0M7s65IVQO2FzvI4J5k=
+github.com/labstack/gommon v0.4.0/go.mod h1:uW6kP17uPlLJsD3ijUYn3/M5bAxtlZhMI6m3MFxTMTM=
github.com/ledongthuc/pdf v0.0.0-20220302134840-0c2507a12d80/go.mod h1:imJHygn/1yfhB7XSJJKlFZKl/J+dCPAknuiaGOshXAs=
+github.com/leodido/go-urn v1.2.4/go.mod h1:7ZrI8mTSeBSHl/UaRyKQW1qZeMgak41ANeCNaVckg+4=
github.com/lyft/protoc-gen-star/v2 v2.0.3/go.mod h1:amey7yeodaJhXSbf/TlLvWiqQfLOSpEk//mLlc+axEk=
+github.com/matttproud/golang_protobuf_extensions v1.0.4/go.mod h1:BSXmuO+STAnVfrANrmjBb36TMTDstsz7MSK+HVaYKv4=
github.com/matttproud/golang_protobuf_extensions/v2 v2.0.0/go.mod h1:QUyp042oQthUoa9bqDv0ER0wrtXnBruoNd7aNjkbP+k=
github.com/minio/asm2plan9s v0.0.0-20200509001527-cdd76441f9d8/go.mod h1:mC1jAcsrzbxHt8iiaC+zU4b1ylILSosueou12R++wfY=
github.com/minio/c2goasm v0.0.0-20190812172519-36a3d3bbc4f3/go.mod h1:RagcQ7I8IeTMnF8JTXieKnO4Z6JCsikNEzj0DwauVzE=
+github.com/moby/spdystream v0.2.0/go.mod h1:f7i0iNDQJ059oMTcWxx8MA/zKFIuD/lY+0GqbN2Wy8c=
+github.com/mrunalp/fileutils v0.5.1/go.mod h1:M1WthSahJixYnrXQl/DFQuteStB1weuxD2QJNHXfbSQ=
github.com/munnerz/goautoneg v0.0.0-20120707110453-a547fc61f48d/go.mod h1:+n7T8mK8HuQTcFwEeznm/DIxMOiR9yIdICNftLE1DvQ=
+github.com/mxk/go-flowrate v0.0.0-20140419014527-cca7078d478f/go.mod h1:ZdcZmHo+o7JKHSa8/e818NopupXU1YMK5fe1lsApnBw=
github.com/onsi/ginkgo/v2 v2.1.4/go.mod h1:um6tUpWM/cxCK3/FK8BXqEiUMUwRgSM4JXG47RKZmLU=
github.com/onsi/gomega v1.19.0/go.mod h1:LY+I3pBVzYsTBU1AnDwOSxaYi9WoWiqgwooUqq9yPro=
github.com/opencontainers/selinux v1.10.0/go.mod h1:2i0OySw99QjzBBQByd1Gr9gSjvuho1lHsJxIJ3gGbJI=
github.com/orisano/pixelmatch v0.0.0-20220722002657-fb0b55479cde/go.mod h1:nZgzbfBr3hhjoZnS66nKrHmduYNpc34ny7RK4z5/HM0=
+github.com/pelletier/go-toml/v2 v2.0.8/go.mod h1:vuYfssBdrU2XDZ9bYydBu6t+6a6PYNcZljzZR9VXg+4=
github.com/pierrec/lz4/v4 v4.1.15/go.mod h1:gZWDp/Ze/IJXGXf23ltt2EXimqmTUXEy0GFuRQyBid4=
github.com/pkg/sftp v1.13.1/go.mod h1:3HaPG6Dq1ILlpPZRO0HVMrsydcdLt6HRDccSgb87qRg=
github.com/pquerna/cachecontrol v0.1.0/go.mod h1:NrUG3Z7Rdu85UNR3vm7SOsl1nFIeSiQnrHV5K9mBcUI=
@@ -550,29 +581,61 @@ github.com/prometheus/client_model v0.5.0/go.mod h1:dTiFglRmd66nLR9Pv9f0mZi7B7fk
github.com/prometheus/common v0.45.0/go.mod h1:YJmSTw9BoKxJplESWWxlbyttQR4uaEcGyv9MZjVOJsY=
github.com/rogpeppe/go-internal v1.9.0/go.mod h1:WtVeX8xhTBvf0smdhujwtBcq4Qrzq/fJaraNFVN+nFs=
github.com/seccomp/libseccomp-golang v0.9.2-0.20220502022130-f33da4d89646/go.mod h1:JA8cRccbGaA1s33RQf7Y1+q9gHmZX1yB/z9WDN1C6fg=
+github.com/shurcooL/sanitized_anchor_name v1.0.0/go.mod h1:1NzhyTcUVG4SuEtjjoZeVRXNmyL/1OwPU0+IJeTBvfc=
+github.com/soheilhy/cmux v0.1.5/go.mod h1:T7TcVDs9LWfQgPlPsdngu6I6QIoyIFZDDC6sNE1GqG0=
github.com/spf13/afero v1.10.0/go.mod h1:UBogFpq8E9Hx+xc5CNTTEpTnuHVmXDwZcZcE1eb/UhQ=
+github.com/stoewer/go-strcase v1.2.0/go.mod h1:IBiWB2sKIp3wVVQ3Y035++gc+knqhUQag1KpM8ahLw8=
+github.com/stretchr/objx v0.4.0/go.mod h1:YvHI0jy2hoMjB+UWwv71VJQ9isScKT/TqJzVSSt89Yw=
+github.com/stretchr/objx v0.5.0/go.mod h1:Yh+to48EsGEfYuaHDzXPcE3xhTkx73EhmCGUpEOglKo=
+github.com/stretchr/testify v1.7.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
+github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO+kdMU+MU=
+github.com/stretchr/testify v1.8.1/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=
github.com/syndtr/gocapability v0.0.0-20200815063812-42c35b437635/go.mod h1:hkRG7XYTFWNJGYcbNJQlaLq0fg1yr4J4t/NcTQtrfww=
github.com/tmc/grpc-websocket-proxy v0.0.0-20220101234140-673ab2c3ae75/go.mod h1:KO6IkyS8Y3j8OdNO85qEYBsRPuteD+YciPomcXdrMnk=
+github.com/twitchyliquid64/golang-asm v0.15.1/go.mod h1:a1lVb/DtPvCB8fslRZhAngC2+aY1QWCk3Cedj/Gdt08=
+github.com/ugorji/go/codec v1.2.11/go.mod h1:UNopzCgEMSXjBc6AOMqYvWC1ktqTAfzJZUZgYf6w6lg=
github.com/urfave/cli v1.22.1/go.mod h1:Gos4lmkARVdJ6EkW0WaNv/tZAAMe9V7XWyB60NtXRu0=
+github.com/valyala/bytebufferpool v1.0.0/go.mod h1:6bBcMArwyJ5K/AmCkWv1jt77kVWyCJ6HpOuEn7z0Csc=
+github.com/valyala/fasttemplate v1.2.2/go.mod h1:KHLXt3tVN2HBp8eijSv/kGJopbvo7S+qRAEEKiv+SiQ=
github.com/vishvananda/netlink v1.1.0/go.mod h1:cTgwzPIzzgDAYoQrMm0EdrjRUBkTqKYppBueQtXaqoE=
github.com/vishvananda/netns v0.0.0-20191106174202-0a2b9b5464df/go.mod h1:JP3t17pCcGlemwknint6hfoeCVQrEMVwxRLRjXpq+BU=
github.com/xhit/go-str2duration/v2 v2.1.0/go.mod h1:ohY8p+0f07DiV6Em5LKB0s2YpLtXVyJfNt1+BlmyAsU=
+github.com/xiang90/probing v0.0.0-20190116061207-43a291ad63a2/go.mod h1:UETIi67q53MR2AWcXfiuqkDkRtnGDLqkBTpCHuJHxtU=
github.com/zeebo/xxh3 v1.0.2/go.mod h1:5NWz9Sef7zIDm2JHfFlcQvNekmcEl9ekUZQQKCYaDcA=
+go.etcd.io/bbolt v1.3.8/go.mod h1:N9Mkw9X8x5fupy0IKsmuqVtoGDyxsaDlbk4Rd05IAQw=
+go.etcd.io/etcd/api/v3 v3.5.10/go.mod h1:TidfmT4Uycad3NM/o25fG3J07odo4GBB9hoxaodFCtI=
+go.etcd.io/etcd/client/pkg/v3 v3.5.10/go.mod h1:DYivfIviIuQ8+/lCq4vcxuseg2P2XbHygkKwFo9fc8U=
+go.etcd.io/etcd/client/v2 v2.305.10/go.mod h1:m3CKZi69HzilhVqtPDcjhSGp+kA1OmbNn0qamH80xjA=
+go.etcd.io/etcd/client/v3 v3.5.10/go.mod h1:RVeBnDz2PUEZqTpgqwAtUd8nAPf5kjyFyND7P1VkOKc=
+go.etcd.io/etcd/pkg/v3 v3.5.10/go.mod h1:TKTuCKKcF1zxmfKWDkfz5qqYaE3JncKKZPFf8c1nFUs=
+go.etcd.io/etcd/raft/v3 v3.5.10/go.mod h1:odD6kr8XQXTy9oQnyMPBOr0TVe+gT0neQhElQ6jbGRc=
+go.etcd.io/etcd/server/v3 v3.5.10/go.mod h1:gBplPHfs6YI0L+RpGkTQO7buDbHv5HJGG/Bst0/zIPo=
go.opencensus.io v0.22.5/go.mod h1:5pWMHQbX5EPX2/62yrJeAkowc+lfs/XD7Uxpq3pI6kk=
go.opencensus.io v0.24.0/go.mod h1:vNK8G9p7aAivkbmorf4v+7Hgx+Zs0yY+0fOtgBfjQKo=
+go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.42.0/go.mod h1:5z+/ZWJQKXa9YT34fQNx5K8Hd1EoIhvtUygUQPqEOgQ=
go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.46.1/go.mod h1:4UoMYEZOC0yN/sPGH76KPkkU7zgiEWYWL9vwmbnTJPE=
go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.47.0/go.mod h1:r9vWsPS/3AQItv3OSlEJ/E4mbrhUbbw18meOjArPtKQ=
+go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.44.0/go.mod h1:SeQhzAEccGVZVEy7aH87Nh0km+utSpo1pTv6eMMop48=
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.46.1/go.mod h1:sEGXWArGqc3tVa+ekntsN65DmVbVeW+7lTKTjZF3/Fo=
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.47.0/go.mod h1:SK2UL73Zy1quvRPonmOmRDiWk1KBV3LyIeeIxcEApWw=
+go.opentelemetry.io/otel v1.19.0/go.mod h1:i0QyjOq3UPoTzff0PJB2N66fb4S0+rSbSB15/oyH9fY=
go.opentelemetry.io/otel v1.21.0/go.mod h1:QZzNPQPm1zLX4gZK4cMi+71eaorMSGT3A4znnUvNNEo=
go.opentelemetry.io/otel v1.22.0/go.mod h1:eoV4iAi3Ea8LkAEI9+GFT44O6T/D0GWAVFyZVCC6pMI=
+go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.19.0/go.mod h1:IPtUMKL4O3tH5y+iXVyAXqpAwMuzC1IrxVS81rummfE=
+go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.19.0/go.mod h1:0+KuTDyKL4gjKCF75pHOX4wuzYDUZYfAQdSu43o+Z2I=
+go.opentelemetry.io/otel/metric v1.19.0/go.mod h1:L5rUsV9kM1IxCj1MmSdS+JQAcVm319EUrDVLrt7jqt8=
go.opentelemetry.io/otel/metric v1.21.0/go.mod h1:o1p3CA8nNHW8j5yuQLdc1eeqEaPfzug24uvsyIEJRWM=
go.opentelemetry.io/otel/metric v1.22.0/go.mod h1:evJGjVpZv0mQ5QBRJoBF64yMuOf4xCWdXjK8pzFvliY=
+go.opentelemetry.io/otel/sdk v1.19.0/go.mod h1:NedEbbS4w3C6zElbLdPJKOpJQOrGUJ+GfzpjUvI0v1A=
go.opentelemetry.io/otel/sdk v1.21.0/go.mod h1:Nna6Yv7PWTdgJHVRD9hIYywQBRx7pbox6nwBnZIxl/E=
+go.opentelemetry.io/otel/trace v1.19.0/go.mod h1:mfaSyvGyEJEI0nyV2I4qhNQnbBOUUmYZpYojqMnX2vo=
go.opentelemetry.io/otel/trace v1.21.0/go.mod h1:LGbsEB0f9LGjN+OZaQQ26sohbOmiMR+BaslueVtS/qQ=
go.opentelemetry.io/otel/trace v1.22.0/go.mod h1:RbbHXVqKES9QhzZq/fE5UnOSILqRt40a21sPw2He1xo=
+go.opentelemetry.io/proto/otlp v1.0.0/go.mod h1:Sy6pihPLfYHkr3NkUbEhGHFhINUSI/v80hjKIs5JXpM=
+go.uber.org/atomic v1.10.0/go.mod h1:LUxbIzbOniOlMKjJjyPfpl4v+PKK2cNJn91OQbhoJI0=
go.uber.org/goleak v1.2.0/go.mod h1:XJYK+MuIchqpmGmUSAzotztawfKvYLUIgg7guXrwVUo=
go.uber.org/multierr v1.10.0/go.mod h1:20+QtiLqy0Nd6FdQB9TLXag12DsQkrbs3htMFfDN80Y=
+golang.org/x/arch v0.3.0/go.mod h1:5om86z9Hs0C8fWVUuoMHwpExlXzs5Tkyp9hOrfG7pp8=
golang.org/x/crypto v0.0.0-20210421170649-83a5a9bb288b/go.mod h1:T9bdIzuCu7OtxOm1hfPfRQxPLYneinmdGuTeoZ9dtd4=
golang.org/x/crypto v0.0.0-20220314234659-1baeb1ce4c0b/go.mod h1:IxCIyHEi3zRg3s0A5j5BB6A9Jmi73HwBIUl50j+osU4=
golang.org/x/crypto v0.0.0-20220722155217-630584e8d5aa/go.mod h1:IxCIyHEi3zRg3s0A5j5BB6A9Jmi73HwBIUl50j+osU4=
@@ -614,6 +677,7 @@ golang.org/x/oauth2 v0.13.0/go.mod h1:/JMhi4ZRXAf4HG9LiNmxvk+45+96RUlVThiH8FzNBn
golang.org/x/oauth2 v0.14.0/go.mod h1:lAtNWgaWfL4cm7j2OV8TxGi9Qb7ECORx8DktCY74OwM=
golang.org/x/oauth2 v0.15.0/go.mod h1:q48ptWNTY5XWf+JNten23lcvHpLJ0ZSxF5ttTHKVCAM=
golang.org/x/oauth2 v0.16.0/go.mod h1:hqZ+0LWXsiVoZpeld6jVt06P3adbS2Uu911W1SsJv2o=
+golang.org/x/oauth2 v0.17.0/go.mod h1:OzPDGQiuQMguemayvdylqddI7qcD9lnSDb+1FiwQ5HA=
golang.org/x/sync v0.2.0/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sync v0.3.0/go.mod h1:FU7BRWz2tNW+3quACPkgCx/L+uEAv1htQ0V83Z9Rj+Y=
golang.org/x/sync v0.4.0/go.mod h1:FU7BRWz2tNW+3quACPkgCx/L+uEAv1htQ0V83Z9Rj+Y=
@@ -632,6 +696,7 @@ golang.org/x/sys v0.12.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.13.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.14.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
golang.org/x/sys v0.16.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
+golang.org/x/sys v0.17.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
golang.org/x/telemetry v0.0.0-20240208230135-b75ee8823808/go.mod h1:KG1lNk5ZFNssSZLrpVb4sMXKMpGwGXOxSG3rnu2gZQQ=
golang.org/x/term v0.16.0/go.mod h1:yn7UURbUtPyrVJPGPq404EukNFxcm/foM+bV/bfcDsY=
golang.org/x/text v0.3.4/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
@@ -660,6 +725,7 @@ google.golang.org/api v0.128.0/go.mod h1:Y611qgqaE92On/7g65MQgxYul3c0rEB894kniWL
google.golang.org/api v0.149.0/go.mod h1:Mwn1B7JTXrzXtnvmzQE2BD6bYZQ8DShKZDZbeN9I7qI=
google.golang.org/api v0.155.0/go.mod h1:GI5qK5f40kCpHfPn6+YzGAByIKWv8ujFnmoWm7Igduk=
google.golang.org/api v0.162.0/go.mod h1:6SulDkfoBIg4NFmCuZ39XeeAgSHCPecfSUuDyYlAHs0=
+google.golang.org/appengine v1.6.7/go.mod h1:8WjMMxjGQR8xUklV/ARdw2HLXBOI7O7uCIDZVag1xfc=
google.golang.org/genproto v0.0.0-20200904004341-0bd0a958aa1d/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
google.golang.org/genproto v0.0.0-20201109203340-2640f1f9cdfb/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
google.golang.org/genproto v0.0.0-20201201144952-b05cb90ed32e/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
@@ -685,6 +751,7 @@ google.golang.org/genproto v0.0.0-20240125205218-1f4bbc51befe/go.mod h1:cc8bqMqt
google.golang.org/genproto v0.0.0-20240213162025-012b6fc9bca9 h1:9+tzLLstTlPTRyJTh+ah5wIMsBW5c4tQwGTN3thOW9Y=
google.golang.org/genproto v0.0.0-20240213162025-012b6fc9bca9/go.mod h1:mqHbVIp48Muh7Ywss/AD6I5kNVKZMmAa/QEW58Gxp2s=
google.golang.org/genproto v0.0.0-20240227224415-6ceb2ff114de h1:F6qOa9AZTYJXOUEr4jDysRDLrm4PHePlge4v4TGAlxY=
+google.golang.org/genproto v0.0.0-20240227224415-6ceb2ff114de/go.mod h1:VUhTRKeHn9wwcdrk73nvdC9gF178Tzhmt/qyaFcPLSo=
google.golang.org/genproto/googleapis/api v0.0.0-20230530153820-e85fd2cbaebc/go.mod h1:vHYtlOoi6TsQ3Uk2yxR7NI5z8uoV+3pZtR4jmHIkRig=
google.golang.org/genproto/googleapis/api v0.0.0-20230822172742-b8732ec3820d/go.mod h1:KjSP20unUpOx5kyQUFa7k4OJg0qeJ7DEZflGDu2p6Bk=
google.golang.org/genproto/googleapis/api v0.0.0-20230920204549-e6e6cdab5c13/go.mod h1:RdyHbowztCGQySiCvQPgWQWgWhGnouTdCflKoDBt32U=
@@ -697,6 +764,8 @@ google.golang.org/genproto/googleapis/api v0.0.0-20240102182953-50ed04b92917/go.
google.golang.org/genproto/googleapis/api v0.0.0-20240116215550-a9fa1716bcac/go.mod h1:B5xPO//w8qmBDjGReYLpR6UJPnkldGkCSMoH/2vxJeg=
google.golang.org/genproto/googleapis/api v0.0.0-20240123012728-ef4313101c80/go.mod h1:4jWUdICTdgc3Ibxmr8nAJiiLHwQBY0UI0XZcEMaFKaA=
google.golang.org/genproto/googleapis/api v0.0.0-20240205150955-31a09d347014/go.mod h1:rbHMSEDyoYX62nRVLOCc4Qt1HbsdytAYoVwgjiOhF3I=
+google.golang.org/genproto/googleapis/api v0.0.0-20240213162025-012b6fc9bca9/go.mod h1:PVreiBMirk8ypES6aw9d4p6iiBNSIfZEBqr3UGoAi2E=
+google.golang.org/genproto/googleapis/api v0.0.0-20240227224415-6ceb2ff114de/go.mod h1:5iCWqnniDlqZHrd3neWVTOwvh/v6s3232omMecelax8=
google.golang.org/genproto/googleapis/bytestream v0.0.0-20230530153820-e85fd2cbaebc/go.mod h1:ylj+BE99M198VPbBh6A8d9n3w8fChvyLK3wwBOjXBFA=
google.golang.org/genproto/googleapis/bytestream v0.0.0-20231030173426-d783a09b4405/go.mod h1:GRUCuLdzVqZte8+Dl/D4N25yLzcGqqWaYkeVOwulFqw=
google.golang.org/genproto/googleapis/bytestream v0.0.0-20231212172506-995d672761c0/go.mod h1:guYXGPwC6jwxgWKW5Y405fKWOFNwlvUlUnzyp9i0uqo=
@@ -711,6 +780,7 @@ google.golang.org/genproto/googleapis/rpc v0.0.0-20240116215550-a9fa1716bcac/go.
google.golang.org/genproto/googleapis/rpc v0.0.0-20240123012728-ef4313101c80/go.mod h1:PAREbraiVEVGVdTZsVWjSbbTtSyGbAgIIvni8a8CD5s=
google.golang.org/genproto/googleapis/rpc v0.0.0-20240125205218-1f4bbc51befe/go.mod h1:PAREbraiVEVGVdTZsVWjSbbTtSyGbAgIIvni8a8CD5s=
google.golang.org/genproto/googleapis/rpc v0.0.0-20240205150955-31a09d347014/go.mod h1:SaPjaZGWb0lPqs6Ittu0spdfrOArqji4ZdeP5IC/9N4=
+google.golang.org/genproto/googleapis/rpc v0.0.0-20240213162025-012b6fc9bca9/go.mod h1:YUWgXUFRPfoYK1IHMuxH5K6nPEXSCzIMljnQ59lLRCk=
google.golang.org/grpc v1.31.1/go.mod h1:N36X2cJ7JwdamYAgDz+s+rVMFjt3numwzf/HckM8pak=
google.golang.org/grpc v1.33.2/go.mod h1:JMHMWHQWaTccqQQlmk3MJZS+GWXOdAesneDmEnv2fbc=
google.golang.org/grpc v1.34.0/go.mod h1:WotjhfgOW/POjDeRt8vscBtXq+2VjORFy659qA51WJ8=
@@ -722,14 +792,21 @@ google.golang.org/grpc v1.57.0/go.mod h1:Sd+9RMTACXwmub0zcNY2c4arhtrbBYD1AUHI/dt
google.golang.org/grpc v1.59.0/go.mod h1:aUPDwccQo6OTjy7Hct4AfBPD1GptF4fyUjIkQ9YtF98=
google.golang.org/grpc v1.60.1/go.mod h1:OlCHIeLYqSSsLi6i49B5QGdzaMZK9+M7LXN2FKz4eGM=
google.golang.org/grpc v1.61.0/go.mod h1:VUbo7IFqmF1QtCAstipjG0GIoq49KvMe9+h1jFLBNJs=
+google.golang.org/grpc v1.61.1/go.mod h1:VUbo7IFqmF1QtCAstipjG0GIoq49KvMe9+h1jFLBNJs=
+google.golang.org/grpc v1.62.1/go.mod h1:IWTG0VlJLCh1SkC58F7np9ka9mx/WNkjl4PGJaiq+QE=
google.golang.org/grpc/cmd/protoc-gen-go-grpc v1.1.0/go.mod h1:6Kw0yEErY5E/yWrBtf03jp27GLLJujG4z/JK95pnjjw=
google.golang.org/protobuf v1.27.1/go.mod h1:9q0QmTI4eRPtz6boOQmLYwt+qCgq0jsYwAQnmE0givc=
google.golang.org/protobuf v1.28.0/go.mod h1:HV8QOd/L58Z+nl8r43ehVNZIU/HEI6OcFqwMG9pJV4I=
google.golang.org/protobuf v1.30.0/go.mod h1:HV8QOd/L58Z+nl8r43ehVNZIU/HEI6OcFqwMG9pJV4I=
+google.golang.org/protobuf v1.31.0/go.mod h1:HV8QOd/L58Z+nl8r43ehVNZIU/HEI6OcFqwMG9pJV4I=
+google.golang.org/protobuf v1.32.0/go.mod h1:c6P6GXX6sHbq/GpV6MGZEdwhWPcYBgnhAHhKbcUYpos=
gopkg.in/evanphx/json-patch.v5 v5.6.0 h1:BMT6KIwBD9CaU91PJCZIe46bDmBWa9ynTQgJIOpfQBk=
gopkg.in/evanphx/json-patch.v5 v5.6.0/go.mod h1:/kvTRh1TVm5wuM6OkHxqXtE/1nUZZpihg29RtuIyfvk=
+gopkg.in/natefinch/lumberjack.v2 v2.2.1/go.mod h1:YD8tP3GAjkrDg1eZH7EGmyESg/lsYskCTPBJVb9jqSc=
gopkg.in/square/go-jose.v2 v2.6.0/go.mod h1:M9dMgbHiYLoDGQrXy7OpJDJWiKiU//h+vD76mk0e1AI=
k8s.io/gengo v0.0.0-20230829151522-9cce18d56c01/go.mod h1:FiNAH4ZV3gBg2Kwh89tzAEV2be7d5xI0vBa/VySYy3E=
k8s.io/klog/v2 v2.80.1/go.mod h1:y1WjHnz7Dj687irZUWR/WLkLc5N1YHtjLdmgWjndZn0=
+k8s.io/kms v0.29.3/go.mod h1:TBGbJKpRUMk59neTMDMddjIDL+D4HuFUbpuiuzmOPg0=
k8s.io/utils v0.0.0-20210802155522-efc7438f0176/go.mod h1:jPW/WVKK9YHAvNhRxK0md/EJ228hCsBRufyofKtW8HA=
+sigs.k8s.io/apiserver-network-proxy/konnectivity-client v0.28.0/go.mod h1:VHVDI/KrK4fjnV61bE2g3sA7tiETLn8sooImelsCx3Y=
sigs.k8s.io/structured-merge-diff/v4 v4.2.3/go.mod h1:qjx8mGObPmV2aSZepjQjbmb2ihdVs8cGKBraizNC69E=
diff --git a/internal/ingress/annotations/annotations.go b/internal/ingress/annotations/annotations.go
index 302f0b4b1..0bb2ac7b8 100644
--- a/internal/ingress/annotations/annotations.go
+++ b/internal/ingress/annotations/annotations.go
@@ -20,6 +20,7 @@ import (
"dario.cat/mergo"
"k8s.io/ingress-nginx/internal/ingress/annotations/canary"
+ "k8s.io/ingress-nginx/internal/ingress/annotations/customheaders"
"k8s.io/ingress-nginx/internal/ingress/annotations/disableproxyintercepterrors"
"k8s.io/ingress-nginx/internal/ingress/annotations/modsecurity"
"k8s.io/ingress-nginx/internal/ingress/annotations/opentelemetry"
@@ -82,6 +83,7 @@ type Ingress struct {
Canary canary.Config
CertificateAuth authtls.Config
ClientBodyBufferSize string
+ CustomHeaders customheaders.Config
ConfigurationSnippet string
Connection connection.Config
CorsConfig cors.Config
@@ -133,6 +135,7 @@ func NewAnnotationExtractor(cfg resolver.Resolver) Extractor {
"Canary": canary.NewParser(cfg),
"CertificateAuth": authtls.NewParser(cfg),
"ClientBodyBufferSize": clientbodybuffersize.NewParser(cfg),
+ "CustomHeaders": customheaders.NewParser(cfg),
"ConfigurationSnippet": snippet.NewParser(cfg),
"Connection": connection.NewParser(cfg),
"CorsConfig": cors.NewParser(cfg),
diff --git a/internal/ingress/annotations/annotations_test.go b/internal/ingress/annotations/annotations_test.go
index 0f4f8f7d7..5df3cdc0e 100644
--- a/internal/ingress/annotations/annotations_test.go
+++ b/internal/ingress/annotations/annotations_test.go
@@ -43,16 +43,20 @@ var (
annotationAffinityCookieName = parser.GetAnnotationWithPrefix("session-cookie-name")
annotationUpstreamHashBy = parser.GetAnnotationWithPrefix("upstream-hash-by")
annotationCustomHTTPErrors = parser.GetAnnotationWithPrefix("custom-http-errors")
+ annotationCustomHeaders = parser.GetAnnotationWithPrefix("custom-headers")
)
type mockCfg struct {
resolver.Mock
- MockSecrets map[string]*apiv1.Secret
- MockServices map[string]*apiv1.Service
+ MockSecrets map[string]*apiv1.Secret
+ MockServices map[string]*apiv1.Service
+ MockConfigMaps map[string]*apiv1.ConfigMap
}
func (m mockCfg) GetDefaultBackend() defaults.Backend {
- return defaults.Backend{}
+ return defaults.Backend{
+ AllowedResponseHeaders: []string{"Content-Type"},
+ }
}
func (m mockCfg) GetSecret(name string) (*apiv1.Secret, error) {
@@ -63,6 +67,10 @@ func (m mockCfg) GetService(name string) (*apiv1.Service, error) {
return m.MockServices[name], nil
}
+func (m mockCfg) GetConfigMap(name string) (*apiv1.ConfigMap, error) {
+ return m.MockConfigMaps[name], nil
+}
+
func (m mockCfg) GetAuthCertificate(name string) (*resolver.AuthSSLCert, error) {
secret, err := m.GetSecret(name)
if err != nil {
@@ -317,3 +325,44 @@ func TestCustomHTTPErrors(t *testing.T) {
}
}
}
+
+func TestCustomResponseHeaders(t *testing.T) {
+ mockObj := mockCfg{}
+ mockObj.MockConfigMaps = map[string]*apiv1.ConfigMap{}
+ mockObj.MockConfigMaps["custom-headers"] = &apiv1.ConfigMap{Data: map[string]string{"Content-Type": "application/json"}}
+ mockObj.MockConfigMaps["empty-custom-headers"] = &apiv1.ConfigMap{Data: map[string]string{}}
+
+ ec := NewAnnotationExtractor(mockObj)
+ ing := buildIngress()
+ fooAnns := []struct {
+ annotations map[string]string
+ headers map[string]string
+ }{
+ {map[string]string{annotationCustomHeaders: "custom-headers"}, map[string]string{"Content-Type": "application/json"}},
+ {map[string]string{annotationCustomHeaders: "empty-custom-headers"}, map[string]string{}},
+ {nil, map[string]string{}},
+ }
+
+ for _, foo := range fooAnns {
+ ing.SetAnnotations(foo.annotations)
+ rann, err := ec.Extract(ing)
+ if err != nil {
+ t.Errorf("error should be null: %v", err)
+ }
+ r := rann.CustomHeaders.Headers
+
+ // Check that expected headers were created
+ for i := range foo.headers {
+ if r[i] != foo.headers[i] {
+ t.Errorf("Returned %v but expected %v", r, foo.headers)
+ }
+ }
+
+ // Check that no unexpected headers were created
+ for i := range r {
+ if r[i] != foo.headers[i] {
+ t.Errorf("Returned %v but expected %v", r, foo.headers)
+ }
+ }
+ }
+}
diff --git a/internal/ingress/annotations/customheaders/main.go b/internal/ingress/annotations/customheaders/main.go
new file mode 100644
index 000000000..774e9c3d3
--- /dev/null
+++ b/internal/ingress/annotations/customheaders/main.go
@@ -0,0 +1,124 @@
+/*
+Copyright 2023 The Kubernetes Authors.
+
+Licensed under the Apache License, Version 2.0 (the "License");
+you may not use this file except in compliance with the License.
+You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law or agreed to in writing, software
+distributed under the License is distributed on an "AS IS" BASIS,
+WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+See the License for the specific language governing permissions and
+limitations under the License.
+*/
+
+package customheaders
+
+import (
+ "fmt"
+ "regexp"
+
+ "k8s.io/klog/v2"
+
+ networking "k8s.io/api/networking/v1"
+
+ "golang.org/x/exp/slices"
+ "k8s.io/ingress-nginx/internal/ingress/annotations/parser"
+ ing_errors "k8s.io/ingress-nginx/internal/ingress/errors"
+ "k8s.io/ingress-nginx/internal/ingress/resolver"
+)
+
+// Config returns the custom response headers for an Ingress rule
+type Config struct {
+ Headers map[string]string `json:"headers,omitempty"`
+}
+
+var (
+ headerRegexp = regexp.MustCompile(`^[a-zA-Z\d\-_]+$`)
+ valueRegexp = regexp.MustCompile(`^[a-zA-Z\d_ :;.,\\/"'?!(){}\[\]@<>=\-+*#$&\x60|~^%]+$`)
+)
+
+// ValidHeader checks is the provided string satisfies the header's name regex
+func ValidHeader(header string) bool {
+ return headerRegexp.MatchString(header)
+}
+
+// ValidValue checks is the provided string satisfies the value regex
+func ValidValue(header string) bool {
+ return valueRegexp.MatchString(header)
+}
+
+const (
+ customHeadersConfigMapAnnotation = "custom-headers"
+)
+
+var customHeadersAnnotation = parser.Annotation{
+ Group: "backend",
+ Annotations: parser.AnnotationFields{
+ customHeadersConfigMapAnnotation: {
+ Validator: parser.ValidateRegex(parser.BasicCharsRegex, true),
+ Scope: parser.AnnotationScopeLocation,
+ Risk: parser.AnnotationRiskMedium,
+ Documentation: `This annotation sets the name of a ConfigMap that specifies headers to pass to the client.
+ Only ConfigMaps on the same namespace are allowed`,
+ },
+ },
+}
+
+type customHeaders struct {
+ r resolver.Resolver
+ annotationConfig parser.Annotation
+}
+
+// NewParser creates a new custom response headers annotation parser
+func NewParser(r resolver.Resolver) parser.IngressAnnotation {
+ return customHeaders{r: r, annotationConfig: customHeadersAnnotation}
+}
+
+func (a customHeaders) GetDocumentation() parser.AnnotationFields {
+ return a.annotationConfig.Annotations
+}
+
+// Parse parses the annotations contained in the ingress to use
+// custom response headers
+func (a customHeaders) Parse(ing *networking.Ingress) (interface{}, error) {
+ clientHeadersConfigMapName, err := parser.GetStringAnnotation(customHeadersConfigMapAnnotation, ing, a.annotationConfig.Annotations)
+ if err != nil {
+ klog.V(3).InfoS("client-headers annotation is undefined and will not be set")
+ }
+
+ var headers map[string]string
+ defBackend := a.r.GetDefaultBackend()
+
+ if clientHeadersConfigMapName != "" {
+ clientHeadersMapContents, err := a.r.GetConfigMap(clientHeadersConfigMapName)
+ if err != nil {
+ return nil, ing_errors.NewLocationDenied(fmt.Sprintf("unable to find configMap %q", clientHeadersConfigMapName))
+ }
+
+ for header, value := range clientHeadersMapContents.Data {
+ if !ValidHeader(header) {
+ return nil, ing_errors.NewLocationDenied("invalid header name in configmap")
+ }
+ if !ValidValue(value) {
+ return nil, ing_errors.NewLocationDenied("invalid header value in configmap")
+ }
+ if !slices.Contains(defBackend.AllowedResponseHeaders, header) {
+ return nil, ing_errors.NewLocationDenied(fmt.Sprintf("header %s is not allowed, defined allowed headers inside global-allowed-response-headers %v", header, defBackend.AllowedResponseHeaders))
+ }
+ }
+
+ headers = clientHeadersMapContents.Data
+ }
+
+ return &Config{
+ Headers: headers,
+ }, nil
+}
+
+func (a customHeaders) Validate(anns map[string]string) error {
+ maxrisk := parser.StringRiskToRisk(a.r.GetSecurityConfiguration().AnnotationsRiskLevel)
+ return parser.CheckAnnotationRisk(anns, maxrisk, customHeadersAnnotation.Annotations)
+}
diff --git a/internal/ingress/annotations/customheaders/main_test.go b/internal/ingress/annotations/customheaders/main_test.go
new file mode 100644
index 000000000..81c0b795a
--- /dev/null
+++ b/internal/ingress/annotations/customheaders/main_test.go
@@ -0,0 +1,113 @@
+/*
+Copyright 2023 The Kubernetes Authors.
+
+Licensed under the Apache License, Version 2.0 (the "License");
+you may not use this file except in compliance with the License.
+You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law or agreed to in writing, software
+distributed under the License is distributed on an "AS IS" BASIS,
+WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+See the License for the specific language governing permissions and
+limitations under the License.
+*/
+
+package customheaders
+
+import (
+ "reflect"
+ "testing"
+
+ api "k8s.io/api/core/v1"
+ networking "k8s.io/api/networking/v1"
+ meta_v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
+ "k8s.io/ingress-nginx/internal/ingress/annotations/parser"
+ "k8s.io/ingress-nginx/internal/ingress/defaults"
+ "k8s.io/ingress-nginx/internal/ingress/resolver"
+)
+
+func buildIngress() *networking.Ingress {
+ return &networking.Ingress{
+ ObjectMeta: meta_v1.ObjectMeta{
+ Name: "foo",
+ Namespace: api.NamespaceDefault,
+ },
+ Spec: networking.IngressSpec{
+ DefaultBackend: &networking.IngressBackend{
+ Service: &networking.IngressServiceBackend{
+ Name: "default-backend",
+ Port: networking.ServiceBackendPort{
+ Number: 80,
+ },
+ },
+ },
+ },
+ }
+}
+
+type mockBackend struct {
+ resolver.Mock
+}
+
+// GetDefaultBackend returns the backend that must be used as default
+func (m mockBackend) GetDefaultBackend() defaults.Backend {
+ return defaults.Backend{
+ AllowedResponseHeaders: []string{"Content-Type", "Access-Control-Max-Age"},
+ }
+}
+
+func TestCustomHeadersParseInvalidAnnotations(t *testing.T) {
+ ing := buildIngress()
+ configMapResolver := mockBackend{}
+ configMapResolver.ConfigMaps = map[string]*api.ConfigMap{}
+
+ _, err := NewParser(configMapResolver).Parse(ing)
+ if err != nil {
+ t.Errorf("expected error parsing ingress with custom-response-headers")
+ }
+
+ data := map[string]string{}
+ data[parser.GetAnnotationWithPrefix("custom-headers")] = "custom-headers-configmap"
+ ing.SetAnnotations(data)
+ i, err := NewParser(&resolver.Mock{}).Parse(ing)
+ if err == nil {
+ t.Errorf("expected error parsing ingress with custom-response-headers")
+ }
+ if i != nil {
+ t.Errorf("expected %v but got %v", nil, i)
+ }
+}
+
+func TestCustomHeadersParseAnnotations(t *testing.T) {
+ ing := buildIngress()
+
+ data := map[string]string{}
+ data[parser.GetAnnotationWithPrefix("custom-headers")] = "custom-headers-configmap"
+ ing.SetAnnotations(data)
+
+ configMapResolver := mockBackend{}
+ configMapResolver.ConfigMaps = map[string]*api.ConfigMap{}
+
+ configMapResolver.ConfigMaps["custom-headers-configmap"] = &api.ConfigMap{Data: map[string]string{"Content-Type": "application/json", "Access-Control-Max-Age": "600"}}
+
+ i, err := NewParser(configMapResolver).Parse(ing)
+ if err != nil {
+ t.Errorf("unexpected error parsing ingress with custom-response-headers: %s", err)
+ }
+ val, ok := i.(*Config)
+ if !ok {
+ t.Errorf("expected a *Config type")
+ }
+
+ expectedResponseHeaders := map[string]string{}
+ expectedResponseHeaders["Content-Type"] = "application/json"
+ expectedResponseHeaders["Access-Control-Max-Age"] = "600"
+
+ c := &Config{expectedResponseHeaders}
+
+ if !reflect.DeepEqual(c, val) {
+ t.Errorf("expected %v but got %v", c, val)
+ }
+}
diff --git a/internal/ingress/controller/config/config.go b/internal/ingress/controller/config/config.go
index 371f3069c..47f2120f1 100644
--- a/internal/ingress/controller/config/config.go
+++ b/internal/ingress/controller/config/config.go
@@ -888,6 +888,7 @@ func NewDefault() Configuration {
ProxyHTTPVersion: "1.1",
ProxyMaxTempFileSize: "1024m",
ServiceUpstream: false,
+ AllowedResponseHeaders: []string{},
},
UpstreamKeepaliveConnections: 320,
UpstreamKeepaliveTime: "1h",
diff --git a/internal/ingress/controller/controller.go b/internal/ingress/controller/controller.go
index a43c143e3..2e782f485 100644
--- a/internal/ingress/controller/controller.go
+++ b/internal/ingress/controller/controller.go
@@ -1504,6 +1504,7 @@ func (n *NGINXController) createServers(data []*ingress.Ingress,
func locationApplyAnnotations(loc *ingress.Location, anns *annotations.Ingress) {
loc.BasicDigestAuth = anns.BasicDigestAuth
loc.ClientBodyBufferSize = anns.ClientBodyBufferSize
+ loc.CustomHeaders = anns.CustomHeaders
loc.ConfigurationSnippet = anns.ConfigurationSnippet
loc.CorsConfig = anns.CorsConfig
loc.ExternalAuth = anns.ExternalAuth
diff --git a/internal/ingress/controller/template/configmap.go b/internal/ingress/controller/template/configmap.go
index 9dc019bcc..f78dbad03 100644
--- a/internal/ingress/controller/template/configmap.go
+++ b/internal/ingress/controller/template/configmap.go
@@ -31,6 +31,7 @@ import (
"k8s.io/apimachinery/pkg/util/sets"
"k8s.io/ingress-nginx/internal/ingress/annotations/authreq"
+ "k8s.io/ingress-nginx/internal/ingress/annotations/customheaders"
"k8s.io/ingress-nginx/internal/ingress/annotations/parser"
"k8s.io/ingress-nginx/internal/ingress/controller/config"
ing_net "k8s.io/ingress-nginx/internal/net"
@@ -54,6 +55,7 @@ const (
nginxStatusIpv6Whitelist = "nginx-status-ipv6-whitelist"
proxyHeaderTimeout = "proxy-protocol-header-timeout"
workerProcesses = "worker-processes"
+ globalAllowedResponseHeaders = "global-allowed-response-headers"
globalAuthURL = "global-auth-url"
globalAuthMethod = "global-auth-method"
globalAuthSignin = "global-auth-signin"
@@ -115,6 +117,7 @@ func ReadConfig(src map[string]string) config.Configuration {
blockUserAgentList := make([]string, 0)
blockRefererList := make([]string, 0)
responseHeaders := make([]string, 0)
+ allowedResponseHeaders := make([]string, 0)
luaSharedDicts := make(map[string]int)
debugConnectionsList := make([]string, 0)
@@ -248,6 +251,22 @@ func ReadConfig(src map[string]string) config.Configuration {
}
}
+ // Verify that the configured global external authorization response headers are valid. if not, set the default value
+ if val, ok := conf[globalAllowedResponseHeaders]; ok {
+ delete(conf, globalAllowedResponseHeaders)
+
+ if val != "" {
+ harr := splitAndTrimSpace(val, ",")
+ for _, header := range harr {
+ if !customheaders.ValidHeader(header) {
+ klog.Warningf("Global allowed response headers denied - %s.", header)
+ } else {
+ allowedResponseHeaders = append(allowedResponseHeaders, header)
+ }
+ }
+ }
+ }
+
// Verify that the configured global external authorization method is a valid HTTP method. if not, set the default value
if val, ok := conf[globalAuthMethod]; ok {
delete(conf, globalAuthMethod)
@@ -422,6 +441,7 @@ func ReadConfig(src map[string]string) config.Configuration {
to.ProxyStreamResponses = streamResponses
to.DisableIpv6DNS = !ing_net.IsIPv6Enabled()
to.LuaSharedDicts = luaSharedDicts
+ to.Backend.AllowedResponseHeaders = allowedResponseHeaders
decoderConfig := &mapstructure.DecoderConfig{
Metadata: nil,
diff --git a/internal/ingress/defaults/main.go b/internal/ingress/defaults/main.go
index 2bb58c858..cfad388ef 100644
--- a/internal/ingress/defaults/main.go
+++ b/internal/ingress/defaults/main.go
@@ -176,6 +176,9 @@ type Backend struct {
// By default, the NGINX ingress controller uses a list of all endpoints (Pod IP/port) in the NGINX upstream configuration.
// It disables that behavior and instead uses a single upstream in NGINX, the service's Cluster IP and port.
ServiceUpstream bool `json:"service-upstream"`
+
+ // AllowedResponseHeaders allows to define allow response headers for custom header annotation
+ AllowedResponseHeaders []string `json:"global-allowed-response-headers"`
}
type SecurityConfiguration struct {
diff --git a/pkg/apis/ingress/types.go b/pkg/apis/ingress/types.go
index 2ad17ec3d..269814d34 100644
--- a/pkg/apis/ingress/types.go
+++ b/pkg/apis/ingress/types.go
@@ -27,6 +27,7 @@ import (
"k8s.io/ingress-nginx/internal/ingress/annotations/authtls"
"k8s.io/ingress-nginx/internal/ingress/annotations/connection"
"k8s.io/ingress-nginx/internal/ingress/annotations/cors"
+ "k8s.io/ingress-nginx/internal/ingress/annotations/customheaders"
"k8s.io/ingress-nginx/internal/ingress/annotations/fastcgi"
"k8s.io/ingress-nginx/internal/ingress/annotations/globalratelimit"
"k8s.io/ingress-nginx/internal/ingress/annotations/ipallowlist"
@@ -263,7 +264,8 @@ type Location struct {
BasicDigestAuth auth.Config `json:"basicDigestAuth,omitempty"`
// Denied returns an error when this location cannot not be allowed
// Requesting a denied location should return HTTP code 403.
- Denied *string `json:"denied,omitempty"`
+ Denied *string `json:"denied,omitempty"`
+ CustomHeaders customheaders.Config `json:"customHeaders,omitempty"`
// CorsConfig returns the Cors Configuration for the ingress rule
// +optional
CorsConfig cors.Config `json:"corsConfig,omitempty"`
diff --git a/rootfs/etc/nginx/template/nginx.tmpl b/rootfs/etc/nginx/template/nginx.tmpl
index b3b3f8683..4c0da2eb9 100644
--- a/rootfs/etc/nginx/template/nginx.tmpl
+++ b/rootfs/etc/nginx/template/nginx.tmpl
@@ -1489,6 +1489,13 @@ stream {
{{ $all.Cfg.LocationSnippet }}
{{ end }}
+ {{ if $location.CustomHeaders }}
+ # Custom Response Headers
+ {{ range $k, $v := $location.CustomHeaders.Headers }}
+ more_set_headers {{ printf "%s: %s" $k $v | escapeLiteralDollar | quote }};
+ {{ end }}
+ {{ end }}
+
{{/* if we are sending the request to a custom default backend, we add the required headers */}}
{{ if (hasPrefix $location.Backend "custom-default-backend-") }}
proxy_set_header X-Code 503;
diff --git a/test/e2e/annotations/customheaders.go b/test/e2e/annotations/customheaders.go
new file mode 100644
index 000000000..274ce8278
--- /dev/null
+++ b/test/e2e/annotations/customheaders.go
@@ -0,0 +1,110 @@
+/*
+Copyright 2023 The Kubernetes Authors.
+
+Licensed under the Apache License, Version 2.0 (the "License");
+you may not use this file except in compliance with the License.
+You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law or agreed to in writing, software
+distributed under the License is distributed on an "AS IS" BASIS,
+WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+See the License for the specific language governing permissions and
+limitations under the License.
+*/
+
+package annotations
+
+import (
+ "fmt"
+ "net/http"
+ "strings"
+
+ "github.com/onsi/ginkgo/v2"
+
+ "k8s.io/ingress-nginx/test/e2e/framework"
+)
+
+const (
+ customHeaderHost = "custom-headers"
+)
+
+var _ = framework.DescribeAnnotation("custom-headers-*", func() {
+ f := framework.NewDefaultFramework("custom-headers")
+
+ ginkgo.BeforeEach(func() {
+ f.NewEchoDeployment()
+ })
+
+ ginkgo.It("should return status code 200 when no custom-headers is configured", func() {
+ ing := framework.NewSingleIngress(customHeaderHost, "/", customHeaderHost, f.Namespace, framework.EchoService, 80, nil)
+ f.EnsureIngress(ing)
+
+ f.WaitForNginxServer(customHeaderHost,
+ func(server string) bool {
+ return strings.Contains(server, "server_name custom-headers")
+ })
+
+ f.HTTPTestClient().
+ GET("/").
+ WithHeader("Host", customHeaderHost).
+ Expect().
+ Status(http.StatusOK).
+ Body().Contains(fmt.Sprintf("host=%v", customHeaderHost))
+ })
+
+ ginkgo.It("should return status code 503 when custom-headers is configured with an invalid secret", func() {
+ annotations := map[string]string{
+ "nginx.ingress.kubernetes.io/custom-headers": f.Namespace + "/custom-headers",
+ }
+
+ ing := framework.NewSingleIngress(customHeaderHost, "/", customHeaderHost, f.Namespace, framework.EchoService, 80, annotations)
+ f.EnsureIngress(ing)
+
+ f.WaitForNginxServer(customHeaderHost,
+ func(server string) bool {
+ return strings.Contains(server, "server_name custom-headers")
+ })
+
+ f.HTTPTestClient().
+ GET("/").
+ WithHeader("Host", customHeaderHost).
+ Expect().
+ Status(http.StatusServiceUnavailable).
+ Body().Contains("503 Service Temporarily Unavailable")
+ })
+
+ ginkgo.It(`should set "more_set_headers 'My-Custom-Header' '42';" when custom-headers are set`, func() {
+ annotations := map[string]string{
+ "nginx.ingress.kubernetes.io/custom-headers": f.Namespace + "/custom-headers",
+ }
+
+ f.CreateConfigMap("custom-headers", map[string]string{
+ "My-Custom-Header": "42",
+ "My-Custom-Header-Dollar": "$remote_addr",
+ })
+ f.UpdateNginxConfigMapData("global-allowed-response-headers", "My-Custom-Header,My-Custom-Header-Dollar")
+
+ ing := framework.NewSingleIngress(customHeaderHost, "/", customHeaderHost, f.Namespace, framework.EchoService, 80, annotations)
+ f.EnsureIngress(ing)
+
+ f.WaitForNginxServer(customHeaderHost,
+ func(server string) bool {
+ return strings.Contains(server, `more_set_headers "My-Custom-Header: 42";`)
+ })
+
+ f.HTTPTestClient().
+ GET("/").
+ WithHeader("Host", customHeaderHost).
+ Expect().
+ Status(http.StatusOK).
+ Header("My-Custom-Header").Contains("42")
+ f.HTTPTestClient().
+ GET("/").
+ WithHeader("Host", customHeaderHost).
+ Expect().
+ Status(http.StatusOK).
+ Header("My-Custom-Header-Dollar").Contains("$remote_addr")
+ })
+})
From ca6d3622e5c2819a29f4a407ed272f42d10a91a9 Mon Sep 17 00:00:00 2001
From: James Strong
Date: Tue, 9 Apr 2024 15:34:40 -0400
Subject: [PATCH 035/283] update k8s version to latest kind release (#11240)
Signed-off-by: James Strong
---
.github/workflows/ci.yaml | 8 ++++----
.github/workflows/images.yaml | 2 +-
2 files changed, 5 insertions(+), 5 deletions(-)
diff --git a/.github/workflows/ci.yaml b/.github/workflows/ci.yaml
index 3e7067b8f..bc2dc24ef 100644
--- a/.github/workflows/ci.yaml
+++ b/.github/workflows/ci.yaml
@@ -235,7 +235,7 @@ jobs:
strategy:
matrix:
- k8s: [v1.26.6, v1.27.3, v1.28.0, v1.29.0]
+ k8s: [v1.26.14, v1.27.11, v1.28.7, v1.29.2]
steps:
- name: Checkout
@@ -286,7 +286,7 @@ jobs:
(needs.changes.outputs.go == 'true') || (needs.changes.outputs.baseimage == 'true')
strategy:
matrix:
- k8s: [v1.26.6, v1.27.3, v1.28.0, v1.29.0]
+ k8s: [v1.26.14, v1.27.11, v1.28.7, v1.29.2]
uses: ./.github/workflows/zz-tmpl-k8s-e2e.yaml
with:
k8s-version: ${{ matrix.k8s }}
@@ -300,7 +300,7 @@ jobs:
(needs.changes.outputs.go == 'true') || (needs.changes.outputs.baseimage == 'true')
strategy:
matrix:
- k8s: [v1.26.6, v1.27.3, v1.28.0, v1.29.0]
+ k8s: [v1.26.14, v1.27.11, v1.28.7, v1.29.2]
uses: ./.github/workflows/zz-tmpl-k8s-e2e.yaml
with:
k8s-version: ${{ matrix.k8s }}
@@ -315,7 +315,7 @@ jobs:
(needs.changes.outputs.go == 'true') || (needs.changes.outputs.baseimage == 'true')
strategy:
matrix:
- k8s: [v1.26.6, v1.27.3, v1.28.0, v1.29.0]
+ k8s: [v1.26.14, v1.27.11, v1.28.7, v1.29.2]
uses: ./.github/workflows/zz-tmpl-k8s-e2e.yaml
with:
k8s-version: ${{ matrix.k8s }}
diff --git a/.github/workflows/images.yaml b/.github/workflows/images.yaml
index 4afc27aa2..28bbf6692 100644
--- a/.github/workflows/images.yaml
+++ b/.github/workflows/images.yaml
@@ -141,7 +141,7 @@ jobs:
(needs.changes.outputs.kube-webhook-certgen == 'true')
strategy:
matrix:
- k8s: [v1.25.11, v1.26.6, v1.27.3, v1.28.0, v1.29.0]
+ k8s: [v1.26.14, v1.27.11, v1.28.7, v1.29.2]
steps:
- name: Checkout
uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
From fde59909297d5b384e5a550bec155ca37bcfad15 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 15 Apr 2024 08:02:17 -0700
Subject: [PATCH 036/283] Bump actions/add-to-project from 1.0.0 to 1.0.1 in
the all group (#11262)
Bumps the all group with 1 update: [actions/add-to-project](https://github.com/actions/add-to-project).
Updates `actions/add-to-project` from 1.0.0 to 1.0.1
- [Release notes](https://github.com/actions/add-to-project/releases)
- [Commits](https://github.com/actions/add-to-project/compare/2e5cc851ca7162e9eb510e6da6a5c64022e606a7...9bfe908f2eaa7ba10340b31e314148fcfe6a2458)
---
updated-dependencies:
- dependency-name: actions/add-to-project
dependency-type: direct:production
update-type: version-update:semver-patch
dependency-group: all
...
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
.github/workflows/project.yml | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/.github/workflows/project.yml b/.github/workflows/project.yml
index b999e29be..59ad98a71 100644
--- a/.github/workflows/project.yml
+++ b/.github/workflows/project.yml
@@ -13,7 +13,7 @@ jobs:
repository-projects: write
issues: write
steps:
- - uses: actions/add-to-project@2e5cc851ca7162e9eb510e6da6a5c64022e606a7 # v1.0.0
+ - uses: actions/add-to-project@9bfe908f2eaa7ba10340b31e314148fcfe6a2458 # v1.0.1
with:
project-url: https://github.com/orgs/kubernetes/projects/104
github-token: ${{ secrets.PROJECT_WRITER }}
From 5b8c1cd1d990b8bd206b44ec007e56730ad2260a Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 15 Apr 2024 08:04:36 -0700
Subject: [PATCH 037/283] Bump azure/setup-helm from 3.5 to 4 (#11263)
Bumps [azure/setup-helm](https://github.com/azure/setup-helm) from 3.5 to 4.
- [Release notes](https://github.com/azure/setup-helm/releases)
- [Changelog](https://github.com/Azure/setup-helm/blob/main/CHANGELOG.md)
- [Commits](https://github.com/azure/setup-helm/compare/5119fcb9089d432beecbf79bb2c7915207344b78...b7246b12e77f7134dc2d460a3d5bad15bbe29390)
---
updated-dependencies:
- dependency-name: azure/setup-helm
dependency-type: direct:production
update-type: version-update:semver-major
...
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
.github/workflows/ci.yaml | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/.github/workflows/ci.yaml b/.github/workflows/ci.yaml
index bc2dc24ef..e7f2da325 100644
--- a/.github/workflows/ci.yaml
+++ b/.github/workflows/ci.yaml
@@ -184,7 +184,7 @@ jobs:
fetch-depth: 0
- name: Set up Helm
- uses: azure/setup-helm@5119fcb9089d432beecbf79bb2c7915207344b78 # v3.5
+ uses: azure/setup-helm@b7246b12e77f7134dc2d460a3d5bad15bbe29390 # v4.1.0
- uses: actions/setup-python@82c7e631bb3cdc910f68e0081d67478d79c6982d # v5.1.0
with:
From b9e0c281d060ff3030daf300790a04e0fdb89a2e Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 15 Apr 2024 09:12:02 -0700
Subject: [PATCH 038/283] Bump the all group with 2 updates (#11261)
Bumps the all group with 2 updates: [github.com/prometheus/common](https://github.com/prometheus/common) and [sigs.k8s.io/controller-runtime](https://github.com/kubernetes-sigs/controller-runtime).
Updates `github.com/prometheus/common` from 0.52.2 to 0.52.3
- [Release notes](https://github.com/prometheus/common/releases)
- [Commits](https://github.com/prometheus/common/compare/v0.52.2...v0.52.3)
Updates `sigs.k8s.io/controller-runtime` from 0.17.2 to 0.17.3
- [Release notes](https://github.com/kubernetes-sigs/controller-runtime/releases)
- [Changelog](https://github.com/kubernetes-sigs/controller-runtime/blob/main/RELEASE.md)
- [Commits](https://github.com/kubernetes-sigs/controller-runtime/compare/v0.17.2...v0.17.3)
---
updated-dependencies:
- dependency-name: github.com/prometheus/common
dependency-type: direct:production
update-type: version-update:semver-patch
dependency-group: all
- dependency-name: sigs.k8s.io/controller-runtime
dependency-type: direct:production
update-type: version-update:semver-patch
dependency-group: all
...
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 4 ++--
go.sum | 8 ++++----
2 files changed, 6 insertions(+), 6 deletions(-)
diff --git a/go.mod b/go.mod
index 228ac7511..59701ed42 100644
--- a/go.mod
+++ b/go.mod
@@ -19,7 +19,7 @@ require (
github.com/pmezard/go-difflib v1.0.0
github.com/prometheus/client_golang v1.19.0
github.com/prometheus/client_model v0.6.1
- github.com/prometheus/common v0.52.2
+ github.com/prometheus/common v0.52.3
github.com/spf13/cobra v1.8.0
github.com/spf13/pflag v1.0.5
github.com/stretchr/testify v1.9.0
@@ -41,7 +41,7 @@ require (
k8s.io/component-base v0.29.3
k8s.io/klog/v2 v2.120.1
pault.ag/go/sniff v0.0.0-20200207005214-cf7e4d167732
- sigs.k8s.io/controller-runtime v0.17.2
+ sigs.k8s.io/controller-runtime v0.17.3
sigs.k8s.io/mdtoc v1.1.0
)
diff --git a/go.sum b/go.sum
index b7f63c02f..999739793 100644
--- a/go.sum
+++ b/go.sum
@@ -323,8 +323,8 @@ github.com/prometheus/common v0.4.1/go.mod h1:TNfzLD0ON7rHzMJeJkieUDPYmFC7Snx/y8
github.com/prometheus/common v0.10.0/go.mod h1:Tlit/dnDKsSWFlCLTWaA1cyBgKHSMdTB80sz/V91rCo=
github.com/prometheus/common v0.26.0/go.mod h1:M7rCNAaPfAosfx8veZJCuw84e35h3Cfd9VFqTh1DIvc=
github.com/prometheus/common v0.29.0/go.mod h1:vu+V0TpY+O6vW9J44gczi3Ap/oXXR10b+M/gUGO4Hls=
-github.com/prometheus/common v0.52.2 h1:LW8Vk7BccEdONfrJBDffQGRtpSzi5CQaRZGtboOO2ck=
-github.com/prometheus/common v0.52.2/go.mod h1:lrWtQx+iDfn2mbH5GUzlH9TSHyfZpHkSiG1W7y3sF2Q=
+github.com/prometheus/common v0.52.3 h1:5f8uj6ZwHSscOGNdIQg6OiZv/ybiK2CO2q2drVZAQSA=
+github.com/prometheus/common v0.52.3/go.mod h1:BrxBKv3FWBIGXw89Mg1AeBq7FSyRzXWI3l3e7W3RN5U=
github.com/prometheus/exporter-toolkit v0.7.0/go.mod h1:ZUBIj498ePooX9t/2xtDjeQYwvRpiPP2lh5u4iblj2g=
github.com/prometheus/procfs v0.0.0-20181005140218-185b4288413d/go.mod h1:c3At6R/oaqEKCNdg8wHV1ftS6bRYblBhIjjI8uT2IGk=
github.com/prometheus/procfs v0.0.2/go.mod h1:TjEm7ze935MbeOT/UhFTIMYKhuLP4wbCsTZCD3I8kEA=
@@ -770,8 +770,8 @@ pault.ag/go/sniff v0.0.0-20200207005214-cf7e4d167732/go.mod h1:lpvCfhqEHNJSSpG5R
rsc.io/binaryregexp v0.2.0/go.mod h1:qTv7/COck+e2FymRvadv62gMdZztPaShugOCi3I+8D8=
rsc.io/quote/v3 v3.1.0/go.mod h1:yEA65RcK8LyAZtP9Kv3t0HmxON59tX3rD+tICJqUlj0=
rsc.io/sampler v1.3.0/go.mod h1:T1hPZKmBbMNahiBKFy5HrXp6adAjACjK9JXDnKaTXpA=
-sigs.k8s.io/controller-runtime v0.17.2 h1:FwHwD1CTUemg0pW2otk7/U5/i5m2ymzvOXdbeGOUvw0=
-sigs.k8s.io/controller-runtime v0.17.2/go.mod h1:+MngTvIQQQhfXtwfdGw/UOQ/aIaqsYywfCINOtwMO/s=
+sigs.k8s.io/controller-runtime v0.17.3 h1:65QmN7r3FWgTxDMz9fvGnO1kbf2nu+acg9p2R9oYYYk=
+sigs.k8s.io/controller-runtime v0.17.3/go.mod h1:N0jpP5Lo7lMTF9aL56Z/B2oWBJjey6StQM0jRbKQXtY=
sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd h1:EDPBXCAspyGV4jQlpZSudPeMmr1bNJefnuqLsRAsHZo=
sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd/go.mod h1:B8JuhiUyNFVKdsE8h686QcCxMaH6HrOAZj4vswFpcB0=
sigs.k8s.io/kustomize/api v0.16.0 h1:/zAR4FOQDCkgSDmVzV2uiFbuy9bhu3jEzthrHCuvm1g=
From 1dee4b131e61b0060618eabff76e26770f86135f Mon Sep 17 00:00:00 2001
From: James Strong
Date: Thu, 18 Apr 2024 10:30:27 -0400
Subject: [PATCH 039/283] release helm chart from release branch (#11276)
Signed-off-by: James Strong
---
.github/workflows/helm.yaml | 1 +
1 file changed, 1 insertion(+)
diff --git a/.github/workflows/helm.yaml b/.github/workflows/helm.yaml
index 3ba506c29..af8d91e1f 100644
--- a/.github/workflows/helm.yaml
+++ b/.github/workflows/helm.yaml
@@ -4,6 +4,7 @@ on:
push:
branches:
- main
+ - release-*
permissions:
contents: read
From 95554dccd25a5b6debac9a850c0b84ec2f815fe8 Mon Sep 17 00:00:00 2001
From: NierYYDS <141559828+NierYYDS@users.noreply.github.com>
Date: Fri, 19 Apr 2024 01:06:32 +0800
Subject: [PATCH 040/283] fix: update kube version requirement to 1.21 (#11275)
The controller depends on the v1 version of EndpointSlice, but the discovery.k8s.io/v1 API was first introduced in Kubernetes version 1.21.
---
charts/ingress-nginx/Chart.yaml | 2 +-
charts/ingress-nginx/README.md | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/charts/ingress-nginx/Chart.yaml b/charts/ingress-nginx/Chart.yaml
index 7996c29c5..f9bb890f8 100644
--- a/charts/ingress-nginx/Chart.yaml
+++ b/charts/ingress-nginx/Chart.yaml
@@ -11,7 +11,7 @@ icon: https://upload.wikimedia.org/wikipedia/commons/thumb/c/c5/Nginx_logo.svg/5
keywords:
- ingress
- nginx
-kubeVersion: '>=1.20.0-0'
+kubeVersion: '>=1.21.0-0'
maintainers:
- name: Gacko
- name: rikatz
diff --git a/charts/ingress-nginx/README.md b/charts/ingress-nginx/README.md
index c3489a6c3..1c166e05e 100644
--- a/charts/ingress-nginx/README.md
+++ b/charts/ingress-nginx/README.md
@@ -10,7 +10,7 @@ This chart bootstraps an ingress-nginx deployment on a [Kubernetes](http://kuber
## Requirements
-Kubernetes: `>=1.20.0-0`
+Kubernetes: `>=1.21.0-0`
## Get Repo Info
From e5b663690300180d0c3b0b349afaa89fbe5dd19d Mon Sep 17 00:00:00 2001
From: racequite <166888152+racequite@users.noreply.github.com>
Date: Fri, 19 Apr 2024 17:25:09 +0800
Subject: [PATCH 041/283] chore: fix function names in comment (#11280)
Signed-off-by: racequite
---
internal/ingress/errors/errors.go | 2 +-
internal/ingress/status/status.go | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/internal/ingress/errors/errors.go b/internal/ingress/errors/errors.go
index d70218334..62be8b77f 100644
--- a/internal/ingress/errors/errors.go
+++ b/internal/ingress/errors/errors.go
@@ -137,7 +137,7 @@ func IsValidationError(e error) bool {
return ok
}
-// NewValidationError returns a new LocationDenied error
+// NewRiskyAnnotations returns a new LocationDenied error
func NewRiskyAnnotations(name string) error {
return RiskyAnnotationError{
Reason: fmt.Errorf("annotation group %s contains risky annotation based on ingress configuration", name),
diff --git a/internal/ingress/status/status.go b/internal/ingress/status/status.go
index 81fb9044a..ef01cdd24 100644
--- a/internal/ingress/status/status.go
+++ b/internal/ingress/status/status.go
@@ -393,7 +393,7 @@ func statusAddressFromService(service string, kubeClient clientset.Interface) ([
return nil, fmt.Errorf("unable to extract IP address/es from service %v", service)
}
-// stringInSlice returns true if s is in list
+// stringInIngresses returns true if s is in list
func stringInIngresses(s string, list []v1.IngressLoadBalancerIngress) bool {
for _, v := range list {
if v.IP == s || v.Hostname == s {
From 6bfc30a4b9de680bc5e86533d15b2f636580535a Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Fri, 19 Apr 2024 06:44:17 -0700
Subject: [PATCH 042/283] Bump golang.org/x/net in
/images/kube-webhook-certgen/rootfs (#11283)
Bumps [golang.org/x/net](https://github.com/golang/net) from 0.22.0 to 0.23.0.
- [Commits](https://github.com/golang/net/compare/v0.22.0...v0.23.0)
---
updated-dependencies:
- dependency-name: golang.org/x/net
dependency-type: indirect
...
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
images/kube-webhook-certgen/rootfs/go.mod | 2 +-
images/kube-webhook-certgen/rootfs/go.sum | 4 ++--
2 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/images/kube-webhook-certgen/rootfs/go.mod b/images/kube-webhook-certgen/rootfs/go.mod
index b1903dcf3..94da139a2 100644
--- a/images/kube-webhook-certgen/rootfs/go.mod
+++ b/images/kube-webhook-certgen/rootfs/go.mod
@@ -39,7 +39,7 @@ require (
github.com/pkg/errors v0.9.1 // indirect
github.com/spf13/pflag v1.0.5 // indirect
github.com/stretchr/testify v1.9.0 // indirect
- golang.org/x/net v0.22.0 // indirect
+ golang.org/x/net v0.23.0 // indirect
golang.org/x/oauth2 v0.18.0 // indirect
golang.org/x/sys v0.18.0 // indirect
golang.org/x/term v0.18.0 // indirect
diff --git a/images/kube-webhook-certgen/rootfs/go.sum b/images/kube-webhook-certgen/rootfs/go.sum
index 4ec80305a..613ff3e2e 100644
--- a/images/kube-webhook-certgen/rootfs/go.sum
+++ b/images/kube-webhook-certgen/rootfs/go.sum
@@ -104,8 +104,8 @@ golang.org/x/net v0.0.0-20200226121028-0de0cce0169b/go.mod h1:z5CRVTTTmAJ677TzLL
golang.org/x/net v0.0.0-20201021035429-f5854403a974/go.mod h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU=
golang.org/x/net v0.0.0-20210226172049-e18ecbb05110/go.mod h1:m0MpNAwzfU5UDzcl9v0D8zg8gWTRqZa9RBIspLL5mdg=
golang.org/x/net v0.0.0-20220722155237-a158d28d115b/go.mod h1:XRhObCWvk6IyKnWLug+ECip1KBveYUHfp+8e9klMJ9c=
-golang.org/x/net v0.22.0 h1:9sGLhx7iRIHEiX0oAJ3MRZMUCElJgy7Br1nO+AMN3Tc=
-golang.org/x/net v0.22.0/go.mod h1:JKghWKKOSdJwpW2GEx0Ja7fmaKnMsbu+MWVZTokSYmg=
+golang.org/x/net v0.23.0 h1:7EYJ93RZ9vYSZAIb2x3lnuvqO5zneoD6IvWjuhfxjTs=
+golang.org/x/net v0.23.0/go.mod h1:JKghWKKOSdJwpW2GEx0Ja7fmaKnMsbu+MWVZTokSYmg=
golang.org/x/oauth2 v0.18.0 h1:09qnuIAgzdx1XplqJvW6CQqMCtGZykZWcXzPMPUusvI=
golang.org/x/oauth2 v0.18.0/go.mod h1:Wf7knwG0MPoWIMMBgFlEaSUDaKskp0dCfrlJRJXbBi8=
golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
From af5cfbd0a25a8544ad51a04c0183cd6a97afc38b Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Fri, 19 Apr 2024 07:22:55 -0700
Subject: [PATCH 043/283] Bump golang.org/x/net from 0.22.0 to 0.23.0 (#11282)
Bumps [golang.org/x/net](https://github.com/golang/net) from 0.22.0 to 0.23.0.
- [Commits](https://github.com/golang/net/compare/v0.22.0...v0.23.0)
---
updated-dependencies:
- dependency-name: golang.org/x/net
dependency-type: indirect
...
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 2 +-
go.sum | 4 ++--
2 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/go.mod b/go.mod
index 59701ed42..c4c445a60 100644
--- a/go.mod
+++ b/go.mod
@@ -105,7 +105,7 @@ require (
github.com/yudai/pp v2.0.1+incompatible // indirect
go.starlark.net v0.0.0-20240123142251-f86470692795 // indirect
golang.org/x/mod v0.15.0 // indirect
- golang.org/x/net v0.22.0 // indirect
+ golang.org/x/net v0.23.0 // indirect
golang.org/x/oauth2 v0.18.0 // indirect
golang.org/x/sync v0.6.0 // indirect
golang.org/x/sys v0.19.0 // indirect
diff --git a/go.sum b/go.sum
index 999739793..65d5ec9b8 100644
--- a/go.sum
+++ b/go.sum
@@ -472,8 +472,8 @@ golang.org/x/net v0.0.0-20201021035429-f5854403a974/go.mod h1:sp8m0HH+o8qH0wwXwY
golang.org/x/net v0.0.0-20210226172049-e18ecbb05110/go.mod h1:m0MpNAwzfU5UDzcl9v0D8zg8gWTRqZa9RBIspLL5mdg=
golang.org/x/net v0.0.0-20210525063256-abc453219eb5/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
golang.org/x/net v0.0.0-20220722155237-a158d28d115b/go.mod h1:XRhObCWvk6IyKnWLug+ECip1KBveYUHfp+8e9klMJ9c=
-golang.org/x/net v0.22.0 h1:9sGLhx7iRIHEiX0oAJ3MRZMUCElJgy7Br1nO+AMN3Tc=
-golang.org/x/net v0.22.0/go.mod h1:JKghWKKOSdJwpW2GEx0Ja7fmaKnMsbu+MWVZTokSYmg=
+golang.org/x/net v0.23.0 h1:7EYJ93RZ9vYSZAIb2x3lnuvqO5zneoD6IvWjuhfxjTs=
+golang.org/x/net v0.23.0/go.mod h1:JKghWKKOSdJwpW2GEx0Ja7fmaKnMsbu+MWVZTokSYmg=
golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U=
golang.org/x/oauth2 v0.0.0-20190226205417-e64efc72b421/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
golang.org/x/oauth2 v0.0.0-20190604053449-0f29369cfe45/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
From 48fbdfe3ba0c0e258890c970e2561caecea532dd Mon Sep 17 00:00:00 2001
From: Tom Hayward
Date: Fri, 19 Apr 2024 08:41:08 -0700
Subject: [PATCH 044/283] fix path in file changed detected message (#11271)
* fix path in file changed detected message
Signed-off-by: Tom Hayward
* fix typo in log message
* explain code per review comments
---------
Signed-off-by: Tom Hayward
---
internal/ingress/controller/nginx.go | 5 ++++-
1 file changed, 4 insertions(+), 1 deletion(-)
diff --git a/internal/ingress/controller/nginx.go b/internal/ingress/controller/nginx.go
index 0df5409f4..b81734154 100644
--- a/internal/ingress/controller/nginx.go
+++ b/internal/ingress/controller/nginx.go
@@ -202,8 +202,11 @@ func NewNGINXController(config *Configuration, mc metric.Collector) *NGINXContro
}
for _, f := range filesToWatch {
+ // This redeclaration is necessary for the closure to get the correct value for the iteration in go versions <1.22
+ // See https://go.dev/blog/loopvar-preview
+ f := f
_, err = file.NewFileWatcher(f, func() {
- klog.InfoS("File changed detected. Reloading NGINX", "path", f)
+ klog.InfoS("File change detected. Reloading NGINX", "path", f)
n.syncQueue.EnqueueTask(task.GetDummyObject("file-change"))
})
if err != nil {
From 414e0b6c181840851367d077d7b174e465162c97 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 22 Apr 2024 10:30:01 +0000
Subject: [PATCH 045/283] Bump the all group with 5 updates
Bumps the all group with 5 updates:
| Package | From | To |
| --- | --- | --- |
| [actions/checkout](https://github.com/actions/checkout) | `4.1.2` | `4.1.3` |
| [actions/upload-artifact](https://github.com/actions/upload-artifact) | `4.3.1` | `4.3.2` |
| [azure/setup-helm](https://github.com/azure/setup-helm) | `4.1.0` | `4.2.0` |
| [actions/download-artifact](https://github.com/actions/download-artifact) | `4.1.4` | `4.1.5` |
| [github/codeql-action](https://github.com/github/codeql-action) | `3.24.10` | `3.25.1` |
Updates `actions/checkout` from 4.1.2 to 4.1.3
- [Release notes](https://github.com/actions/checkout/releases)
- [Changelog](https://github.com/actions/checkout/blob/main/CHANGELOG.md)
- [Commits](https://github.com/actions/checkout/compare/9bb56186c3b09b4f86b1c65136769dd318469633...1d96c772d19495a3b5c517cd2bc0cb401ea0529f)
Updates `actions/upload-artifact` from 4.3.1 to 4.3.2
- [Release notes](https://github.com/actions/upload-artifact/releases)
- [Commits](https://github.com/actions/upload-artifact/compare/5d5d22a31266ced268874388b861e4b58bb5c2f3...1746f4ab65b179e0ea60a494b83293b640dd5bba)
Updates `azure/setup-helm` from 4.1.0 to 4.2.0
- [Release notes](https://github.com/azure/setup-helm/releases)
- [Changelog](https://github.com/Azure/setup-helm/blob/main/CHANGELOG.md)
- [Commits](https://github.com/azure/setup-helm/compare/b7246b12e77f7134dc2d460a3d5bad15bbe29390...fe7b79cd5ee1e45176fcad797de68ecaf3ca4814)
Updates `actions/download-artifact` from 4.1.4 to 4.1.5
- [Release notes](https://github.com/actions/download-artifact/releases)
- [Commits](https://github.com/actions/download-artifact/compare/c850b930e6ba138125429b7e5c93fc707a7f8427...8caf195ad4b1dee92908e23f56eeb0696f1dd42d)
Updates `github/codeql-action` from 3.24.10 to 3.25.1
- [Release notes](https://github.com/github/codeql-action/releases)
- [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md)
- [Commits](https://github.com/github/codeql-action/compare/4355270be187e1b672a7a1c7c7bae5afdc1ab94a...c7f9125735019aa87cfc361530512d50ea439c71)
---
updated-dependencies:
- dependency-name: actions/checkout
dependency-type: direct:production
update-type: version-update:semver-patch
dependency-group: all
- dependency-name: actions/upload-artifact
dependency-type: direct:production
update-type: version-update:semver-patch
dependency-group: all
- dependency-name: azure/setup-helm
dependency-type: direct:production
update-type: version-update:semver-minor
dependency-group: all
- dependency-name: actions/download-artifact
dependency-type: direct:production
update-type: version-update:semver-patch
dependency-group: all
- dependency-name: github/codeql-action
dependency-type: direct:production
update-type: version-update:semver-minor
dependency-group: all
...
Signed-off-by: dependabot[bot]
---
.github/workflows/ci.yaml | 16 ++++++++--------
.github/workflows/depreview.yaml | 2 +-
.github/workflows/docs.yaml | 4 ++--
.github/workflows/golangci-lint.yml | 2 +-
.github/workflows/helm.yaml | 4 ++--
.github/workflows/images.yaml | 8 ++++----
.github/workflows/perftest.yaml | 2 +-
.github/workflows/plugin.yaml | 2 +-
.github/workflows/scorecards.yml | 6 +++---
.github/workflows/vulnerability-scans.yaml | 6 +++---
.github/workflows/zz-tmpl-images.yaml | 6 +++---
.github/workflows/zz-tmpl-k8s-e2e.yaml | 6 +++---
12 files changed, 32 insertions(+), 32 deletions(-)
diff --git a/.github/workflows/ci.yaml b/.github/workflows/ci.yaml
index e7f2da325..a3d0e3187 100644
--- a/.github/workflows/ci.yaml
+++ b/.github/workflows/ci.yaml
@@ -47,7 +47,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
+ uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
- uses: dorny/paths-filter@de90cc6fb38fc0963ad72b210f1f284cd68cea36 # v3.0.2
id: filter
@@ -77,7 +77,7 @@ jobs:
(needs.changes.outputs.go == 'true')
steps:
- name: Checkout
- uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
+ uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
- name: Get go version
run: echo "GOLANG_VERSION=$(cat GOLANG_VERSION)" >> $GITHUB_ENV
@@ -105,7 +105,7 @@ jobs:
PLATFORMS: linux/amd64
steps:
- name: Checkout
- uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
+ uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
- name: Get go version
id: golangversion
@@ -163,7 +163,7 @@ jobs:
| gzip > docker.tar.gz
- name: cache
- uses: actions/upload-artifact@5d5d22a31266ced268874388b861e4b58bb5c2f3 # v4.3.1
+ uses: actions/upload-artifact@1746f4ab65b179e0ea60a494b83293b640dd5bba # v4.3.2
with:
name: docker.tar.gz
path: docker.tar.gz
@@ -179,12 +179,12 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
+ uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
with:
fetch-depth: 0
- name: Set up Helm
- uses: azure/setup-helm@b7246b12e77f7134dc2d460a3d5bad15bbe29390 # v4.1.0
+ uses: azure/setup-helm@fe7b79cd5ee1e45176fcad797de68ecaf3ca4814 # v4.2.0
- uses: actions/setup-python@82c7e631bb3cdc910f68e0081d67478d79c6982d # v5.1.0
with:
@@ -239,7 +239,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
+ uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
- name: Setup Go
uses: actions/setup-go@0c52d547c9bc32b1aa3301fd7a9cb496313a4491 # v5.0.0
@@ -248,7 +248,7 @@ jobs:
check-latest: true
- name: cache
- uses: actions/download-artifact@c850b930e6ba138125429b7e5c93fc707a7f8427 # v4.1.4
+ uses: actions/download-artifact@8caf195ad4b1dee92908e23f56eeb0696f1dd42d # v4.1.5
with:
name: docker.tar.gz
diff --git a/.github/workflows/depreview.yaml b/.github/workflows/depreview.yaml
index 3b553afd4..bfe5ba55b 100644
--- a/.github/workflows/depreview.yaml
+++ b/.github/workflows/depreview.yaml
@@ -9,6 +9,6 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: 'Checkout Repository'
- uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
+ uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
- name: 'Dependency Review'
uses: actions/dependency-review-action@5bbc3ba658137598168acb2ab73b21c432dd411b # v4.2.5
diff --git a/.github/workflows/docs.yaml b/.github/workflows/docs.yaml
index d6182ec9c..740b76f79 100644
--- a/.github/workflows/docs.yaml
+++ b/.github/workflows/docs.yaml
@@ -23,7 +23,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
+ uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
- uses: dorny/paths-filter@de90cc6fb38fc0963ad72b210f1f284cd68cea36 # v3.0.2
id: filter
@@ -47,7 +47,7 @@ jobs:
steps:
- name: Checkout master
- uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
+ uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
- name: Deploy
uses: ./.github/actions/mkdocs
diff --git a/.github/workflows/golangci-lint.yml b/.github/workflows/golangci-lint.yml
index d287061d5..02ebcaa38 100644
--- a/.github/workflows/golangci-lint.yml
+++ b/.github/workflows/golangci-lint.yml
@@ -15,7 +15,7 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Checkout
- uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
+ uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
- name: Get go version
run: echo "GOLANG_VERSION=$(cat GOLANG_VERSION)" >> $GITHUB_ENV
diff --git a/.github/workflows/helm.yaml b/.github/workflows/helm.yaml
index af8d91e1f..e6383c682 100644
--- a/.github/workflows/helm.yaml
+++ b/.github/workflows/helm.yaml
@@ -25,7 +25,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
+ uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
- name: Run Artifact Hub lint
run: |
@@ -64,7 +64,7 @@ jobs:
steps:
- name: Checkout master
- uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
+ uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
with:
# Fetch entire history. Required for chart-releaser; see https://github.com/helm/chart-releaser-action/issues/13#issuecomment-602063896
fetch-depth: 0
diff --git a/.github/workflows/images.yaml b/.github/workflows/images.yaml
index 28bbf6692..3e9cbcbae 100644
--- a/.github/workflows/images.yaml
+++ b/.github/workflows/images.yaml
@@ -41,7 +41,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
+ uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
- uses: dorny/paths-filter@de90cc6fb38fc0963ad72b210f1f284cd68cea36 # v3.0.2
id: filter
with:
@@ -144,7 +144,7 @@ jobs:
k8s: [v1.26.14, v1.27.11, v1.28.7, v1.29.2]
steps:
- name: Checkout
- uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
+ uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
- name: Get go version
run: echo "GOLANG_VERSION=$(cat GOLANG_VERSION)" >> $GITHUB_ENV
@@ -178,7 +178,7 @@ jobs:
nginx: ['1.25.3', '1.21.6']
steps:
- name: Checkout
- uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
+ uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
- name: image build
run: |
cd images/opentelemetry && make NGINX_VERSION=${{ matrix.nginx }} build
@@ -195,7 +195,7 @@ jobs:
PLATFORMS: linux/amd64,linux/arm,linux/arm64,linux/s390x
steps:
- name: Checkout
- uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
+ uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
- name: Set up QEMU
uses: docker/setup-qemu-action@68827325e0b33c7199eb31dd4e31fbe9023e06e3 # v3.0.0
- name: Set up Docker Buildx
diff --git a/.github/workflows/perftest.yaml b/.github/workflows/perftest.yaml
index 3650e7263..87c828380 100644
--- a/.github/workflows/perftest.yaml
+++ b/.github/workflows/perftest.yaml
@@ -19,7 +19,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
+ uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
- name: Install K6
run: |
diff --git a/.github/workflows/plugin.yaml b/.github/workflows/plugin.yaml
index a074eaa5b..def284a39 100644
--- a/.github/workflows/plugin.yaml
+++ b/.github/workflows/plugin.yaml
@@ -12,7 +12,7 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Checkout
- uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
+ uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
with:
fetch-depth: 0
diff --git a/.github/workflows/scorecards.yml b/.github/workflows/scorecards.yml
index d00db6ba3..e4a404ef8 100644
--- a/.github/workflows/scorecards.yml
+++ b/.github/workflows/scorecards.yml
@@ -27,7 +27,7 @@ jobs:
steps:
- name: "Checkout code"
- uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
+ uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
with:
persist-credentials: false
@@ -51,7 +51,7 @@ jobs:
# Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF
# format to the repository Actions tab.
- name: "Upload artifact"
- uses: actions/upload-artifact@5d5d22a31266ced268874388b861e4b58bb5c2f3 # v4.3.1
+ uses: actions/upload-artifact@1746f4ab65b179e0ea60a494b83293b640dd5bba # v4.3.2
with:
name: SARIF file
path: results.sarif
@@ -59,6 +59,6 @@ jobs:
# Upload the results to GitHub's code scanning dashboard.
- name: "Upload to code-scanning"
- uses: github/codeql-action/upload-sarif@4355270be187e1b672a7a1c7c7bae5afdc1ab94a # v3.24.10
+ uses: github/codeql-action/upload-sarif@c7f9125735019aa87cfc361530512d50ea439c71 # v3.25.1
with:
sarif_file: results.sarif
diff --git a/.github/workflows/vulnerability-scans.yaml b/.github/workflows/vulnerability-scans.yaml
index 3a34541a5..e0c1d838b 100644
--- a/.github/workflows/vulnerability-scans.yaml
+++ b/.github/workflows/vulnerability-scans.yaml
@@ -22,7 +22,7 @@ jobs:
versions: ${{ steps.version.outputs.TAGS }}
steps:
- name: Checkout code
- uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
+ uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
with:
fetch-depth: 0
@@ -52,7 +52,7 @@ jobs:
versions: ${{ fromJSON(needs.version.outputs.versions) }}
steps:
- name: Checkout code
- uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
+ uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
- shell: bash
id: test
@@ -75,7 +75,7 @@ jobs:
# This step checks out a copy of your repository.
- name: Upload SARIF file
- uses: github/codeql-action/upload-sarif@4355270be187e1b672a7a1c7c7bae5afdc1ab94a # v3.24.10
+ uses: github/codeql-action/upload-sarif@c7f9125735019aa87cfc361530512d50ea439c71 # v3.25.1
with:
token: ${{ github.token }}
# Path to SARIF file relative to the root of the repository
diff --git a/.github/workflows/zz-tmpl-images.yaml b/.github/workflows/zz-tmpl-images.yaml
index e8fa4f472..819a88cd4 100644
--- a/.github/workflows/zz-tmpl-images.yaml
+++ b/.github/workflows/zz-tmpl-images.yaml
@@ -31,7 +31,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
+ uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
- uses: dorny/paths-filter@de90cc6fb38fc0963ad72b210f1f284cd68cea36 # v3.0.2
id: filter
with:
@@ -48,7 +48,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
+ uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
- name: Build
run: |
@@ -67,7 +67,7 @@ jobs:
PLATFORMS: ${{ inputs.platforms-publish }}
steps:
- name: Checkout
- uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
+ uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
- name: Login to GitHub Container Registry
uses: docker/login-action@e92390c5fb421da1463c202d546fed0ec5c39f20 # v3.1.0
diff --git a/.github/workflows/zz-tmpl-k8s-e2e.yaml b/.github/workflows/zz-tmpl-k8s-e2e.yaml
index ad03bf0a1..ab2ec536a 100644
--- a/.github/workflows/zz-tmpl-k8s-e2e.yaml
+++ b/.github/workflows/zz-tmpl-k8s-e2e.yaml
@@ -20,10 +20,10 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
+ uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
- name: cache
- uses: actions/download-artifact@c850b930e6ba138125429b7e5c93fc707a7f8427 # v4.1.4
+ uses: actions/download-artifact@8caf195ad4b1dee92908e23f56eeb0696f1dd42d # v4.1.5
with:
name: docker.tar.gz
@@ -50,7 +50,7 @@ jobs:
make kind-e2e-test
- name: Upload e2e junit-reports ${{ inputs.variation }}
- uses: actions/upload-artifact@5d5d22a31266ced268874388b861e4b58bb5c2f3 # v4.3.1
+ uses: actions/upload-artifact@1746f4ab65b179e0ea60a494b83293b640dd5bba # v4.3.2
if: success() || failure()
with:
name: e2e-test-reports-${{ inputs.k8s-version }}${{ inputs.variation }}
From 7379b804594c32e92410e31555030fa22eddf93c Mon Sep 17 00:00:00 2001
From: cuiyourong <166382782+cuiyourong@users.noreply.github.com>
Date: Tue, 23 Apr 2024 19:27:06 +0800
Subject: [PATCH 046/283] Fix function name in comment (#11296)
Signed-off-by: cuiyourong
---
internal/ingress/annotations/parser/validators.go | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/internal/ingress/annotations/parser/validators.go b/internal/ingress/annotations/parser/validators.go
index 64a9d133d..ffb4d9ba9 100644
--- a/internal/ingress/annotations/parser/validators.go
+++ b/internal/ingress/annotations/parser/validators.go
@@ -190,7 +190,7 @@ func ValidateServiceName(value string) error {
return nil
}
-// checkAnnotations will check each annotation for:
+// checkAnnotation will check each annotation for:
// 1 - Does it contain the internal validation and docs config?
// 2 - Does the ingress contains annotations? (validate null pointers)
// 3 - Does it contains a validator? Should it contain a validator (not containing is a bug!)
From 51847ac1b537c547cdb7bfb06d14e6d3d8476a73 Mon Sep 17 00:00:00 2001
From: James Strong
Date: Tue, 23 Apr 2024 09:44:12 -0400
Subject: [PATCH 047/283] Release controller 1.10.1 (#11253)
Signed-off-by: James Strong
---
README.md | 1 +
changelog/controller-1.10.1.md | 57 +++++++++++++++++++
deploy/static/provider/aws/deploy.yaml | 48 ++++++++--------
.../aws/nlb-with-tls-termination/deploy.yaml | 48 ++++++++--------
deploy/static/provider/baremetal/deploy.yaml | 48 ++++++++--------
deploy/static/provider/cloud/deploy.yaml | 48 ++++++++--------
deploy/static/provider/do/deploy.yaml | 48 ++++++++--------
deploy/static/provider/exoscale/deploy.yaml | 48 ++++++++--------
deploy/static/provider/kind/deploy.yaml | 48 ++++++++--------
deploy/static/provider/oracle/deploy.yaml | 48 ++++++++--------
deploy/static/provider/scw/deploy.yaml | 48 ++++++++--------
docs/deploy/index.md | 20 +++----
docs/e2e-tests.md | 4 ++
13 files changed, 288 insertions(+), 226 deletions(-)
create mode 100644 changelog/controller-1.10.1.md
diff --git a/README.md b/README.md
index 80725aa82..b0969fdbd 100644
--- a/README.md
+++ b/README.md
@@ -38,6 +38,7 @@ the versions listed. Ingress-Nginx versions **may** work on older versions, but
| Supported | Ingress-NGINX version | k8s supported version | Alpine Version | Nginx Version | Helm Chart Version |
|:--:|-----------------------|------------------------------|----------------|---------------|------------------------------|
+| 🔄 | **v1.10.1** | 1.29, 1.28, 1.27, 1.26 | 3.19.1 | 1.25.3 | 4.10.1* |
| 🔄 | **v1.10.0** | 1.29, 1.28, 1.27, 1.26 | 3.19.1 | 1.25.3 | 4.10.0* |
| 🔄 | **v1.9.6** | 1.29, 1.28, 1.27, 1.26, 1.25 | 3.19.0 | 1.21.6 | 4.9.1* |
| 🔄 | **v1.9.5** | 1.28, 1.27, 1.26, 1.25 | 3.18.4 | 1.21.6 | 4.9.0* |
diff --git a/changelog/controller-1.10.1.md b/changelog/controller-1.10.1.md
new file mode 100644
index 000000000..40fc321fa
--- /dev/null
+++ b/changelog/controller-1.10.1.md
@@ -0,0 +1,57 @@
+# Changelog
+
+### controller-v1.10.1
+
+Images:
+
+* registry.k8s.io/ingress-nginx/controller:v1.10.1@sha256:e24f39d3eed6bcc239a56f20098878845f62baa34b9f2be2fd2c38ce9fb0f29e
+* registry.k8s.io/ingress-nginx/controller-chroot:v1.10.1@sha256:c155954116b397163c88afcb3252462771bd7867017e8a17623e83601bab7ac7
+
+### All changes:
+
+* start 1.10.1 build (#11246)
+* force nginx rebuild (#11245)
+* update k8s version to latest kind release (#11241)
+* remove _ssl_expire_time_seconds metric by identifier (#11239)
+* update post submit helm ci and clean up (#11221)
+* Chart: Add unit tests for default backend & topology spread constraints. (#11219)
+* sort default backend hpa metrics (#11217)
+* updated certgen image shatag (#11216)
+* changed testrunner image sha (#11211)
+* bumped certgeimage tag (#11213)
+* updated baseimage & deleted a useless file (#11209)
+* bump ginkgo to 2-17-1 in testrunner (#11204)
+* chunking related faq update (#11205)
+* Fix-semver (#11199)
+* refactor helm ci tests part I (#11188)
+* Proposal: e2e tests for regex patterns (#11185)
+* bump ginkgo to v2.17.1 (#11186)
+* fixes brotli build issue (#11187)
+* fix geoip2 configuration docs (#11151)
+* Fix typos in OTel doc (#11081) (#11129)
+* Chart: Render `controller.ingressClassResource.parameters` natively. (#11126)
+* Fix admission controller logging of `admissionTime` and `testedConfigurationSize` (#11114)
+* Chart: Align HPA & KEDA conditions. (#11113)
+* Chart: Improve IngressClass documentation. (#11111)
+* Chart: Add Gacko to maintainers. Again. (#11112)
+* Chart: Deploy `PodDisruptionBudget` with KEDA. (#11105)
+* Chores: Pick patches from main. (#11103)
+
+### Dependency updates:
+
+* Bump google.golang.org/grpc from 1.63.0 to 1.63.2 (#11238)
+* Bump google.golang.org/grpc from 1.62.1 to 1.63.0 (#11234)
+* Bump github.com/prometheus/common from 0.51.1 to 0.52.2 (#11233)
+* Bump golang.org/x/crypto from 0.21.0 to 0.22.0 (#11232)
+* Bump github.com/prometheus/client_model in the all group (#11231)
+* Bump the all group with 3 updates (#11230)
+* Bump the all group with 2 updates (#11190)
+* Bump actions/add-to-project from 0.6.1 to 1.0.0 (#11189)
+* Bump the all group with 3 updates (#11166)
+* Bump github.com/prometheus/common from 0.50.0 to 0.51.1 (#11160)
+* Bump the all group with 4 updates (#11140)
+* Bump the all group with 1 update (#11136)
+* Bump google.golang.org/protobuf from 1.32.0 to 1.33.0 in /magefiles (#11127)
+* Bump google.golang.org/protobuf in /images/custom-error-pages/rootfs (#11128)
+* Bump google.golang.org/protobuf in /images/kube-webhook-certgen/rootfs (#11122)
+
diff --git a/deploy/static/provider/aws/deploy.yaml b/deploy/static/provider/aws/deploy.yaml
index 0e8356305..4b24f36c3 100644
--- a/deploy/static/provider/aws/deploy.yaml
+++ b/deploy/static/provider/aws/deploy.yaml
@@ -15,7 +15,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
namespace: ingress-nginx
---
@@ -27,7 +27,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
namespace: ingress-nginx
---
@@ -39,7 +39,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
namespace: ingress-nginx
rules:
@@ -129,7 +129,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
namespace: ingress-nginx
rules:
@@ -148,7 +148,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
rules:
- apiGroups:
@@ -230,7 +230,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
rules:
- apiGroups:
@@ -249,7 +249,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
namespace: ingress-nginx
roleRef:
@@ -269,7 +269,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
namespace: ingress-nginx
roleRef:
@@ -288,7 +288,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -307,7 +307,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -328,7 +328,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller
namespace: ingress-nginx
---
@@ -344,7 +344,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -377,7 +377,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller-admission
namespace: ingress-nginx
spec:
@@ -400,7 +400,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -422,7 +422,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
spec:
containers:
- args:
@@ -447,7 +447,7 @@ spec:
fieldPath: metadata.namespace
- name: LD_PRELOAD
value: /usr/local/lib/libmimalloc.so
- image: registry.k8s.io/ingress-nginx/controller:v1.10.0@sha256:42b3f0e5d0846876b1791cd3afeb5f1cbbe4259d6f35651dcc1b5c980925379c
+ image: registry.k8s.io/ingress-nginx/controller:v1.10.1@sha256:e24f39d3eed6bcc239a56f20098878845f62baa34b9f2be2fd2c38ce9fb0f29e
imagePullPolicy: IfNotPresent
lifecycle:
preStop:
@@ -523,7 +523,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-create
namespace: ingress-nginx
spec:
@@ -534,7 +534,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-create
spec:
containers:
@@ -548,7 +548,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.0@sha256:44d1d0e9f19c63f58b380c5fddaca7cf22c7cee564adeff365225a5df5ef3334
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
imagePullPolicy: IfNotPresent
name: create
securityContext:
@@ -574,7 +574,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-patch
namespace: ingress-nginx
spec:
@@ -585,7 +585,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-patch
spec:
containers:
@@ -601,7 +601,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.0@sha256:44d1d0e9f19c63f58b380c5fddaca7cf22c7cee564adeff365225a5df5ef3334
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
imagePullPolicy: IfNotPresent
name: patch
securityContext:
@@ -627,7 +627,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: nginx
spec:
controller: k8s.io/ingress-nginx
@@ -640,7 +640,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
webhooks:
- admissionReviewVersions:
diff --git a/deploy/static/provider/aws/nlb-with-tls-termination/deploy.yaml b/deploy/static/provider/aws/nlb-with-tls-termination/deploy.yaml
index 5c12ba3b9..4f37dd89b 100644
--- a/deploy/static/provider/aws/nlb-with-tls-termination/deploy.yaml
+++ b/deploy/static/provider/aws/nlb-with-tls-termination/deploy.yaml
@@ -15,7 +15,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
namespace: ingress-nginx
---
@@ -27,7 +27,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
namespace: ingress-nginx
---
@@ -39,7 +39,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
namespace: ingress-nginx
rules:
@@ -129,7 +129,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
namespace: ingress-nginx
rules:
@@ -148,7 +148,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
rules:
- apiGroups:
@@ -230,7 +230,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
rules:
- apiGroups:
@@ -249,7 +249,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
namespace: ingress-nginx
roleRef:
@@ -269,7 +269,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
namespace: ingress-nginx
roleRef:
@@ -288,7 +288,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -307,7 +307,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -335,7 +335,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller
namespace: ingress-nginx
---
@@ -353,7 +353,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -386,7 +386,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller-admission
namespace: ingress-nginx
spec:
@@ -409,7 +409,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -431,7 +431,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
spec:
containers:
- args:
@@ -456,7 +456,7 @@ spec:
fieldPath: metadata.namespace
- name: LD_PRELOAD
value: /usr/local/lib/libmimalloc.so
- image: registry.k8s.io/ingress-nginx/controller:v1.10.0@sha256:42b3f0e5d0846876b1791cd3afeb5f1cbbe4259d6f35651dcc1b5c980925379c
+ image: registry.k8s.io/ingress-nginx/controller:v1.10.1@sha256:e24f39d3eed6bcc239a56f20098878845f62baa34b9f2be2fd2c38ce9fb0f29e
imagePullPolicy: IfNotPresent
lifecycle:
preStop:
@@ -535,7 +535,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-create
namespace: ingress-nginx
spec:
@@ -546,7 +546,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-create
spec:
containers:
@@ -560,7 +560,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.0@sha256:44d1d0e9f19c63f58b380c5fddaca7cf22c7cee564adeff365225a5df5ef3334
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
imagePullPolicy: IfNotPresent
name: create
securityContext:
@@ -586,7 +586,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-patch
namespace: ingress-nginx
spec:
@@ -597,7 +597,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-patch
spec:
containers:
@@ -613,7 +613,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.0@sha256:44d1d0e9f19c63f58b380c5fddaca7cf22c7cee564adeff365225a5df5ef3334
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
imagePullPolicy: IfNotPresent
name: patch
securityContext:
@@ -639,7 +639,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: nginx
spec:
controller: k8s.io/ingress-nginx
@@ -652,7 +652,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
webhooks:
- admissionReviewVersions:
diff --git a/deploy/static/provider/baremetal/deploy.yaml b/deploy/static/provider/baremetal/deploy.yaml
index b513fa97f..6e2ab95b7 100644
--- a/deploy/static/provider/baremetal/deploy.yaml
+++ b/deploy/static/provider/baremetal/deploy.yaml
@@ -15,7 +15,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
namespace: ingress-nginx
---
@@ -27,7 +27,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
namespace: ingress-nginx
---
@@ -39,7 +39,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
namespace: ingress-nginx
rules:
@@ -129,7 +129,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
namespace: ingress-nginx
rules:
@@ -148,7 +148,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
rules:
- apiGroups:
@@ -230,7 +230,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
rules:
- apiGroups:
@@ -249,7 +249,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
namespace: ingress-nginx
roleRef:
@@ -269,7 +269,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
namespace: ingress-nginx
roleRef:
@@ -288,7 +288,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -307,7 +307,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -328,7 +328,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller
namespace: ingress-nginx
---
@@ -340,7 +340,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -372,7 +372,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller-admission
namespace: ingress-nginx
spec:
@@ -395,7 +395,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -417,7 +417,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
spec:
containers:
- args:
@@ -441,7 +441,7 @@ spec:
fieldPath: metadata.namespace
- name: LD_PRELOAD
value: /usr/local/lib/libmimalloc.so
- image: registry.k8s.io/ingress-nginx/controller:v1.10.0@sha256:42b3f0e5d0846876b1791cd3afeb5f1cbbe4259d6f35651dcc1b5c980925379c
+ image: registry.k8s.io/ingress-nginx/controller:v1.10.1@sha256:e24f39d3eed6bcc239a56f20098878845f62baa34b9f2be2fd2c38ce9fb0f29e
imagePullPolicy: IfNotPresent
lifecycle:
preStop:
@@ -517,7 +517,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-create
namespace: ingress-nginx
spec:
@@ -528,7 +528,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-create
spec:
containers:
@@ -542,7 +542,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.0@sha256:44d1d0e9f19c63f58b380c5fddaca7cf22c7cee564adeff365225a5df5ef3334
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
imagePullPolicy: IfNotPresent
name: create
securityContext:
@@ -568,7 +568,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-patch
namespace: ingress-nginx
spec:
@@ -579,7 +579,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-patch
spec:
containers:
@@ -595,7 +595,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.0@sha256:44d1d0e9f19c63f58b380c5fddaca7cf22c7cee564adeff365225a5df5ef3334
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
imagePullPolicy: IfNotPresent
name: patch
securityContext:
@@ -621,7 +621,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: nginx
spec:
controller: k8s.io/ingress-nginx
@@ -634,7 +634,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
webhooks:
- admissionReviewVersions:
diff --git a/deploy/static/provider/cloud/deploy.yaml b/deploy/static/provider/cloud/deploy.yaml
index 147d76d5e..6164992df 100644
--- a/deploy/static/provider/cloud/deploy.yaml
+++ b/deploy/static/provider/cloud/deploy.yaml
@@ -15,7 +15,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
namespace: ingress-nginx
---
@@ -27,7 +27,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
namespace: ingress-nginx
---
@@ -39,7 +39,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
namespace: ingress-nginx
rules:
@@ -129,7 +129,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
namespace: ingress-nginx
rules:
@@ -148,7 +148,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
rules:
- apiGroups:
@@ -230,7 +230,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
rules:
- apiGroups:
@@ -249,7 +249,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
namespace: ingress-nginx
roleRef:
@@ -269,7 +269,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
namespace: ingress-nginx
roleRef:
@@ -288,7 +288,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -307,7 +307,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -328,7 +328,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller
namespace: ingress-nginx
---
@@ -340,7 +340,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -373,7 +373,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller-admission
namespace: ingress-nginx
spec:
@@ -396,7 +396,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -418,7 +418,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
spec:
containers:
- args:
@@ -443,7 +443,7 @@ spec:
fieldPath: metadata.namespace
- name: LD_PRELOAD
value: /usr/local/lib/libmimalloc.so
- image: registry.k8s.io/ingress-nginx/controller:v1.10.0@sha256:42b3f0e5d0846876b1791cd3afeb5f1cbbe4259d6f35651dcc1b5c980925379c
+ image: registry.k8s.io/ingress-nginx/controller:v1.10.1@sha256:e24f39d3eed6bcc239a56f20098878845f62baa34b9f2be2fd2c38ce9fb0f29e
imagePullPolicy: IfNotPresent
lifecycle:
preStop:
@@ -519,7 +519,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-create
namespace: ingress-nginx
spec:
@@ -530,7 +530,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-create
spec:
containers:
@@ -544,7 +544,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.0@sha256:44d1d0e9f19c63f58b380c5fddaca7cf22c7cee564adeff365225a5df5ef3334
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
imagePullPolicy: IfNotPresent
name: create
securityContext:
@@ -570,7 +570,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-patch
namespace: ingress-nginx
spec:
@@ -581,7 +581,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-patch
spec:
containers:
@@ -597,7 +597,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.0@sha256:44d1d0e9f19c63f58b380c5fddaca7cf22c7cee564adeff365225a5df5ef3334
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
imagePullPolicy: IfNotPresent
name: patch
securityContext:
@@ -623,7 +623,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: nginx
spec:
controller: k8s.io/ingress-nginx
@@ -636,7 +636,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
webhooks:
- admissionReviewVersions:
diff --git a/deploy/static/provider/do/deploy.yaml b/deploy/static/provider/do/deploy.yaml
index 801b6d75c..53fef52bb 100644
--- a/deploy/static/provider/do/deploy.yaml
+++ b/deploy/static/provider/do/deploy.yaml
@@ -15,7 +15,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
namespace: ingress-nginx
---
@@ -27,7 +27,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
namespace: ingress-nginx
---
@@ -39,7 +39,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
namespace: ingress-nginx
rules:
@@ -129,7 +129,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
namespace: ingress-nginx
rules:
@@ -148,7 +148,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
rules:
- apiGroups:
@@ -230,7 +230,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
rules:
- apiGroups:
@@ -249,7 +249,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
namespace: ingress-nginx
roleRef:
@@ -269,7 +269,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
namespace: ingress-nginx
roleRef:
@@ -288,7 +288,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -307,7 +307,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -329,7 +329,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller
namespace: ingress-nginx
---
@@ -343,7 +343,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -376,7 +376,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller-admission
namespace: ingress-nginx
spec:
@@ -399,7 +399,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -421,7 +421,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
spec:
containers:
- args:
@@ -446,7 +446,7 @@ spec:
fieldPath: metadata.namespace
- name: LD_PRELOAD
value: /usr/local/lib/libmimalloc.so
- image: registry.k8s.io/ingress-nginx/controller:v1.10.0@sha256:42b3f0e5d0846876b1791cd3afeb5f1cbbe4259d6f35651dcc1b5c980925379c
+ image: registry.k8s.io/ingress-nginx/controller:v1.10.1@sha256:e24f39d3eed6bcc239a56f20098878845f62baa34b9f2be2fd2c38ce9fb0f29e
imagePullPolicy: IfNotPresent
lifecycle:
preStop:
@@ -522,7 +522,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-create
namespace: ingress-nginx
spec:
@@ -533,7 +533,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-create
spec:
containers:
@@ -547,7 +547,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.0@sha256:44d1d0e9f19c63f58b380c5fddaca7cf22c7cee564adeff365225a5df5ef3334
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
imagePullPolicy: IfNotPresent
name: create
securityContext:
@@ -573,7 +573,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-patch
namespace: ingress-nginx
spec:
@@ -584,7 +584,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-patch
spec:
containers:
@@ -600,7 +600,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.0@sha256:44d1d0e9f19c63f58b380c5fddaca7cf22c7cee564adeff365225a5df5ef3334
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
imagePullPolicy: IfNotPresent
name: patch
securityContext:
@@ -626,7 +626,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: nginx
spec:
controller: k8s.io/ingress-nginx
@@ -639,7 +639,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
webhooks:
- admissionReviewVersions:
diff --git a/deploy/static/provider/exoscale/deploy.yaml b/deploy/static/provider/exoscale/deploy.yaml
index 79d945a53..26c28258a 100644
--- a/deploy/static/provider/exoscale/deploy.yaml
+++ b/deploy/static/provider/exoscale/deploy.yaml
@@ -15,7 +15,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
namespace: ingress-nginx
---
@@ -27,7 +27,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
namespace: ingress-nginx
---
@@ -39,7 +39,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
namespace: ingress-nginx
rules:
@@ -129,7 +129,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
namespace: ingress-nginx
rules:
@@ -148,7 +148,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
rules:
- apiGroups:
@@ -230,7 +230,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
rules:
- apiGroups:
@@ -249,7 +249,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
namespace: ingress-nginx
roleRef:
@@ -269,7 +269,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
namespace: ingress-nginx
roleRef:
@@ -288,7 +288,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -307,7 +307,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -328,7 +328,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller
namespace: ingress-nginx
---
@@ -349,7 +349,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -382,7 +382,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller-admission
namespace: ingress-nginx
spec:
@@ -405,7 +405,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -423,7 +423,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
spec:
containers:
- args:
@@ -448,7 +448,7 @@ spec:
fieldPath: metadata.namespace
- name: LD_PRELOAD
value: /usr/local/lib/libmimalloc.so
- image: registry.k8s.io/ingress-nginx/controller:v1.10.0@sha256:42b3f0e5d0846876b1791cd3afeb5f1cbbe4259d6f35651dcc1b5c980925379c
+ image: registry.k8s.io/ingress-nginx/controller:v1.10.1@sha256:e24f39d3eed6bcc239a56f20098878845f62baa34b9f2be2fd2c38ce9fb0f29e
imagePullPolicy: IfNotPresent
lifecycle:
preStop:
@@ -528,7 +528,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-create
namespace: ingress-nginx
spec:
@@ -539,7 +539,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-create
spec:
containers:
@@ -553,7 +553,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.0@sha256:44d1d0e9f19c63f58b380c5fddaca7cf22c7cee564adeff365225a5df5ef3334
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
imagePullPolicy: IfNotPresent
name: create
securityContext:
@@ -579,7 +579,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-patch
namespace: ingress-nginx
spec:
@@ -590,7 +590,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-patch
spec:
containers:
@@ -606,7 +606,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.0@sha256:44d1d0e9f19c63f58b380c5fddaca7cf22c7cee564adeff365225a5df5ef3334
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
imagePullPolicy: IfNotPresent
name: patch
securityContext:
@@ -632,7 +632,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: nginx
spec:
controller: k8s.io/ingress-nginx
@@ -645,7 +645,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
webhooks:
- admissionReviewVersions:
diff --git a/deploy/static/provider/kind/deploy.yaml b/deploy/static/provider/kind/deploy.yaml
index 4963253c1..d65e2cf39 100644
--- a/deploy/static/provider/kind/deploy.yaml
+++ b/deploy/static/provider/kind/deploy.yaml
@@ -15,7 +15,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
namespace: ingress-nginx
---
@@ -27,7 +27,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
namespace: ingress-nginx
---
@@ -39,7 +39,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
namespace: ingress-nginx
rules:
@@ -129,7 +129,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
namespace: ingress-nginx
rules:
@@ -148,7 +148,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
rules:
- apiGroups:
@@ -230,7 +230,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
rules:
- apiGroups:
@@ -249,7 +249,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
namespace: ingress-nginx
roleRef:
@@ -269,7 +269,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
namespace: ingress-nginx
roleRef:
@@ -288,7 +288,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -307,7 +307,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -328,7 +328,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller
namespace: ingress-nginx
---
@@ -340,7 +340,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -372,7 +372,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller-admission
namespace: ingress-nginx
spec:
@@ -395,7 +395,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -417,7 +417,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
spec:
containers:
- args:
@@ -443,7 +443,7 @@ spec:
fieldPath: metadata.namespace
- name: LD_PRELOAD
value: /usr/local/lib/libmimalloc.so
- image: registry.k8s.io/ingress-nginx/controller:v1.10.0@sha256:42b3f0e5d0846876b1791cd3afeb5f1cbbe4259d6f35651dcc1b5c980925379c
+ image: registry.k8s.io/ingress-nginx/controller:v1.10.1@sha256:e24f39d3eed6bcc239a56f20098878845f62baa34b9f2be2fd2c38ce9fb0f29e
imagePullPolicy: IfNotPresent
lifecycle:
preStop:
@@ -529,7 +529,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-create
namespace: ingress-nginx
spec:
@@ -540,7 +540,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-create
spec:
containers:
@@ -554,7 +554,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.0@sha256:44d1d0e9f19c63f58b380c5fddaca7cf22c7cee564adeff365225a5df5ef3334
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
imagePullPolicy: IfNotPresent
name: create
securityContext:
@@ -580,7 +580,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-patch
namespace: ingress-nginx
spec:
@@ -591,7 +591,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-patch
spec:
containers:
@@ -607,7 +607,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.0@sha256:44d1d0e9f19c63f58b380c5fddaca7cf22c7cee564adeff365225a5df5ef3334
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
imagePullPolicy: IfNotPresent
name: patch
securityContext:
@@ -633,7 +633,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: nginx
spec:
controller: k8s.io/ingress-nginx
@@ -646,7 +646,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
webhooks:
- admissionReviewVersions:
diff --git a/deploy/static/provider/oracle/deploy.yaml b/deploy/static/provider/oracle/deploy.yaml
index 080c206a5..fd66689e6 100644
--- a/deploy/static/provider/oracle/deploy.yaml
+++ b/deploy/static/provider/oracle/deploy.yaml
@@ -15,7 +15,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
namespace: ingress-nginx
---
@@ -27,7 +27,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
namespace: ingress-nginx
---
@@ -39,7 +39,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
namespace: ingress-nginx
rules:
@@ -129,7 +129,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
namespace: ingress-nginx
rules:
@@ -148,7 +148,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
rules:
- apiGroups:
@@ -230,7 +230,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
rules:
- apiGroups:
@@ -249,7 +249,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
namespace: ingress-nginx
roleRef:
@@ -269,7 +269,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
namespace: ingress-nginx
roleRef:
@@ -288,7 +288,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -307,7 +307,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -328,7 +328,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller
namespace: ingress-nginx
---
@@ -344,7 +344,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -377,7 +377,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller-admission
namespace: ingress-nginx
spec:
@@ -400,7 +400,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -422,7 +422,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
spec:
containers:
- args:
@@ -447,7 +447,7 @@ spec:
fieldPath: metadata.namespace
- name: LD_PRELOAD
value: /usr/local/lib/libmimalloc.so
- image: registry.k8s.io/ingress-nginx/controller:v1.10.0@sha256:42b3f0e5d0846876b1791cd3afeb5f1cbbe4259d6f35651dcc1b5c980925379c
+ image: registry.k8s.io/ingress-nginx/controller:v1.10.1@sha256:e24f39d3eed6bcc239a56f20098878845f62baa34b9f2be2fd2c38ce9fb0f29e
imagePullPolicy: IfNotPresent
lifecycle:
preStop:
@@ -523,7 +523,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-create
namespace: ingress-nginx
spec:
@@ -534,7 +534,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-create
spec:
containers:
@@ -548,7 +548,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.0@sha256:44d1d0e9f19c63f58b380c5fddaca7cf22c7cee564adeff365225a5df5ef3334
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
imagePullPolicy: IfNotPresent
name: create
securityContext:
@@ -574,7 +574,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-patch
namespace: ingress-nginx
spec:
@@ -585,7 +585,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-patch
spec:
containers:
@@ -601,7 +601,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.0@sha256:44d1d0e9f19c63f58b380c5fddaca7cf22c7cee564adeff365225a5df5ef3334
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
imagePullPolicy: IfNotPresent
name: patch
securityContext:
@@ -627,7 +627,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: nginx
spec:
controller: k8s.io/ingress-nginx
@@ -640,7 +640,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
webhooks:
- admissionReviewVersions:
diff --git a/deploy/static/provider/scw/deploy.yaml b/deploy/static/provider/scw/deploy.yaml
index d98955d80..fbd7a330e 100644
--- a/deploy/static/provider/scw/deploy.yaml
+++ b/deploy/static/provider/scw/deploy.yaml
@@ -15,7 +15,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
namespace: ingress-nginx
---
@@ -27,7 +27,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
namespace: ingress-nginx
---
@@ -39,7 +39,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
namespace: ingress-nginx
rules:
@@ -129,7 +129,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
namespace: ingress-nginx
rules:
@@ -148,7 +148,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
rules:
- apiGroups:
@@ -230,7 +230,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
rules:
- apiGroups:
@@ -249,7 +249,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
namespace: ingress-nginx
roleRef:
@@ -269,7 +269,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
namespace: ingress-nginx
roleRef:
@@ -288,7 +288,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -307,7 +307,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -329,7 +329,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller
namespace: ingress-nginx
---
@@ -343,7 +343,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -376,7 +376,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller-admission
namespace: ingress-nginx
spec:
@@ -399,7 +399,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -421,7 +421,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
spec:
containers:
- args:
@@ -446,7 +446,7 @@ spec:
fieldPath: metadata.namespace
- name: LD_PRELOAD
value: /usr/local/lib/libmimalloc.so
- image: registry.k8s.io/ingress-nginx/controller:v1.10.0@sha256:42b3f0e5d0846876b1791cd3afeb5f1cbbe4259d6f35651dcc1b5c980925379c
+ image: registry.k8s.io/ingress-nginx/controller:v1.10.1@sha256:e24f39d3eed6bcc239a56f20098878845f62baa34b9f2be2fd2c38ce9fb0f29e
imagePullPolicy: IfNotPresent
lifecycle:
preStop:
@@ -522,7 +522,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-create
namespace: ingress-nginx
spec:
@@ -533,7 +533,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-create
spec:
containers:
@@ -547,7 +547,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.0@sha256:44d1d0e9f19c63f58b380c5fddaca7cf22c7cee564adeff365225a5df5ef3334
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
imagePullPolicy: IfNotPresent
name: create
securityContext:
@@ -573,7 +573,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-patch
namespace: ingress-nginx
spec:
@@ -584,7 +584,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission-patch
spec:
containers:
@@ -600,7 +600,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.0@sha256:44d1d0e9f19c63f58b380c5fddaca7cf22c7cee564adeff365225a5df5ef3334
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
imagePullPolicy: IfNotPresent
name: patch
securityContext:
@@ -626,7 +626,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: nginx
spec:
controller: k8s.io/ingress-nginx
@@ -639,7 +639,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.10.0
+ app.kubernetes.io/version: 1.10.1
name: ingress-nginx-admission
webhooks:
- admissionReviewVersions:
diff --git a/docs/deploy/index.md b/docs/deploy/index.md
index 4e6b71235..7232b6ffd 100644
--- a/docs/deploy/index.md
+++ b/docs/deploy/index.md
@@ -68,7 +68,7 @@ helm show values ingress-nginx --repo https://kubernetes.github.io/ingress-nginx
**If you don't have Helm** or if you prefer to use a YAML manifest, you can run the following command instead:
```console
-kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.10.0/deploy/static/provider/cloud/deploy.yaml
+kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.10.1/deploy/static/provider/cloud/deploy.yaml
```
!!! info
@@ -249,7 +249,7 @@ In AWS, we use a Network load balancer (NLB) to expose the Ingress-Nginx Control
##### Network Load Balancer (NLB)
```console
-kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.10.0/deploy/static/provider/aws/deploy.yaml
+kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.10.1/deploy/static/provider/aws/deploy.yaml
```
##### TLS termination in AWS Load Balancer (NLB)
@@ -257,10 +257,10 @@ kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/cont
By default, TLS is terminated in the ingress controller. But it is also possible to terminate TLS in the Load Balancer.
This section explains how to do that on AWS using an NLB.
-1. Download the [deploy.yaml](https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.10.0/deploy/static/provider/aws/nlb-with-tls-termination/deploy.yaml) template
+1. Download the [deploy.yaml](https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.10.1/deploy/static/provider/aws/nlb-with-tls-termination/deploy.yaml) template
```console
- wget https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.10.0/deploy/static/provider/aws/nlb-with-tls-termination/deploy.yaml
+ wget https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.10.1/deploy/static/provider/aws/nlb-with-tls-termination/deploy.yaml
```
2. Edit the file and change the VPC CIDR in use for the Kubernetes cluster:
@@ -306,7 +306,7 @@ Then, the ingress controller can be installed like this:
```console
-kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.10.0/deploy/static/provider/cloud/deploy.yaml
+kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.10.1/deploy/static/provider/cloud/deploy.yaml
```
!!! warning
@@ -323,7 +323,7 @@ Proxy-protocol is supported in GCE check the [Official Documentations on how to
#### Azure
```console
-kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.10.0/deploy/static/provider/cloud/deploy.yaml
+kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.10.1/deploy/static/provider/cloud/deploy.yaml
```
More information with regard to Azure annotations for ingress controller can be found in the [official AKS documentation](https://docs.microsoft.com/en-us/azure/aks/ingress-internal-ip#create-an-ingress-controller).
@@ -331,7 +331,7 @@ More information with regard to Azure annotations for ingress controller can be
#### Digital Ocean
```console
-kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.10.0/deploy/static/provider/do/deploy.yaml
+kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.10.1/deploy/static/provider/do/deploy.yaml
```
- By default the service object of the ingress-nginx-controller for Digital-Ocean, only configures one annotation. Its this one `service.beta.kubernetes.io/do-loadbalancer-enable-proxy-protocol: "true"`. While this makes the service functional, it was reported that the Digital-Ocean LoadBalancer graphs shows `no data`, unless a few other annotations are also configured. Some of these other annotations require values that can not be generic and hence not forced in a out-of-the-box installation. These annotations and a discussion on them is well documented in [this issue](https://github.com/kubernetes/ingress-nginx/issues/8965). Please refer to the issue to add annotations, with values specific to user, to get graphs of the DO-LB populated with data.
@@ -339,7 +339,7 @@ kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/cont
#### Scaleway
```console
-kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.10.0/deploy/static/provider/scw/deploy.yaml
+kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.10.1/deploy/static/provider/scw/deploy.yaml
```
#### Exoscale
@@ -354,7 +354,7 @@ The full list of annotations supported by Exoscale is available in the Exoscale
#### Oracle Cloud Infrastructure
```console
-kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.10.0/deploy/static/provider/cloud/deploy.yaml
+kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.10.1/deploy/static/provider/cloud/deploy.yaml
```
A
@@ -381,7 +381,7 @@ For quick testing, you can use a
This should work on almost every cluster, but it will typically use a port in the range 30000-32767.
```console
-kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.10.0/deploy/static/provider/baremetal/deploy.yaml
+kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.10.1/deploy/static/provider/baremetal/deploy.yaml
```
For more information about bare metal deployments (and how to use port 80 instead of a random port in the 30000-32767 range),
diff --git a/docs/e2e-tests.md b/docs/e2e-tests.md
index b836fff6e..66664291b 100644
--- a/docs/e2e-tests.md
+++ b/docs/e2e-tests.md
@@ -295,6 +295,10 @@ Do not try to edit it manually.
- [should choose the correct location](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/ingress/pathtype_mixed.go#L39)
### [[Ingress] [PathType] prefix checks](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/ingress/pathtype_prefix.go#L28)
- [should return 404 when prefix /aaa does not match request /aaaccc](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/ingress/pathtype_prefix.go#L35)
+- [should test prefix path using simple regex pattern for /id/{int}](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/ingress/pathtype_prefix.go#L72)
+- [should test prefix path using regex pattern for /id/{int} ignoring non-digits characters at end of string](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/ingress/pathtype_prefix.go#L113)
+- [should test prefix path using fixed path size regex pattern /id/{int}{3}](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/ingress/pathtype_prefix.go#L142)
+- [should correctly route multi-segment path patterns](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/ingress/pathtype_prefix.go#L177)
### [[Ingress] definition without host](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/ingress/without_host.go#L31)
- [should set ingress details variables for ingresses without a host](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/ingress/without_host.go#L34)
- [should set ingress details variables for ingresses with host without IngressRuleValue, only Backend](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/ingress/without_host.go#L55)
From 0088c6c7c7a133c8c9a48e64a3270813130eaab5 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Tue, 23 Apr 2024 10:44:56 -0700
Subject: [PATCH 048/283] Bump github.com/prometheus/common from 0.52.3 to
0.53.0 (#11290)
Bumps [github.com/prometheus/common](https://github.com/prometheus/common) from 0.52.3 to 0.53.0.
- [Release notes](https://github.com/prometheus/common/releases)
- [Commits](https://github.com/prometheus/common/compare/v0.52.3...v0.53.0)
---
updated-dependencies:
- dependency-name: github.com/prometheus/common
dependency-type: direct:production
update-type: version-update:semver-minor
...
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 2 +-
go.sum | 4 ++--
2 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/go.mod b/go.mod
index c4c445a60..741d6c0eb 100644
--- a/go.mod
+++ b/go.mod
@@ -19,7 +19,7 @@ require (
github.com/pmezard/go-difflib v1.0.0
github.com/prometheus/client_golang v1.19.0
github.com/prometheus/client_model v0.6.1
- github.com/prometheus/common v0.52.3
+ github.com/prometheus/common v0.53.0
github.com/spf13/cobra v1.8.0
github.com/spf13/pflag v1.0.5
github.com/stretchr/testify v1.9.0
diff --git a/go.sum b/go.sum
index 65d5ec9b8..f96723aa4 100644
--- a/go.sum
+++ b/go.sum
@@ -323,8 +323,8 @@ github.com/prometheus/common v0.4.1/go.mod h1:TNfzLD0ON7rHzMJeJkieUDPYmFC7Snx/y8
github.com/prometheus/common v0.10.0/go.mod h1:Tlit/dnDKsSWFlCLTWaA1cyBgKHSMdTB80sz/V91rCo=
github.com/prometheus/common v0.26.0/go.mod h1:M7rCNAaPfAosfx8veZJCuw84e35h3Cfd9VFqTh1DIvc=
github.com/prometheus/common v0.29.0/go.mod h1:vu+V0TpY+O6vW9J44gczi3Ap/oXXR10b+M/gUGO4Hls=
-github.com/prometheus/common v0.52.3 h1:5f8uj6ZwHSscOGNdIQg6OiZv/ybiK2CO2q2drVZAQSA=
-github.com/prometheus/common v0.52.3/go.mod h1:BrxBKv3FWBIGXw89Mg1AeBq7FSyRzXWI3l3e7W3RN5U=
+github.com/prometheus/common v0.53.0 h1:U2pL9w9nmJwJDa4qqLQ3ZaePJ6ZTwt7cMD3AG3+aLCE=
+github.com/prometheus/common v0.53.0/go.mod h1:BrxBKv3FWBIGXw89Mg1AeBq7FSyRzXWI3l3e7W3RN5U=
github.com/prometheus/exporter-toolkit v0.7.0/go.mod h1:ZUBIj498ePooX9t/2xtDjeQYwvRpiPP2lh5u4iblj2g=
github.com/prometheus/procfs v0.0.0-20181005140218-185b4288413d/go.mod h1:c3At6R/oaqEKCNdg8wHV1ftS6bRYblBhIjjI8uT2IGk=
github.com/prometheus/procfs v0.0.2/go.mod h1:TjEm7ze935MbeOT/UhFTIMYKhuLP4wbCsTZCD3I8kEA=
From 77c28237f0faf4016780d64cb2e444a277125907 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Tue, 23 Apr 2024 11:55:14 -0700
Subject: [PATCH 049/283] Bump k8s.io/component-base from 0.29.3 to 0.30.0
(#11291)
Bumps [k8s.io/component-base](https://github.com/kubernetes/component-base) from 0.29.3 to 0.30.0.
- [Commits](https://github.com/kubernetes/component-base/compare/v0.29.3...v0.30.0)
---
updated-dependencies:
- dependency-name: k8s.io/component-base
dependency-type: direct:production
update-type: version-update:semver-minor
...
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 12 +++++++-----
go.sum | 26 ++++++++++++++------------
2 files changed, 21 insertions(+), 17 deletions(-)
diff --git a/go.mod b/go.mod
index 741d6c0eb..fc75ec322 100644
--- a/go.mod
+++ b/go.mod
@@ -1,6 +1,7 @@
module k8s.io/ingress-nginx
go 1.21
+toolchain go1.22.2
require (
dario.cat/mergo v1.0.0
@@ -31,14 +32,14 @@ require (
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab
gopkg.in/go-playground/pool.v3 v3.1.1
gopkg.in/mcuadros/go-syslog.v2 v2.3.0
- k8s.io/api v0.29.3
+ k8s.io/api v0.30.0
k8s.io/apiextensions-apiserver v0.29.3
- k8s.io/apimachinery v0.29.3
+ k8s.io/apimachinery v0.30.0
k8s.io/apiserver v0.29.3
k8s.io/cli-runtime v0.29.3
- k8s.io/client-go v0.29.3
+ k8s.io/client-go v0.30.0
k8s.io/code-generator v0.29.3
- k8s.io/component-base v0.29.3
+ k8s.io/component-base v0.30.0
k8s.io/klog/v2 v2.120.1
pault.ag/go/sniff v0.0.0-20200207005214-cf7e4d167732
sigs.k8s.io/controller-runtime v0.17.3
@@ -122,7 +123,8 @@ require (
gopkg.in/yaml.v2 v2.4.0 // indirect
gopkg.in/yaml.v3 v3.0.1 // indirect
k8s.io/gengo v0.0.0-20240226174109-00c4be8627da // indirect
- k8s.io/kube-openapi v0.0.0-20240224005224-582cce78233b // indirect
+ k8s.io/gengo/v2 v2.0.0-20240228010128-51d4e06bde70 // indirect
+ k8s.io/kube-openapi v0.0.0-20240228011516-70dd3763d340 // indirect
k8s.io/utils v0.0.0-20240102154912-e7106e64919e // indirect
sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd // indirect
sigs.k8s.io/kustomize/api v0.16.0 // indirect
diff --git a/go.sum b/go.sum
index f96723aa4..b99859431 100644
--- a/go.sum
+++ b/go.sum
@@ -292,8 +292,8 @@ github.com/onsi/ginkgo/v2 v2.17.1 h1:V++EzdbhI4ZV4ev0UTIj0PzhzOcReJFyJaLjtSF55M8
github.com/onsi/ginkgo/v2 v2.17.1/go.mod h1:llBI3WDLL9Z6taip6f33H76YcWtJv+7R3HigUjbIBOs=
github.com/onsi/gomega v1.7.1/go.mod h1:XdKZgCCFLUoM/7CFJVPcG8C1xQ1AJ0vpAezJrB7JYyY=
github.com/onsi/gomega v1.10.1/go.mod h1:iN09h71vgCQne3DLsj+A5owkum+a2tYe+TOCB1ybHNo=
-github.com/onsi/gomega v1.30.0 h1:hvMK7xYz4D3HapigLTeGdId/NcfQx1VHMJc60ew99+8=
-github.com/onsi/gomega v1.30.0/go.mod h1:9sxs+SwGrKI0+PWe4Fxa9tFQQBG5xSsSbMXOI8PPpoQ=
+github.com/onsi/gomega v1.31.0 h1:54UJxxj6cPInHS3a35wm6BK/F9nHYueZ1NVujHDrnXE=
+github.com/onsi/gomega v1.31.0/go.mod h1:DW9aCi7U6Yi40wNVAvT6kzFnEVEI5n3DloYBiKiT6zk=
github.com/opencontainers/runc v1.1.12 h1:BOIssBaW1La0/qbNZHXOOa71dZfZEQOzW7dqQf3phss=
github.com/opencontainers/runc v1.1.12/go.mod h1:S+lQwSfncpBha7XTy/5lBwWgm5+y5Ma/O44Ekby9FK8=
github.com/opencontainers/runtime-spec v1.2.0 h1:z97+pHb3uELt/yiAWD691HNHQIF07bE7dzrbT927iTk=
@@ -740,29 +740,31 @@ honnef.co/go/tools v0.0.0-20190523083050-ea95bdfd59fc/go.mod h1:rf3lG4BRIbNafJWh
honnef.co/go/tools v0.0.1-2019.2.3/go.mod h1:a3bituU0lyd329TUQxRnasdCoJDkEUEAqEt0JzvZhAg=
honnef.co/go/tools v0.0.1-2020.1.3/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k=
honnef.co/go/tools v0.0.1-2020.1.4/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k=
-k8s.io/api v0.29.3 h1:2ORfZ7+bGC3YJqGpV0KSDDEVf8hdGQ6A03/50vj8pmw=
-k8s.io/api v0.29.3/go.mod h1:y2yg2NTyHUUkIoTC+phinTnEa3KFM6RZ3szxt014a80=
+k8s.io/api v0.30.0 h1:siWhRq7cNjy2iHssOB9SCGNCl2spiF1dO3dABqZ8niA=
+k8s.io/api v0.30.0/go.mod h1:OPlaYhoHs8EQ1ql0R/TsUgaRPhpKNxIMrKQfWUp8QSE=
k8s.io/apiextensions-apiserver v0.29.3 h1:9HF+EtZaVpFjStakF4yVufnXGPRppWFEQ87qnO91YeI=
k8s.io/apiextensions-apiserver v0.29.3/go.mod h1:po0XiY5scnpJfFizNGo6puNU6Fq6D70UJY2Cb2KwAVc=
-k8s.io/apimachinery v0.29.3 h1:2tbx+5L7RNvqJjn7RIuIKu9XTsIZ9Z5wX2G22XAa5EU=
-k8s.io/apimachinery v0.29.3/go.mod h1:hx/S4V2PNW4OMg3WizRrHutyB5la0iCUbZym+W0EQIU=
+k8s.io/apimachinery v0.30.0 h1:qxVPsyDM5XS96NIh9Oj6LavoVFYff/Pon9cZeDIkHHA=
+k8s.io/apimachinery v0.30.0/go.mod h1:iexa2somDaxdnj7bha06bhb43Zpa6eWH8N8dbqVjTUc=
k8s.io/apiserver v0.29.3 h1:xR7ELlJ/BZSr2n4CnD3lfA4gzFivh0wwfNfz9L0WZcE=
k8s.io/apiserver v0.29.3/go.mod h1:hrvXlwfRulbMbBgmWRQlFru2b/JySDpmzvQwwk4GUOs=
k8s.io/cli-runtime v0.29.3 h1:r68rephmmytoywkw2MyJ+CxjpasJDQY7AGc3XY2iv1k=
k8s.io/cli-runtime v0.29.3/go.mod h1:aqVUsk86/RhaGJwDhHXH0jcdqBrgdF3bZWk4Z9D4mkM=
-k8s.io/client-go v0.29.3 h1:R/zaZbEAxqComZ9FHeQwOh3Y1ZUs7FaHKZdQtIc2WZg=
-k8s.io/client-go v0.29.3/go.mod h1:tkDisCvgPfiRpxGnOORfkljmS+UrW+WtXAy2fTvXJB0=
+k8s.io/client-go v0.30.0 h1:sB1AGGlhY/o7KCyCEQ0bPWzYDL0pwOZO4vAtTSh/gJQ=
+k8s.io/client-go v0.30.0/go.mod h1:g7li5O5256qe6TYdAMyX/otJqMhIiGgTapdLchhmOaY=
k8s.io/code-generator v0.29.3 h1:m7E25/t9R9NvejspO2zBdyu+/Gl0Z5m7dCRc680KS14=
k8s.io/code-generator v0.29.3/go.mod h1:x47ofBhN4gxYFcxeKA1PYXeaPreAGaDN85Y/lNUsPoM=
-k8s.io/component-base v0.29.3 h1:Oq9/nddUxlnrCuuR2K/jp6aflVvc0uDvxMzAWxnGzAo=
-k8s.io/component-base v0.29.3/go.mod h1:Yuj33XXjuOk2BAaHsIGHhCKZQAgYKhqIxIjIr2UXYio=
+k8s.io/component-base v0.30.0 h1:cj6bp38g0ainlfYtaOQuRELh5KSYjhKxM+io7AUIk4o=
+k8s.io/component-base v0.30.0/go.mod h1:V9x/0ePFNaKeKYA3bOvIbrNoluTSG+fSJKjLdjOoeXQ=
k8s.io/gengo v0.0.0-20240226174109-00c4be8627da h1:uH7pylUCo++9PSvrUA34sbk4Y6PHw/bgEFa80pejI+I=
k8s.io/gengo v0.0.0-20240226174109-00c4be8627da/go.mod h1:FiNAH4ZV3gBg2Kwh89tzAEV2be7d5xI0vBa/VySYy3E=
+k8s.io/gengo/v2 v2.0.0-20240228010128-51d4e06bde70 h1:NGrVE502P0s0/1hudf8zjgwki1X/TByhmAoILTarmzo=
+k8s.io/gengo/v2 v2.0.0-20240228010128-51d4e06bde70/go.mod h1:VH3AT8AaQOqiGjMF9p0/IM1Dj+82ZwjfxUP1IxaHE+8=
k8s.io/klog/v2 v2.2.0/go.mod h1:Od+F08eJP+W3HUb4pSrPpgp9DGU4GzlpG/TmITuYh/Y=
k8s.io/klog/v2 v2.120.1 h1:QXU6cPEOIslTGvZaXvFWiP9VKyeet3sawzTOvdXb4Vw=
k8s.io/klog/v2 v2.120.1/go.mod h1:3Jpz1GvMt720eyJH1ckRHK1EDfpxISzJ7I9OYgaDtPE=
-k8s.io/kube-openapi v0.0.0-20240224005224-582cce78233b h1:1dzw/KqgSPod72SUp2tuTOmK33TlY2fHlrVU2M9VrOM=
-k8s.io/kube-openapi v0.0.0-20240224005224-582cce78233b/go.mod h1:Pa1PvrP7ACSkuX6I7KYomY6cmMA0Tx86waBhDUgoKPw=
+k8s.io/kube-openapi v0.0.0-20240228011516-70dd3763d340 h1:BZqlfIlq5YbRMFko6/PM7FjZpUb45WallggurYhKGag=
+k8s.io/kube-openapi v0.0.0-20240228011516-70dd3763d340/go.mod h1:yD4MZYeKMBwQKVht279WycxKyM84kkAx2DPrTXaeb98=
k8s.io/utils v0.0.0-20240102154912-e7106e64919e h1:eQ/4ljkx21sObifjzXwlPKpdGLrCfRziVtos3ofG/sQ=
k8s.io/utils v0.0.0-20240102154912-e7106e64919e/go.mod h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0=
pault.ag/go/sniff v0.0.0-20200207005214-cf7e4d167732 h1:SAElp8THCfmBdM+4lmWX5gebiSSkEr7PAYDVF91qpfg=
From b3152c48417ec0d8a428b794ed2a715f035cf6de Mon Sep 17 00:00:00 2001
From: James Strong
Date: Wed, 24 Apr 2024 09:48:42 -0400
Subject: [PATCH 050/283] Release Helm Chart on branch update
Signed-off-by: James Strong
---
.github/workflows/helm.yaml | 1 +
1 file changed, 1 insertion(+)
diff --git a/.github/workflows/helm.yaml b/.github/workflows/helm.yaml
index e6383c682..e88fd8678 100644
--- a/.github/workflows/helm.yaml
+++ b/.github/workflows/helm.yaml
@@ -65,6 +65,7 @@ jobs:
steps:
- name: Checkout master
uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
+ ref: ${{ github.ref_name }}
with:
# Fetch entire history. Required for chart-releaser; see https://github.com/helm/chart-releaser-action/issues/13#issuecomment-602063896
fetch-depth: 0
From b330f96482df33a837120b6151ee248abadad6bb Mon Sep 17 00:00:00 2001
From: James Strong
Date: Wed, 24 Apr 2024 10:21:27 -0400
Subject: [PATCH 051/283] fix ref error
Signed-off-by: James Strong
---
.github/workflows/helm.yaml | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/.github/workflows/helm.yaml b/.github/workflows/helm.yaml
index e88fd8678..34af63189 100644
--- a/.github/workflows/helm.yaml
+++ b/.github/workflows/helm.yaml
@@ -65,10 +65,10 @@ jobs:
steps:
- name: Checkout master
uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
- ref: ${{ github.ref_name }}
with:
# Fetch entire history. Required for chart-releaser; see https://github.com/helm/chart-releaser-action/issues/13#issuecomment-602063896
fetch-depth: 0
+ ref: ${{ github.ref_name }}
- name: Setup
shell: bash
From 9b4b91435d65085ade86f7995b26aff51177a62e Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Wed, 1 May 2024 12:01:23 -0700
Subject: [PATCH 052/283] Bump the all group with 4 updates (#11327)
Bumps the all group with 4 updates: [actions/checkout](https://github.com/actions/checkout), [actions/upload-artifact](https://github.com/actions/upload-artifact), [actions/download-artifact](https://github.com/actions/download-artifact) and [github/codeql-action](https://github.com/github/codeql-action).
Updates `actions/checkout` from 4.1.3 to 4.1.4
- [Release notes](https://github.com/actions/checkout/releases)
- [Changelog](https://github.com/actions/checkout/blob/main/CHANGELOG.md)
- [Commits](https://github.com/actions/checkout/compare/1d96c772d19495a3b5c517cd2bc0cb401ea0529f...0ad4b8fadaa221de15dcec353f45205ec38ea70b)
Updates `actions/upload-artifact` from 4.3.2 to 4.3.3
- [Release notes](https://github.com/actions/upload-artifact/releases)
- [Commits](https://github.com/actions/upload-artifact/compare/1746f4ab65b179e0ea60a494b83293b640dd5bba...65462800fd760344b1a7b4382951275a0abb4808)
Updates `actions/download-artifact` from 4.1.5 to 4.1.7
- [Release notes](https://github.com/actions/download-artifact/releases)
- [Commits](https://github.com/actions/download-artifact/compare/8caf195ad4b1dee92908e23f56eeb0696f1dd42d...65a9edc5881444af0b9093a5e628f2fe47ea3b2e)
Updates `github/codeql-action` from 3.25.1 to 3.25.3
- [Release notes](https://github.com/github/codeql-action/releases)
- [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md)
- [Commits](https://github.com/github/codeql-action/compare/c7f9125735019aa87cfc361530512d50ea439c71...d39d31e687223d841ef683f52467bd88e9b21c14)
---
updated-dependencies:
- dependency-name: actions/checkout
dependency-type: direct:production
update-type: version-update:semver-patch
dependency-group: all
- dependency-name: actions/upload-artifact
dependency-type: direct:production
update-type: version-update:semver-patch
dependency-group: all
- dependency-name: actions/download-artifact
dependency-type: direct:production
update-type: version-update:semver-patch
dependency-group: all
- dependency-name: github/codeql-action
dependency-type: direct:production
update-type: version-update:semver-patch
dependency-group: all
...
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
.github/workflows/ci.yaml | 14 +++++++-------
.github/workflows/depreview.yaml | 2 +-
.github/workflows/docs.yaml | 4 ++--
.github/workflows/golangci-lint.yml | 2 +-
.github/workflows/helm.yaml | 4 ++--
.github/workflows/images.yaml | 8 ++++----
.github/workflows/perftest.yaml | 2 +-
.github/workflows/plugin.yaml | 2 +-
.github/workflows/scorecards.yml | 6 +++---
.github/workflows/vulnerability-scans.yaml | 6 +++---
.github/workflows/zz-tmpl-images.yaml | 6 +++---
.github/workflows/zz-tmpl-k8s-e2e.yaml | 6 +++---
12 files changed, 31 insertions(+), 31 deletions(-)
diff --git a/.github/workflows/ci.yaml b/.github/workflows/ci.yaml
index a3d0e3187..afc2f7d38 100644
--- a/.github/workflows/ci.yaml
+++ b/.github/workflows/ci.yaml
@@ -47,7 +47,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
+ uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
- uses: dorny/paths-filter@de90cc6fb38fc0963ad72b210f1f284cd68cea36 # v3.0.2
id: filter
@@ -77,7 +77,7 @@ jobs:
(needs.changes.outputs.go == 'true')
steps:
- name: Checkout
- uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
+ uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
- name: Get go version
run: echo "GOLANG_VERSION=$(cat GOLANG_VERSION)" >> $GITHUB_ENV
@@ -105,7 +105,7 @@ jobs:
PLATFORMS: linux/amd64
steps:
- name: Checkout
- uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
+ uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
- name: Get go version
id: golangversion
@@ -163,7 +163,7 @@ jobs:
| gzip > docker.tar.gz
- name: cache
- uses: actions/upload-artifact@1746f4ab65b179e0ea60a494b83293b640dd5bba # v4.3.2
+ uses: actions/upload-artifact@65462800fd760344b1a7b4382951275a0abb4808 # v4.3.3
with:
name: docker.tar.gz
path: docker.tar.gz
@@ -179,7 +179,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
+ uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
with:
fetch-depth: 0
@@ -239,7 +239,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
+ uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
- name: Setup Go
uses: actions/setup-go@0c52d547c9bc32b1aa3301fd7a9cb496313a4491 # v5.0.0
@@ -248,7 +248,7 @@ jobs:
check-latest: true
- name: cache
- uses: actions/download-artifact@8caf195ad4b1dee92908e23f56eeb0696f1dd42d # v4.1.5
+ uses: actions/download-artifact@65a9edc5881444af0b9093a5e628f2fe47ea3b2e # v4.1.7
with:
name: docker.tar.gz
diff --git a/.github/workflows/depreview.yaml b/.github/workflows/depreview.yaml
index bfe5ba55b..c9881c2a3 100644
--- a/.github/workflows/depreview.yaml
+++ b/.github/workflows/depreview.yaml
@@ -9,6 +9,6 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: 'Checkout Repository'
- uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
+ uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
- name: 'Dependency Review'
uses: actions/dependency-review-action@5bbc3ba658137598168acb2ab73b21c432dd411b # v4.2.5
diff --git a/.github/workflows/docs.yaml b/.github/workflows/docs.yaml
index 740b76f79..76b5818f4 100644
--- a/.github/workflows/docs.yaml
+++ b/.github/workflows/docs.yaml
@@ -23,7 +23,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
+ uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
- uses: dorny/paths-filter@de90cc6fb38fc0963ad72b210f1f284cd68cea36 # v3.0.2
id: filter
@@ -47,7 +47,7 @@ jobs:
steps:
- name: Checkout master
- uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
+ uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
- name: Deploy
uses: ./.github/actions/mkdocs
diff --git a/.github/workflows/golangci-lint.yml b/.github/workflows/golangci-lint.yml
index 02ebcaa38..2b709ccfd 100644
--- a/.github/workflows/golangci-lint.yml
+++ b/.github/workflows/golangci-lint.yml
@@ -15,7 +15,7 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Checkout
- uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
+ uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
- name: Get go version
run: echo "GOLANG_VERSION=$(cat GOLANG_VERSION)" >> $GITHUB_ENV
diff --git a/.github/workflows/helm.yaml b/.github/workflows/helm.yaml
index 34af63189..1da3972b0 100644
--- a/.github/workflows/helm.yaml
+++ b/.github/workflows/helm.yaml
@@ -25,7 +25,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
+ uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
- name: Run Artifact Hub lint
run: |
@@ -64,7 +64,7 @@ jobs:
steps:
- name: Checkout master
- uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
+ uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
with:
# Fetch entire history. Required for chart-releaser; see https://github.com/helm/chart-releaser-action/issues/13#issuecomment-602063896
fetch-depth: 0
diff --git a/.github/workflows/images.yaml b/.github/workflows/images.yaml
index 3e9cbcbae..a7a2adce0 100644
--- a/.github/workflows/images.yaml
+++ b/.github/workflows/images.yaml
@@ -41,7 +41,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
+ uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
- uses: dorny/paths-filter@de90cc6fb38fc0963ad72b210f1f284cd68cea36 # v3.0.2
id: filter
with:
@@ -144,7 +144,7 @@ jobs:
k8s: [v1.26.14, v1.27.11, v1.28.7, v1.29.2]
steps:
- name: Checkout
- uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
+ uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
- name: Get go version
run: echo "GOLANG_VERSION=$(cat GOLANG_VERSION)" >> $GITHUB_ENV
@@ -178,7 +178,7 @@ jobs:
nginx: ['1.25.3', '1.21.6']
steps:
- name: Checkout
- uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
+ uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
- name: image build
run: |
cd images/opentelemetry && make NGINX_VERSION=${{ matrix.nginx }} build
@@ -195,7 +195,7 @@ jobs:
PLATFORMS: linux/amd64,linux/arm,linux/arm64,linux/s390x
steps:
- name: Checkout
- uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
+ uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
- name: Set up QEMU
uses: docker/setup-qemu-action@68827325e0b33c7199eb31dd4e31fbe9023e06e3 # v3.0.0
- name: Set up Docker Buildx
diff --git a/.github/workflows/perftest.yaml b/.github/workflows/perftest.yaml
index 87c828380..f2999ee97 100644
--- a/.github/workflows/perftest.yaml
+++ b/.github/workflows/perftest.yaml
@@ -19,7 +19,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
+ uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
- name: Install K6
run: |
diff --git a/.github/workflows/plugin.yaml b/.github/workflows/plugin.yaml
index def284a39..1b8c8f19b 100644
--- a/.github/workflows/plugin.yaml
+++ b/.github/workflows/plugin.yaml
@@ -12,7 +12,7 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Checkout
- uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
+ uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
with:
fetch-depth: 0
diff --git a/.github/workflows/scorecards.yml b/.github/workflows/scorecards.yml
index e4a404ef8..c98b2d180 100644
--- a/.github/workflows/scorecards.yml
+++ b/.github/workflows/scorecards.yml
@@ -27,7 +27,7 @@ jobs:
steps:
- name: "Checkout code"
- uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
+ uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
with:
persist-credentials: false
@@ -51,7 +51,7 @@ jobs:
# Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF
# format to the repository Actions tab.
- name: "Upload artifact"
- uses: actions/upload-artifact@1746f4ab65b179e0ea60a494b83293b640dd5bba # v4.3.2
+ uses: actions/upload-artifact@65462800fd760344b1a7b4382951275a0abb4808 # v4.3.3
with:
name: SARIF file
path: results.sarif
@@ -59,6 +59,6 @@ jobs:
# Upload the results to GitHub's code scanning dashboard.
- name: "Upload to code-scanning"
- uses: github/codeql-action/upload-sarif@c7f9125735019aa87cfc361530512d50ea439c71 # v3.25.1
+ uses: github/codeql-action/upload-sarif@d39d31e687223d841ef683f52467bd88e9b21c14 # v3.25.3
with:
sarif_file: results.sarif
diff --git a/.github/workflows/vulnerability-scans.yaml b/.github/workflows/vulnerability-scans.yaml
index e0c1d838b..44e8954ed 100644
--- a/.github/workflows/vulnerability-scans.yaml
+++ b/.github/workflows/vulnerability-scans.yaml
@@ -22,7 +22,7 @@ jobs:
versions: ${{ steps.version.outputs.TAGS }}
steps:
- name: Checkout code
- uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
+ uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
with:
fetch-depth: 0
@@ -52,7 +52,7 @@ jobs:
versions: ${{ fromJSON(needs.version.outputs.versions) }}
steps:
- name: Checkout code
- uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
+ uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
- shell: bash
id: test
@@ -75,7 +75,7 @@ jobs:
# This step checks out a copy of your repository.
- name: Upload SARIF file
- uses: github/codeql-action/upload-sarif@c7f9125735019aa87cfc361530512d50ea439c71 # v3.25.1
+ uses: github/codeql-action/upload-sarif@d39d31e687223d841ef683f52467bd88e9b21c14 # v3.25.3
with:
token: ${{ github.token }}
# Path to SARIF file relative to the root of the repository
diff --git a/.github/workflows/zz-tmpl-images.yaml b/.github/workflows/zz-tmpl-images.yaml
index 819a88cd4..4ab9a4efb 100644
--- a/.github/workflows/zz-tmpl-images.yaml
+++ b/.github/workflows/zz-tmpl-images.yaml
@@ -31,7 +31,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
+ uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
- uses: dorny/paths-filter@de90cc6fb38fc0963ad72b210f1f284cd68cea36 # v3.0.2
id: filter
with:
@@ -48,7 +48,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
+ uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
- name: Build
run: |
@@ -67,7 +67,7 @@ jobs:
PLATFORMS: ${{ inputs.platforms-publish }}
steps:
- name: Checkout
- uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
+ uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
- name: Login to GitHub Container Registry
uses: docker/login-action@e92390c5fb421da1463c202d546fed0ec5c39f20 # v3.1.0
diff --git a/.github/workflows/zz-tmpl-k8s-e2e.yaml b/.github/workflows/zz-tmpl-k8s-e2e.yaml
index ab2ec536a..9ca47112b 100644
--- a/.github/workflows/zz-tmpl-k8s-e2e.yaml
+++ b/.github/workflows/zz-tmpl-k8s-e2e.yaml
@@ -20,10 +20,10 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@1d96c772d19495a3b5c517cd2bc0cb401ea0529f # v4.1.3
+ uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
- name: cache
- uses: actions/download-artifact@8caf195ad4b1dee92908e23f56eeb0696f1dd42d # v4.1.5
+ uses: actions/download-artifact@65a9edc5881444af0b9093a5e628f2fe47ea3b2e # v4.1.7
with:
name: docker.tar.gz
@@ -50,7 +50,7 @@ jobs:
make kind-e2e-test
- name: Upload e2e junit-reports ${{ inputs.variation }}
- uses: actions/upload-artifact@1746f4ab65b179e0ea60a494b83293b640dd5bba # v4.3.2
+ uses: actions/upload-artifact@65462800fd760344b1a7b4382951275a0abb4808 # v4.3.3
if: success() || failure()
with:
name: e2e-test-reports-${{ inputs.k8s-version }}${{ inputs.variation }}
From 030893148be3a2ea655b9fc014ca24c7756d233d Mon Sep 17 00:00:00 2001
From: Jintao Zhang
Date: Sun, 5 May 2024 20:06:59 +0800
Subject: [PATCH 053/283] chore(deps): group update k8s.io packages to v0.30.0
(#11344)
* chore(deps): group update k8s.io packages to v0.30.0
Signed-off-by: Jintao Zhang
* upgraded github.com/ncabatoff/process-exporter v0.7.10 => v0.7.11
Signed-off-by: Jintao Zhang
* downgrade github.com/prometheus/procfs to v0.13.0
Signed-off-by: Jintao Zhang
---------
Signed-off-by: Jintao Zhang
---
go.mod | 60 +--
go.sum | 1333 ++++++++++++++++++++++++++++++++++++++++++++++++---
go.work | 2 +-
go.work.sum | 550 ++++++++++++++-------
4 files changed, 1683 insertions(+), 262 deletions(-)
diff --git a/go.mod b/go.mod
index fc75ec322..4b40b93bc 100644
--- a/go.mod
+++ b/go.mod
@@ -1,6 +1,7 @@
module k8s.io/ingress-nginx
-go 1.21
+go 1.22.0
+
toolchain go1.22.2
require (
@@ -14,8 +15,8 @@ require (
github.com/mitchellh/hashstructure/v2 v2.0.2
github.com/mitchellh/mapstructure v1.5.0
github.com/moul/pb v0.0.0-20220425114252-bca18df4138c
- github.com/ncabatoff/process-exporter v0.7.10
- github.com/onsi/ginkgo/v2 v2.17.1
+ github.com/ncabatoff/process-exporter v0.7.11
+ github.com/onsi/ginkgo/v2 v2.17.2
github.com/opencontainers/runc v1.1.12
github.com/pmezard/go-difflib v1.0.0
github.com/prometheus/client_golang v1.19.0
@@ -27,18 +28,18 @@ require (
github.com/yudai/gojsondiff v1.0.0
github.com/zakjan/cert-chain-resolver v0.0.0-20221221105603-fcedb00c5b30
golang.org/x/crypto v0.22.0
- golang.org/x/exp v0.0.0-20220722155223-a9213eeb770e
+ golang.org/x/exp v0.0.0-20240416160154-fe59bbe5cc7f
google.golang.org/grpc v1.63.2
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab
gopkg.in/go-playground/pool.v3 v3.1.1
gopkg.in/mcuadros/go-syslog.v2 v2.3.0
k8s.io/api v0.30.0
- k8s.io/apiextensions-apiserver v0.29.3
+ k8s.io/apiextensions-apiserver v0.30.0
k8s.io/apimachinery v0.30.0
- k8s.io/apiserver v0.29.3
- k8s.io/cli-runtime v0.29.3
+ k8s.io/apiserver v0.30.0
+ k8s.io/cli-runtime v0.30.0
k8s.io/client-go v0.30.0
- k8s.io/code-generator v0.29.3
+ k8s.io/code-generator v0.30.0
k8s.io/component-base v0.30.0
k8s.io/klog/v2 v2.120.1
pault.ag/go/sniff v0.0.0-20200207005214-cf7e4d167732
@@ -51,21 +52,21 @@ require (
github.com/BurntSushi/toml v1.3.2 // indirect
github.com/beorn7/perks v1.0.1 // indirect
github.com/blang/semver/v4 v4.0.0 // indirect
- github.com/cespare/xxhash/v2 v2.2.0 // indirect
+ github.com/cespare/xxhash/v2 v2.3.0 // indirect
github.com/coreos/go-systemd/v22 v22.5.0 // indirect
github.com/cyphar/filepath-securejoin v0.2.4 // indirect
github.com/davecgh/go-spew v1.1.1 // indirect
github.com/eapache/queue v1.1.0 // indirect
- github.com/emicklei/go-restful/v3 v3.11.3 // indirect
+ github.com/emicklei/go-restful/v3 v3.12.0 // indirect
github.com/evanphx/json-patch v5.9.0+incompatible // indirect
github.com/evanphx/json-patch/v5 v5.9.0 // indirect
github.com/fullsailor/pkcs7 v0.0.0-20190404230743-d7302db945fa // indirect
github.com/go-errors/errors v1.5.1 // indirect
github.com/go-logr/logr v1.4.1 // indirect
- github.com/go-openapi/jsonpointer v0.20.2 // indirect
- github.com/go-openapi/jsonreference v0.20.4 // indirect
- github.com/go-openapi/swag v0.22.9 // indirect
- github.com/go-task/slim-sprig v0.0.0-20230315185526-52ccab3ef572 // indirect
+ github.com/go-openapi/jsonpointer v0.21.0 // indirect
+ github.com/go-openapi/jsonreference v0.21.0 // indirect
+ github.com/go-openapi/swag v0.23.0 // indirect
+ github.com/go-task/slim-sprig/v3 v3.0.0 // indirect
github.com/godbus/dbus/v5 v5.1.0 // indirect
github.com/gogo/protobuf v1.3.2 // indirect
github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da // indirect
@@ -75,7 +76,7 @@ require (
github.com/google/gnostic-models v0.6.8 // indirect
github.com/google/go-cmp v0.6.0 // indirect
github.com/google/gofuzz v1.2.0 // indirect
- github.com/google/pprof v0.0.0-20240225044709-fd706174c886 // indirect
+ github.com/google/pprof v0.0.0-20240424215950-a892ee059fd6 // indirect
github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 // indirect
github.com/google/uuid v1.6.0 // indirect
github.com/gregjones/httpcache v0.0.0-20190611155906-901d90724c79 // indirect
@@ -98,34 +99,33 @@ require (
github.com/opencontainers/runtime-spec v1.2.0 // indirect
github.com/peterbourgon/diskv v2.0.1+incompatible // indirect
github.com/pkg/errors v0.9.1 // indirect
- github.com/prometheus/procfs v0.12.0 // indirect
+ github.com/prometheus/procfs v0.13.0 // indirect
github.com/sergi/go-diff v1.3.1 // indirect
github.com/sirupsen/logrus v1.9.3 // indirect
github.com/xlab/treeprint v1.2.0 // indirect
github.com/yudai/golcs v0.0.0-20170316035057-ecda9a501e82 // indirect
github.com/yudai/pp v2.0.1+incompatible // indirect
go.starlark.net v0.0.0-20240123142251-f86470692795 // indirect
- golang.org/x/mod v0.15.0 // indirect
- golang.org/x/net v0.23.0 // indirect
- golang.org/x/oauth2 v0.18.0 // indirect
- golang.org/x/sync v0.6.0 // indirect
- golang.org/x/sys v0.19.0 // indirect
+ go.uber.org/zap v1.27.0 // indirect
+ golang.org/x/mod v0.17.0 // indirect
+ golang.org/x/net v0.24.0 // indirect
+ golang.org/x/oauth2 v0.20.0 // indirect
+ golang.org/x/sync v0.7.0 // indirect
+ golang.org/x/sys v0.20.0 // indirect
golang.org/x/term v0.19.0 // indirect
- golang.org/x/text v0.14.0 // indirect
+ golang.org/x/text v0.15.0 // indirect
golang.org/x/time v0.5.0 // indirect
- golang.org/x/tools v0.18.0 // indirect
- google.golang.org/appengine v1.6.8 // indirect
- google.golang.org/genproto/googleapis/rpc v0.0.0-20240227224415-6ceb2ff114de // indirect
- google.golang.org/protobuf v1.33.0 // indirect
+ golang.org/x/tools v0.20.0 // indirect
+ google.golang.org/genproto/googleapis/rpc v0.0.0-20240429193739-8cf5692501f6 // indirect
+ google.golang.org/protobuf v1.34.0 // indirect
gopkg.in/evanphx/json-patch.v5 v5.9.0 // indirect
gopkg.in/go-playground/assert.v1 v1.2.1 // indirect
gopkg.in/inf.v0 v0.9.1 // indirect
gopkg.in/yaml.v2 v2.4.0 // indirect
gopkg.in/yaml.v3 v3.0.1 // indirect
- k8s.io/gengo v0.0.0-20240226174109-00c4be8627da // indirect
- k8s.io/gengo/v2 v2.0.0-20240228010128-51d4e06bde70 // indirect
- k8s.io/kube-openapi v0.0.0-20240228011516-70dd3763d340 // indirect
- k8s.io/utils v0.0.0-20240102154912-e7106e64919e // indirect
+ k8s.io/gengo/v2 v2.0.0-20240404160639-a0386bf69313 // indirect
+ k8s.io/kube-openapi v0.0.0-20240430033511-f0e62f92d13f // indirect
+ k8s.io/utils v0.0.0-20240502163921-fe8a2dddb1d0 // indirect
sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd // indirect
sigs.k8s.io/kustomize/api v0.16.0 // indirect
sigs.k8s.io/kustomize/kyaml v0.16.0 // indirect
diff --git a/go.sum b/go.sum
index b99859431..13e4ebd2d 100644
--- a/go.sum
+++ b/go.sum
@@ -3,6 +3,7 @@ cloud.google.com/go v0.34.0/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMT
cloud.google.com/go v0.38.0/go.mod h1:990N+gfupTy94rShfmMCWGDn0LpTmnzTp2qbd1dvSRU=
cloud.google.com/go v0.44.1/go.mod h1:iSa0KzasP4Uvy3f1mN/7PiObzGgflwredwwASm/v6AU=
cloud.google.com/go v0.44.2/go.mod h1:60680Gw3Yr4ikxnPRS/oxxkBccT6SA1yMk63TGekxKY=
+cloud.google.com/go v0.44.3/go.mod h1:60680Gw3Yr4ikxnPRS/oxxkBccT6SA1yMk63TGekxKY=
cloud.google.com/go v0.45.1/go.mod h1:RpBamKRgapWJb87xiFSdk4g1CME7QZg3uwTez+TSTjc=
cloud.google.com/go v0.46.3/go.mod h1:a6bKKbmY7er1mI7TEI4lsAkts/mkhTSZK8w33B4RAg0=
cloud.google.com/go v0.50.0/go.mod h1:r9sluTvynVuxRIOHXQEHMFffphuXHOMZMycpNR5e6To=
@@ -13,37 +14,617 @@ cloud.google.com/go v0.56.0/go.mod h1:jr7tqZxxKOVYizybht9+26Z/gUq7tiRzu+ACVAMbKV
cloud.google.com/go v0.57.0/go.mod h1:oXiQ6Rzq3RAkkY7N6t3TcE6jE+CIBBbA36lwQ1JyzZs=
cloud.google.com/go v0.62.0/go.mod h1:jmCYTdRCQuc1PHIIJ/maLInMho30T/Y0M4hTdTShOYc=
cloud.google.com/go v0.65.0/go.mod h1:O5N8zS7uWy9vkA9vayVHs65eM1ubvY4h553ofrNHObY=
+cloud.google.com/go v0.72.0/go.mod h1:M+5Vjvlc2wnp6tjzE102Dw08nGShTscUx2nZMufOKPI=
+cloud.google.com/go v0.74.0/go.mod h1:VV1xSbzvo+9QJOxLDaJfTjx5e+MePCpCWwvftOeQmWk=
+cloud.google.com/go v0.75.0/go.mod h1:VGuuCn7PG0dwsd5XPVm2Mm3wlh3EL55/79EKB6hlPTY=
+cloud.google.com/go v0.78.0/go.mod h1:QjdrLG0uq+YwhjoVOLsS1t7TW8fs36kLs4XO5R5ECHg=
+cloud.google.com/go v0.79.0/go.mod h1:3bzgcEeQlzbuEAYu4mrWhKqWjmpprinYgKJLgKHnbb8=
+cloud.google.com/go v0.81.0/go.mod h1:mk/AM35KwGk/Nm2YSeZbxXdrNK3KZOYHmLkOqC2V6E0=
+cloud.google.com/go v0.83.0/go.mod h1:Z7MJUsANfY0pYPdw0lbnivPx4/vhy/e2FEkSkF7vAVY=
+cloud.google.com/go v0.84.0/go.mod h1:RazrYuxIK6Kb7YrzzhPoLmCVzl7Sup4NrbKPg8KHSUM=
+cloud.google.com/go v0.87.0/go.mod h1:TpDYlFy7vuLzZMMZ+B6iRiELaY7z/gJPaqbMx6mlWcY=
+cloud.google.com/go v0.90.0/go.mod h1:kRX0mNRHe0e2rC6oNakvwQqzyDmg57xJ+SZU1eT2aDQ=
+cloud.google.com/go v0.93.3/go.mod h1:8utlLll2EF5XMAV15woO4lSbWQlk8rer9aLOfLh7+YI=
+cloud.google.com/go v0.94.1/go.mod h1:qAlAugsXlC+JWO+Bke5vCtc9ONxjQT3drlTTnAplMW4=
+cloud.google.com/go v0.97.0/go.mod h1:GF7l59pYBVlXQIBLx3a761cZ41F9bBH3JUlihCt2Udc=
+cloud.google.com/go v0.99.0/go.mod h1:w0Xx2nLzqWJPuozYQX+hFfCSI8WioryfRDzkoI/Y2ZA=
+cloud.google.com/go v0.100.1/go.mod h1:fs4QogzfH5n2pBXBP9vRiU+eCny7lD2vmFZy79Iuw1U=
+cloud.google.com/go v0.100.2/go.mod h1:4Xra9TjzAeYHrl5+oeLlzbM2k3mjVhZh4UqTZ//w99A=
+cloud.google.com/go v0.102.0/go.mod h1:oWcCzKlqJ5zgHQt9YsaeTY9KzIvjyy0ArmiBUgpQ+nc=
+cloud.google.com/go v0.102.1/go.mod h1:XZ77E9qnTEnrgEOvr4xzfdX5TRo7fB4T2F4O6+34hIU=
+cloud.google.com/go v0.104.0/go.mod h1:OO6xxXdJyvuJPcEPBLN9BJPD+jep5G1+2U5B5gkRYtA=
+cloud.google.com/go v0.105.0/go.mod h1:PrLgOJNe5nfE9UMxKxgXj4mD3voiP+YQ6gdt6KMFOKM=
+cloud.google.com/go v0.107.0/go.mod h1:wpc2eNrD7hXUTy8EKS10jkxpZBjASrORK7goS+3YX2I=
+cloud.google.com/go v0.110.0/go.mod h1:SJnCLqQ0FCFGSZMUNUf84MV3Aia54kn7pi8st7tMzaY=
+cloud.google.com/go v0.110.2/go.mod h1:k04UEeEtb6ZBRTv3dZz4CeJC3jKGxyhl0sAiVVquxiw=
+cloud.google.com/go/accessapproval v1.4.0/go.mod h1:zybIuC3KpDOvotz59lFe5qxRZx6C75OtwbisN56xYB4=
+cloud.google.com/go/accessapproval v1.5.0/go.mod h1:HFy3tuiGvMdcd/u+Cu5b9NkO1pEICJ46IR82PoUdplw=
+cloud.google.com/go/accessapproval v1.6.0/go.mod h1:R0EiYnwV5fsRFiKZkPHr6mwyk2wxUJ30nL4j2pcFY2E=
+cloud.google.com/go/accesscontextmanager v1.3.0/go.mod h1:TgCBehyr5gNMz7ZaH9xubp+CE8dkrszb4oK9CWyvD4o=
+cloud.google.com/go/accesscontextmanager v1.4.0/go.mod h1:/Kjh7BBu/Gh83sv+K60vN9QE5NJcd80sU33vIe2IFPE=
+cloud.google.com/go/accesscontextmanager v1.6.0/go.mod h1:8XCvZWfYw3K/ji0iVnp+6pu7huxoQTLmxAbVjbloTtM=
+cloud.google.com/go/accesscontextmanager v1.7.0/go.mod h1:CEGLewx8dwa33aDAZQujl7Dx+uYhS0eay198wB/VumQ=
+cloud.google.com/go/aiplatform v1.22.0/go.mod h1:ig5Nct50bZlzV6NvKaTwmplLLddFx0YReh9WfTO5jKw=
+cloud.google.com/go/aiplatform v1.24.0/go.mod h1:67UUvRBKG6GTayHKV8DBv2RtR1t93YRu5B1P3x99mYY=
+cloud.google.com/go/aiplatform v1.27.0/go.mod h1:Bvxqtl40l0WImSb04d0hXFU7gDOiq9jQmorivIiWcKg=
+cloud.google.com/go/aiplatform v1.35.0/go.mod h1:7MFT/vCaOyZT/4IIFfxH4ErVg/4ku6lKv3w0+tFTgXQ=
+cloud.google.com/go/aiplatform v1.36.1/go.mod h1:WTm12vJRPARNvJ+v6P52RDHCNe4AhvjcIZ/9/RRHy/k=
+cloud.google.com/go/aiplatform v1.37.0/go.mod h1:IU2Cv29Lv9oCn/9LkFiiuKfwrRTq+QQMbW+hPCxJGZw=
+cloud.google.com/go/analytics v0.11.0/go.mod h1:DjEWCu41bVbYcKyvlws9Er60YE4a//bK6mnhWvQeFNI=
+cloud.google.com/go/analytics v0.12.0/go.mod h1:gkfj9h6XRf9+TS4bmuhPEShsh3hH8PAZzm/41OOhQd4=
+cloud.google.com/go/analytics v0.17.0/go.mod h1:WXFa3WSym4IZ+JiKmavYdJwGG/CvpqiqczmL59bTD9M=
+cloud.google.com/go/analytics v0.18.0/go.mod h1:ZkeHGQlcIPkw0R/GW+boWHhCOR43xz9RN/jn7WcqfIE=
+cloud.google.com/go/analytics v0.19.0/go.mod h1:k8liqf5/HCnOUkbawNtrWWc+UAzyDlW89doe8TtoDsE=
+cloud.google.com/go/apigateway v1.3.0/go.mod h1:89Z8Bhpmxu6AmUxuVRg/ECRGReEdiP3vQtk4Z1J9rJk=
+cloud.google.com/go/apigateway v1.4.0/go.mod h1:pHVY9MKGaH9PQ3pJ4YLzoj6U5FUDeDFBllIz7WmzJoc=
+cloud.google.com/go/apigateway v1.5.0/go.mod h1:GpnZR3Q4rR7LVu5951qfXPJCHquZt02jf7xQx7kpqN8=
+cloud.google.com/go/apigeeconnect v1.3.0/go.mod h1:G/AwXFAKo0gIXkPTVfZDd2qA1TxBXJ3MgMRBQkIi9jc=
+cloud.google.com/go/apigeeconnect v1.4.0/go.mod h1:kV4NwOKqjvt2JYR0AoIWo2QGfoRtn/pkS3QlHp0Ni04=
+cloud.google.com/go/apigeeconnect v1.5.0/go.mod h1:KFaCqvBRU6idyhSNyn3vlHXc8VMDJdRmwDF6JyFRqZ8=
+cloud.google.com/go/apigeeregistry v0.4.0/go.mod h1:EUG4PGcsZvxOXAdyEghIdXwAEi/4MEaoqLMLDMIwKXY=
+cloud.google.com/go/apigeeregistry v0.5.0/go.mod h1:YR5+s0BVNZfVOUkMa5pAR2xGd0A473vA5M7j247o1wM=
+cloud.google.com/go/apigeeregistry v0.6.0/go.mod h1:BFNzW7yQVLZ3yj0TKcwzb8n25CFBri51GVGOEUcgQsc=
+cloud.google.com/go/apikeys v0.4.0/go.mod h1:XATS/yqZbaBK0HOssf+ALHp8jAlNHUgyfprvNcBIszU=
+cloud.google.com/go/apikeys v0.5.0/go.mod h1:5aQfwY4D+ewMMWScd3hm2en3hCj+BROlyrt3ytS7KLI=
+cloud.google.com/go/apikeys v0.6.0/go.mod h1:kbpXu5upyiAlGkKrJgQl8A0rKNNJ7dQ377pdroRSSi8=
+cloud.google.com/go/appengine v1.4.0/go.mod h1:CS2NhuBuDXM9f+qscZ6V86m1MIIqPj3WC/UoEuR1Sno=
+cloud.google.com/go/appengine v1.5.0/go.mod h1:TfasSozdkFI0zeoxW3PTBLiNqRmzraodCWatWI9Dmak=
+cloud.google.com/go/appengine v1.6.0/go.mod h1:hg6i0J/BD2cKmDJbaFSYHFyZkgBEfQrDg/X0V5fJn84=
+cloud.google.com/go/appengine v1.7.0/go.mod h1:eZqpbHFCqRGa2aCdope7eC0SWLV1j0neb/QnMJVWx6A=
+cloud.google.com/go/appengine v1.7.1/go.mod h1:IHLToyb/3fKutRysUlFO0BPt5j7RiQ45nrzEJmKTo6E=
+cloud.google.com/go/area120 v0.5.0/go.mod h1:DE/n4mp+iqVyvxHN41Vf1CR602GiHQjFPusMFW6bGR4=
+cloud.google.com/go/area120 v0.6.0/go.mod h1:39yFJqWVgm0UZqWTOdqkLhjoC7uFfgXRC8g/ZegeAh0=
+cloud.google.com/go/area120 v0.7.0/go.mod h1:a3+8EUD1SX5RUcCs3MY5YasiO1z6yLiNLRiFrykbynY=
+cloud.google.com/go/area120 v0.7.1/go.mod h1:j84i4E1RboTWjKtZVWXPqvK5VHQFJRF2c1Nm69pWm9k=
+cloud.google.com/go/artifactregistry v1.6.0/go.mod h1:IYt0oBPSAGYj/kprzsBjZ/4LnG/zOcHyFHjWPCi6SAQ=
+cloud.google.com/go/artifactregistry v1.7.0/go.mod h1:mqTOFOnGZx8EtSqK/ZWcsm/4U8B77rbcLP6ruDU2Ixk=
+cloud.google.com/go/artifactregistry v1.8.0/go.mod h1:w3GQXkJX8hiKN0v+at4b0qotwijQbYUqF2GWkZzAhC0=
+cloud.google.com/go/artifactregistry v1.9.0/go.mod h1:2K2RqvA2CYvAeARHRkLDhMDJ3OXy26h3XW+3/Jh2uYc=
+cloud.google.com/go/artifactregistry v1.11.1/go.mod h1:lLYghw+Itq9SONbCa1YWBoWs1nOucMH0pwXN1rOBZFI=
+cloud.google.com/go/artifactregistry v1.11.2/go.mod h1:nLZns771ZGAwVLzTX/7Al6R9ehma4WUEhZGWV6CeQNQ=
+cloud.google.com/go/artifactregistry v1.12.0/go.mod h1:o6P3MIvtzTOnmvGagO9v/rOjjA0HmhJ+/6KAXrmYDCI=
+cloud.google.com/go/artifactregistry v1.13.0/go.mod h1:uy/LNfoOIivepGhooAUpL1i30Hgee3Cu0l4VTWHUC08=
+cloud.google.com/go/asset v1.5.0/go.mod h1:5mfs8UvcM5wHhqtSv8J1CtxxaQq3AdBxxQi2jGW/K4o=
+cloud.google.com/go/asset v1.7.0/go.mod h1:YbENsRK4+xTiL+Ofoj5Ckf+O17kJtgp3Y3nn4uzZz5s=
+cloud.google.com/go/asset v1.8.0/go.mod h1:mUNGKhiqIdbr8X7KNayoYvyc4HbbFO9URsjbytpUaW0=
+cloud.google.com/go/asset v1.9.0/go.mod h1:83MOE6jEJBMqFKadM9NLRcs80Gdw76qGuHn8m3h8oHQ=
+cloud.google.com/go/asset v1.10.0/go.mod h1:pLz7uokL80qKhzKr4xXGvBQXnzHn5evJAEAtZiIb0wY=
+cloud.google.com/go/asset v1.11.1/go.mod h1:fSwLhbRvC9p9CXQHJ3BgFeQNM4c9x10lqlrdEUYXlJo=
+cloud.google.com/go/asset v1.12.0/go.mod h1:h9/sFOa4eDIyKmH6QMpm4eUK3pDojWnUhTgJlk762Hg=
+cloud.google.com/go/asset v1.13.0/go.mod h1:WQAMyYek/b7NBpYq/K4KJWcRqzoalEsxz/t/dTk4THw=
+cloud.google.com/go/assuredworkloads v1.5.0/go.mod h1:n8HOZ6pff6re5KYfBXcFvSViQjDwxFkAkmUFffJRbbY=
+cloud.google.com/go/assuredworkloads v1.6.0/go.mod h1:yo2YOk37Yc89Rsd5QMVECvjaMKymF9OP+QXWlKXUkXw=
+cloud.google.com/go/assuredworkloads v1.7.0/go.mod h1:z/736/oNmtGAyU47reJgGN+KVoYoxeLBoj4XkKYscNI=
+cloud.google.com/go/assuredworkloads v1.8.0/go.mod h1:AsX2cqyNCOvEQC8RMPnoc0yEarXQk6WEKkxYfL6kGIo=
+cloud.google.com/go/assuredworkloads v1.9.0/go.mod h1:kFuI1P78bplYtT77Tb1hi0FMxM0vVpRC7VVoJC3ZoT0=
+cloud.google.com/go/assuredworkloads v1.10.0/go.mod h1:kwdUQuXcedVdsIaKgKTp9t0UJkE5+PAVNhdQm4ZVq2E=
+cloud.google.com/go/automl v1.5.0/go.mod h1:34EjfoFGMZ5sgJ9EoLsRtdPSNZLcfflJR39VbVNS2M0=
+cloud.google.com/go/automl v1.6.0/go.mod h1:ugf8a6Fx+zP0D59WLhqgTDsQI9w07o64uf/Is3Nh5p8=
+cloud.google.com/go/automl v1.7.0/go.mod h1:RL9MYCCsJEOmt0Wf3z9uzG0a7adTT1fe+aObgSpkCt8=
+cloud.google.com/go/automl v1.8.0/go.mod h1:xWx7G/aPEe/NP+qzYXktoBSDfjO+vnKMGgsApGJJquM=
+cloud.google.com/go/automl v1.12.0/go.mod h1:tWDcHDp86aMIuHmyvjuKeeHEGq76lD7ZqfGLN6B0NuU=
+cloud.google.com/go/baremetalsolution v0.3.0/go.mod h1:XOrocE+pvK1xFfleEnShBlNAXf+j5blPPxrhjKgnIFc=
+cloud.google.com/go/baremetalsolution v0.4.0/go.mod h1:BymplhAadOO/eBa7KewQ0Ppg4A4Wplbn+PsFKRLo0uI=
+cloud.google.com/go/baremetalsolution v0.5.0/go.mod h1:dXGxEkmR9BMwxhzBhV0AioD0ULBmuLZI8CdwalUxuss=
+cloud.google.com/go/batch v0.3.0/go.mod h1:TR18ZoAekj1GuirsUsR1ZTKN3FC/4UDnScjT8NXImFE=
+cloud.google.com/go/batch v0.4.0/go.mod h1:WZkHnP43R/QCGQsZ+0JyG4i79ranE2u8xvjq/9+STPE=
+cloud.google.com/go/batch v0.7.0/go.mod h1:vLZN95s6teRUqRQ4s3RLDsH8PvboqBK+rn1oevL159g=
+cloud.google.com/go/beyondcorp v0.2.0/go.mod h1:TB7Bd+EEtcw9PCPQhCJtJGjk/7TC6ckmnSFS+xwTfm4=
+cloud.google.com/go/beyondcorp v0.3.0/go.mod h1:E5U5lcrcXMsCuoDNyGrpyTm/hn7ne941Jz2vmksAxW8=
+cloud.google.com/go/beyondcorp v0.4.0/go.mod h1:3ApA0mbhHx6YImmuubf5pyW8srKnCEPON32/5hj+RmM=
+cloud.google.com/go/beyondcorp v0.5.0/go.mod h1:uFqj9X+dSfrheVp7ssLTaRHd2EHqSL4QZmH4e8WXGGU=
cloud.google.com/go/bigquery v1.0.1/go.mod h1:i/xbL2UlR5RvWAURpBYZTtm/cXjCha9lbfbpx4poX+o=
cloud.google.com/go/bigquery v1.3.0/go.mod h1:PjpwJnslEMmckchkHFfq+HTD2DmtT67aNFKH1/VBDHE=
cloud.google.com/go/bigquery v1.4.0/go.mod h1:S8dzgnTigyfTmLBfrtrhyYhwRxG72rYxvftPBK2Dvzc=
cloud.google.com/go/bigquery v1.5.0/go.mod h1:snEHRnqQbz117VIFhE8bmtwIDY80NLUZUMb4Nv6dBIg=
cloud.google.com/go/bigquery v1.7.0/go.mod h1://okPTzCYNXSlb24MZs83e2Do+h+VXtc4gLoIoXIAPc=
cloud.google.com/go/bigquery v1.8.0/go.mod h1:J5hqkt3O0uAFnINi6JXValWIb1v0goeZM77hZzJN/fQ=
+cloud.google.com/go/bigquery v1.42.0/go.mod h1:8dRTJxhtG+vwBKzE5OseQn/hiydoQN3EedCaOdYmxRA=
+cloud.google.com/go/bigquery v1.43.0/go.mod h1:ZMQcXHsl+xmU1z36G2jNGZmKp9zNY5BUua5wDgmNCfw=
+cloud.google.com/go/bigquery v1.44.0/go.mod h1:0Y33VqXTEsbamHJvJHdFmtqHvMIY28aK1+dFsvaChGc=
+cloud.google.com/go/bigquery v1.47.0/go.mod h1:sA9XOgy0A8vQK9+MWhEQTY6Tix87M/ZurWFIxmF9I/E=
+cloud.google.com/go/bigquery v1.48.0/go.mod h1:QAwSz+ipNgfL5jxiaK7weyOhzdoAy1zFm0Nf1fysJac=
+cloud.google.com/go/bigquery v1.49.0/go.mod h1:Sv8hMmTFFYBlt/ftw2uN6dFdQPzBlREY9yBh7Oy7/4Q=
+cloud.google.com/go/bigquery v1.50.0/go.mod h1:YrleYEh2pSEbgTBZYMJ5SuSr0ML3ypjRB1zgf7pvQLU=
+cloud.google.com/go/billing v1.4.0/go.mod h1:g9IdKBEFlItS8bTtlrZdVLWSSdSyFUZKXNS02zKMOZY=
+cloud.google.com/go/billing v1.5.0/go.mod h1:mztb1tBc3QekhjSgmpf/CV4LzWXLzCArwpLmP2Gm88s=
+cloud.google.com/go/billing v1.6.0/go.mod h1:WoXzguj+BeHXPbKfNWkqVtDdzORazmCjraY+vrxcyvI=
+cloud.google.com/go/billing v1.7.0/go.mod h1:q457N3Hbj9lYwwRbnlD7vUpyjq6u5U1RAOArInEiD5Y=
+cloud.google.com/go/billing v1.12.0/go.mod h1:yKrZio/eu+okO/2McZEbch17O5CB5NpZhhXG6Z766ss=
+cloud.google.com/go/billing v1.13.0/go.mod h1:7kB2W9Xf98hP9Sr12KfECgfGclsH3CQR0R08tnRlRbc=
+cloud.google.com/go/binaryauthorization v1.1.0/go.mod h1:xwnoWu3Y84jbuHa0zd526MJYmtnVXn0syOjaJgy4+dM=
+cloud.google.com/go/binaryauthorization v1.2.0/go.mod h1:86WKkJHtRcv5ViNABtYMhhNWRrD1Vpi//uKEy7aYEfI=
+cloud.google.com/go/binaryauthorization v1.3.0/go.mod h1:lRZbKgjDIIQvzYQS1p99A7/U1JqvqeZg0wiI5tp6tg0=
+cloud.google.com/go/binaryauthorization v1.4.0/go.mod h1:tsSPQrBd77VLplV70GUhBf/Zm3FsKmgSqgm4UmiDItk=
+cloud.google.com/go/binaryauthorization v1.5.0/go.mod h1:OSe4OU1nN/VswXKRBmciKpo9LulY41gch5c68htf3/Q=
+cloud.google.com/go/certificatemanager v1.3.0/go.mod h1:n6twGDvcUBFu9uBgt4eYvvf3sQ6My8jADcOVwHmzadg=
+cloud.google.com/go/certificatemanager v1.4.0/go.mod h1:vowpercVFyqs8ABSmrdV+GiFf2H/ch3KyudYQEMM590=
+cloud.google.com/go/certificatemanager v1.6.0/go.mod h1:3Hh64rCKjRAX8dXgRAyOcY5vQ/fE1sh8o+Mdd6KPgY8=
+cloud.google.com/go/channel v1.8.0/go.mod h1:W5SwCXDJsq/rg3tn3oG0LOxpAo6IMxNa09ngphpSlnk=
+cloud.google.com/go/channel v1.9.0/go.mod h1:jcu05W0my9Vx4mt3/rEHpfxc9eKi9XwsdDL8yBMbKUk=
+cloud.google.com/go/channel v1.11.0/go.mod h1:IdtI0uWGqhEeatSB62VOoJ8FSUhJ9/+iGkJVqp74CGE=
+cloud.google.com/go/channel v1.12.0/go.mod h1:VkxCGKASi4Cq7TbXxlaBezonAYpp1GCnKMY6tnMQnLU=
+cloud.google.com/go/cloudbuild v1.3.0/go.mod h1:WequR4ULxlqvMsjDEEEFnOG5ZSRSgWOywXYDb1vPE6U=
+cloud.google.com/go/cloudbuild v1.4.0/go.mod h1:5Qwa40LHiOXmz3386FrjrYM93rM/hdRr7b53sySrTqA=
+cloud.google.com/go/cloudbuild v1.6.0/go.mod h1:UIbc/w9QCbH12xX+ezUsgblrWv+Cv4Tw83GiSMHOn9M=
+cloud.google.com/go/cloudbuild v1.7.0/go.mod h1:zb5tWh2XI6lR9zQmsm1VRA+7OCuve5d8S+zJUul8KTg=
+cloud.google.com/go/cloudbuild v1.9.0/go.mod h1:qK1d7s4QlO0VwfYn5YuClDGg2hfmLZEb4wQGAbIgL1s=
+cloud.google.com/go/clouddms v1.3.0/go.mod h1:oK6XsCDdW4Ib3jCCBugx+gVjevp2TMXFtgxvPSee3OM=
+cloud.google.com/go/clouddms v1.4.0/go.mod h1:Eh7sUGCC+aKry14O1NRljhjyrr0NFC0G2cjwX0cByRk=
+cloud.google.com/go/clouddms v1.5.0/go.mod h1:QSxQnhikCLUw13iAbffF2CZxAER3xDGNHjsTAkQJcQA=
+cloud.google.com/go/cloudtasks v1.5.0/go.mod h1:fD92REy1x5woxkKEkLdvavGnPJGEn8Uic9nWuLzqCpY=
+cloud.google.com/go/cloudtasks v1.6.0/go.mod h1:C6Io+sxuke9/KNRkbQpihnW93SWDU3uXt92nu85HkYI=
+cloud.google.com/go/cloudtasks v1.7.0/go.mod h1:ImsfdYWwlWNJbdgPIIGJWC+gemEGTBK/SunNQQNCAb4=
+cloud.google.com/go/cloudtasks v1.8.0/go.mod h1:gQXUIwCSOI4yPVK7DgTVFiiP0ZW/eQkydWzwVMdHxrI=
+cloud.google.com/go/cloudtasks v1.9.0/go.mod h1:w+EyLsVkLWHcOaqNEyvcKAsWp9p29dL6uL9Nst1cI7Y=
+cloud.google.com/go/cloudtasks v1.10.0/go.mod h1:NDSoTLkZ3+vExFEWu2UJV1arUyzVDAiZtdWcsUyNwBs=
+cloud.google.com/go/compute v0.1.0/go.mod h1:GAesmwr110a34z04OlxYkATPBEfVhkymfTBXtfbBFow=
+cloud.google.com/go/compute v1.3.0/go.mod h1:cCZiE1NHEtai4wiufUhW8I8S1JKkAnhnQJWM7YD99wM=
+cloud.google.com/go/compute v1.5.0/go.mod h1:9SMHyhJlzhlkJqrPAc839t2BZFTSk6Jdj6mkzQJeu0M=
+cloud.google.com/go/compute v1.6.0/go.mod h1:T29tfhtVbq1wvAPo0E3+7vhgmkOYeXjhFvz/FMzPu0s=
+cloud.google.com/go/compute v1.6.1/go.mod h1:g85FgpzFvNULZ+S8AYq87axRKuf2Kh7deLqV/jJ3thU=
+cloud.google.com/go/compute v1.7.0/go.mod h1:435lt8av5oL9P3fv1OEzSbSUe+ybHXGMPQHHZWZxy9U=
+cloud.google.com/go/compute v1.10.0/go.mod h1:ER5CLbMxl90o2jtNbGSbtfOpQKR0t15FOtRsugnLrlU=
+cloud.google.com/go/compute v1.12.0/go.mod h1:e8yNOBcBONZU1vJKCvCoDw/4JQsA0dpM4x/6PIIOocU=
+cloud.google.com/go/compute v1.12.1/go.mod h1:e8yNOBcBONZU1vJKCvCoDw/4JQsA0dpM4x/6PIIOocU=
+cloud.google.com/go/compute v1.13.0/go.mod h1:5aPTS0cUNMIc1CE546K+Th6weJUNQErARyZtRXDJ8GE=
+cloud.google.com/go/compute v1.14.0/go.mod h1:YfLtxrj9sU4Yxv+sXzZkyPjEyPBZfXHUvjxega5vAdo=
+cloud.google.com/go/compute v1.15.1/go.mod h1:bjjoF/NtFUrkD/urWfdHaKuOPDR5nWIs63rR+SXhcpA=
+cloud.google.com/go/compute v1.18.0/go.mod h1:1X7yHxec2Ga+Ss6jPyjxRxpu2uu7PLgsOVXvgU0yacs=
+cloud.google.com/go/compute v1.19.0/go.mod h1:rikpw2y+UMidAe9tISo04EHNOIf42RLYF/q8Bs93scU=
+cloud.google.com/go/compute v1.19.3/go.mod h1:qxvISKp/gYnXkSAD1ppcSOveRAmzxicEv/JlizULFrI=
+cloud.google.com/go/compute v1.20.1/go.mod h1:4tCnrn48xsqlwSAiLf1HXMQk8CONslYbdiEZc9FEIbM=
+cloud.google.com/go/compute/metadata v0.1.0/go.mod h1:Z1VN+bulIf6bt4P/C37K4DyZYZEXYonfTBHHFPO/4UU=
+cloud.google.com/go/compute/metadata v0.2.0/go.mod h1:zFmK7XCadkQkj6TtorcaGlCW1hT1fIilQDwofLpJ20k=
+cloud.google.com/go/compute/metadata v0.2.1/go.mod h1:jgHgmJd2RKBGzXqF5LR2EZMGxBkeanZ9wwa75XHJgOM=
+cloud.google.com/go/compute/metadata v0.2.3/go.mod h1:VAV5nSsACxMJvgaAuX6Pk2AawlZn8kiOGuCv6gTkwuA=
+cloud.google.com/go/contactcenterinsights v1.3.0/go.mod h1:Eu2oemoePuEFc/xKFPjbTuPSj0fYJcPls9TFlPNnHHY=
+cloud.google.com/go/contactcenterinsights v1.4.0/go.mod h1:L2YzkGbPsv+vMQMCADxJoT9YiTTnSEd6fEvCeHTYVck=
+cloud.google.com/go/contactcenterinsights v1.6.0/go.mod h1:IIDlT6CLcDoyv79kDv8iWxMSTZhLxSCofVV5W6YFM/w=
+cloud.google.com/go/container v1.6.0/go.mod h1:Xazp7GjJSeUYo688S+6J5V+n/t+G5sKBTFkKNudGRxg=
+cloud.google.com/go/container v1.7.0/go.mod h1:Dp5AHtmothHGX3DwwIHPgq45Y8KmNsgN3amoYfxVkLo=
+cloud.google.com/go/container v1.13.1/go.mod h1:6wgbMPeQRw9rSnKBCAJXnds3Pzj03C4JHamr8asWKy4=
+cloud.google.com/go/container v1.14.0/go.mod h1:3AoJMPhHfLDxLvrlVWaK57IXzaPnLaZq63WX59aQBfM=
+cloud.google.com/go/container v1.15.0/go.mod h1:ft+9S0WGjAyjDggg5S06DXj+fHJICWg8L7isCQe9pQA=
+cloud.google.com/go/containeranalysis v0.5.1/go.mod h1:1D92jd8gRR/c0fGMlymRgxWD3Qw9C1ff6/T7mLgVL8I=
+cloud.google.com/go/containeranalysis v0.6.0/go.mod h1:HEJoiEIu+lEXM+k7+qLCci0h33lX3ZqoYFdmPcoO7s4=
+cloud.google.com/go/containeranalysis v0.7.0/go.mod h1:9aUL+/vZ55P2CXfuZjS4UjQ9AgXoSw8Ts6lemfmxBxI=
+cloud.google.com/go/containeranalysis v0.9.0/go.mod h1:orbOANbwk5Ejoom+s+DUCTTJ7IBdBQJDcSylAx/on9s=
+cloud.google.com/go/datacatalog v1.3.0/go.mod h1:g9svFY6tuR+j+hrTw3J2dNcmI0dzmSiyOzm8kpLq0a0=
+cloud.google.com/go/datacatalog v1.5.0/go.mod h1:M7GPLNQeLfWqeIm3iuiruhPzkt65+Bx8dAKvScX8jvs=
+cloud.google.com/go/datacatalog v1.6.0/go.mod h1:+aEyF8JKg+uXcIdAmmaMUmZ3q1b/lKLtXCmXdnc0lbc=
+cloud.google.com/go/datacatalog v1.7.0/go.mod h1:9mEl4AuDYWw81UGc41HonIHH7/sn52H0/tc8f8ZbZIE=
+cloud.google.com/go/datacatalog v1.8.0/go.mod h1:KYuoVOv9BM8EYz/4eMFxrr4DUKhGIOXxZoKYF5wdISM=
+cloud.google.com/go/datacatalog v1.8.1/go.mod h1:RJ58z4rMp3gvETA465Vg+ag8BGgBdnRPEMMSTr5Uv+M=
+cloud.google.com/go/datacatalog v1.12.0/go.mod h1:CWae8rFkfp6LzLumKOnmVh4+Zle4A3NXLzVJ1d1mRm0=
+cloud.google.com/go/datacatalog v1.13.0/go.mod h1:E4Rj9a5ZtAxcQJlEBTLgMTphfP11/lNaAshpoBgemX8=
+cloud.google.com/go/dataflow v0.6.0/go.mod h1:9QwV89cGoxjjSR9/r7eFDqqjtvbKxAK2BaYU6PVk9UM=
+cloud.google.com/go/dataflow v0.7.0/go.mod h1:PX526vb4ijFMesO1o202EaUmouZKBpjHsTlCtB4parQ=
+cloud.google.com/go/dataflow v0.8.0/go.mod h1:Rcf5YgTKPtQyYz8bLYhFoIV/vP39eL7fWNcSOyFfLJE=
+cloud.google.com/go/dataform v0.3.0/go.mod h1:cj8uNliRlHpa6L3yVhDOBrUXH+BPAO1+KFMQQNSThKo=
+cloud.google.com/go/dataform v0.4.0/go.mod h1:fwV6Y4Ty2yIFL89huYlEkwUPtS7YZinZbzzj5S9FzCE=
+cloud.google.com/go/dataform v0.5.0/go.mod h1:GFUYRe8IBa2hcomWplodVmUx/iTL0FrsauObOM3Ipr0=
+cloud.google.com/go/dataform v0.6.0/go.mod h1:QPflImQy33e29VuapFdf19oPbE4aYTJxr31OAPV+ulA=
+cloud.google.com/go/dataform v0.7.0/go.mod h1:7NulqnVozfHvWUBpMDfKMUESr+85aJsC/2O0o3jWPDE=
+cloud.google.com/go/datafusion v1.4.0/go.mod h1:1Zb6VN+W6ALo85cXnM1IKiPw+yQMKMhB9TsTSRDo/38=
+cloud.google.com/go/datafusion v1.5.0/go.mod h1:Kz+l1FGHB0J+4XF2fud96WMmRiq/wj8N9u007vyXZ2w=
+cloud.google.com/go/datafusion v1.6.0/go.mod h1:WBsMF8F1RhSXvVM8rCV3AeyWVxcC2xY6vith3iw3S+8=
+cloud.google.com/go/datalabeling v0.5.0/go.mod h1:TGcJ0G2NzcsXSE/97yWjIZO0bXj0KbVlINXMG9ud42I=
+cloud.google.com/go/datalabeling v0.6.0/go.mod h1:WqdISuk/+WIGeMkpw/1q7bK/tFEZxsrFJOJdY2bXvTQ=
+cloud.google.com/go/datalabeling v0.7.0/go.mod h1:WPQb1y08RJbmpM3ww0CSUAGweL0SxByuW2E+FU+wXcM=
+cloud.google.com/go/dataplex v1.3.0/go.mod h1:hQuRtDg+fCiFgC8j0zV222HvzFQdRd+SVX8gdmFcZzA=
+cloud.google.com/go/dataplex v1.4.0/go.mod h1:X51GfLXEMVJ6UN47ESVqvlsRplbLhcsAt0kZCCKsU0A=
+cloud.google.com/go/dataplex v1.5.2/go.mod h1:cVMgQHsmfRoI5KFYq4JtIBEUbYwc3c7tXmIDhRmNNVQ=
+cloud.google.com/go/dataplex v1.6.0/go.mod h1:bMsomC/aEJOSpHXdFKFGQ1b0TDPIeL28nJObeO1ppRs=
+cloud.google.com/go/dataproc v1.7.0/go.mod h1:CKAlMjII9H90RXaMpSxQ8EU6dQx6iAYNPcYPOkSbi8s=
+cloud.google.com/go/dataproc v1.8.0/go.mod h1:5OW+zNAH0pMpw14JVrPONsxMQYMBqJuzORhIBfBn9uI=
+cloud.google.com/go/dataproc v1.12.0/go.mod h1:zrF3aX0uV3ikkMz6z4uBbIKyhRITnxvr4i3IjKsKrw4=
+cloud.google.com/go/dataqna v0.5.0/go.mod h1:90Hyk596ft3zUQ8NkFfvICSIfHFh1Bc7C4cK3vbhkeo=
+cloud.google.com/go/dataqna v0.6.0/go.mod h1:1lqNpM7rqNLVgWBJyk5NF6Uen2PHym0jtVJonplVsDA=
+cloud.google.com/go/dataqna v0.7.0/go.mod h1:Lx9OcIIeqCrw1a6KdO3/5KMP1wAmTc0slZWwP12Qq3c=
cloud.google.com/go/datastore v1.0.0/go.mod h1:LXYbyblFSglQ5pkeyhO+Qmw7ukd3C+pD7TKLgZqpHYE=
cloud.google.com/go/datastore v1.1.0/go.mod h1:umbIZjpQpHh4hmRpGhH4tLFup+FVzqBi1b3c64qFpCk=
+cloud.google.com/go/datastore v1.10.0/go.mod h1:PC5UzAmDEkAmkfaknstTYbNpgE49HAgW2J1gcgUfmdM=
+cloud.google.com/go/datastore v1.11.0/go.mod h1:TvGxBIHCS50u8jzG+AW/ppf87v1of8nwzFNgEZU1D3c=
+cloud.google.com/go/datastream v1.2.0/go.mod h1:i/uTP8/fZwgATHS/XFu0TcNUhuA0twZxxQ3EyCUQMwo=
+cloud.google.com/go/datastream v1.3.0/go.mod h1:cqlOX8xlyYF/uxhiKn6Hbv6WjwPPuI9W2M9SAXwaLLQ=
+cloud.google.com/go/datastream v1.4.0/go.mod h1:h9dpzScPhDTs5noEMQVWP8Wx8AFBRyS0s8KWPx/9r0g=
+cloud.google.com/go/datastream v1.5.0/go.mod h1:6TZMMNPwjUqZHBKPQ1wwXpb0d5VDVPl2/XoS5yi88q4=
+cloud.google.com/go/datastream v1.6.0/go.mod h1:6LQSuswqLa7S4rPAOZFVjHIG3wJIjZcZrw8JDEDJuIs=
+cloud.google.com/go/datastream v1.7.0/go.mod h1:uxVRMm2elUSPuh65IbZpzJNMbuzkcvu5CjMqVIUHrww=
+cloud.google.com/go/deploy v1.4.0/go.mod h1:5Xghikd4VrmMLNaF6FiRFDlHb59VM59YoDQnOUdsH/c=
+cloud.google.com/go/deploy v1.5.0/go.mod h1:ffgdD0B89tToyW/U/D2eL0jN2+IEV/3EMuXHA0l4r+s=
+cloud.google.com/go/deploy v1.6.0/go.mod h1:f9PTHehG/DjCom3QH0cntOVRm93uGBDt2vKzAPwpXQI=
+cloud.google.com/go/deploy v1.8.0/go.mod h1:z3myEJnA/2wnB4sgjqdMfgxCA0EqC3RBTNcVPs93mtQ=
+cloud.google.com/go/dialogflow v1.15.0/go.mod h1:HbHDWs33WOGJgn6rfzBW1Kv807BE3O1+xGbn59zZWI4=
+cloud.google.com/go/dialogflow v1.16.1/go.mod h1:po6LlzGfK+smoSmTBnbkIZY2w8ffjz/RcGSS+sh1el0=
+cloud.google.com/go/dialogflow v1.17.0/go.mod h1:YNP09C/kXA1aZdBgC/VtXX74G/TKn7XVCcVumTflA+8=
+cloud.google.com/go/dialogflow v1.18.0/go.mod h1:trO7Zu5YdyEuR+BhSNOqJezyFQ3aUzz0njv7sMx/iek=
+cloud.google.com/go/dialogflow v1.19.0/go.mod h1:JVmlG1TwykZDtxtTXujec4tQ+D8SBFMoosgy+6Gn0s0=
+cloud.google.com/go/dialogflow v1.29.0/go.mod h1:b+2bzMe+k1s9V+F2jbJwpHPzrnIyHihAdRFMtn2WXuM=
+cloud.google.com/go/dialogflow v1.31.0/go.mod h1:cuoUccuL1Z+HADhyIA7dci3N5zUssgpBJmCzI6fNRB4=
+cloud.google.com/go/dialogflow v1.32.0/go.mod h1:jG9TRJl8CKrDhMEcvfcfFkkpp8ZhgPz3sBGmAUYJ2qE=
+cloud.google.com/go/dlp v1.6.0/go.mod h1:9eyB2xIhpU0sVwUixfBubDoRwP+GjeUoxxeueZmqvmM=
+cloud.google.com/go/dlp v1.7.0/go.mod h1:68ak9vCiMBjbasxeVD17hVPxDEck+ExiHavX8kiHG+Q=
+cloud.google.com/go/dlp v1.9.0/go.mod h1:qdgmqgTyReTz5/YNSSuueR8pl7hO0o9bQ39ZhtgkWp4=
+cloud.google.com/go/documentai v1.7.0/go.mod h1:lJvftZB5NRiFSX4moiye1SMxHx0Bc3x1+p9e/RfXYiU=
+cloud.google.com/go/documentai v1.8.0/go.mod h1:xGHNEB7CtsnySCNrCFdCyyMz44RhFEEX2Q7UD0c5IhU=
+cloud.google.com/go/documentai v1.9.0/go.mod h1:FS5485S8R00U10GhgBC0aNGrJxBP8ZVpEeJ7PQDZd6k=
+cloud.google.com/go/documentai v1.10.0/go.mod h1:vod47hKQIPeCfN2QS/jULIvQTugbmdc0ZvxxfQY1bg4=
+cloud.google.com/go/documentai v1.16.0/go.mod h1:o0o0DLTEZ+YnJZ+J4wNfTxmDVyrkzFvttBXXtYRMHkM=
+cloud.google.com/go/documentai v1.18.0/go.mod h1:F6CK6iUH8J81FehpskRmhLq/3VlwQvb7TvwOceQ2tbs=
+cloud.google.com/go/domains v0.6.0/go.mod h1:T9Rz3GasrpYk6mEGHh4rymIhjlnIuB4ofT1wTxDeT4Y=
+cloud.google.com/go/domains v0.7.0/go.mod h1:PtZeqS1xjnXuRPKE/88Iru/LdfoRyEHYA9nFQf4UKpg=
+cloud.google.com/go/domains v0.8.0/go.mod h1:M9i3MMDzGFXsydri9/vW+EWz9sWb4I6WyHqdlAk0idE=
+cloud.google.com/go/edgecontainer v0.1.0/go.mod h1:WgkZ9tp10bFxqO8BLPqv2LlfmQF1X8lZqwW4r1BTajk=
+cloud.google.com/go/edgecontainer v0.2.0/go.mod h1:RTmLijy+lGpQ7BXuTDa4C4ssxyXT34NIuHIgKuP4s5w=
+cloud.google.com/go/edgecontainer v0.3.0/go.mod h1:FLDpP4nykgwwIfcLt6zInhprzw0lEi2P1fjO6Ie0qbc=
+cloud.google.com/go/edgecontainer v1.0.0/go.mod h1:cttArqZpBB2q58W/upSG++ooo6EsblxDIolxa3jSjbY=
+cloud.google.com/go/errorreporting v0.3.0/go.mod h1:xsP2yaAp+OAW4OIm60An2bbLpqIhKXdWR/tawvl7QzU=
+cloud.google.com/go/essentialcontacts v1.3.0/go.mod h1:r+OnHa5jfj90qIfZDO/VztSFqbQan7HV75p8sA+mdGI=
+cloud.google.com/go/essentialcontacts v1.4.0/go.mod h1:8tRldvHYsmnBCHdFpvU+GL75oWiBKl80BiqlFh9tp+8=
+cloud.google.com/go/essentialcontacts v1.5.0/go.mod h1:ay29Z4zODTuwliK7SnX8E86aUF2CTzdNtvv42niCX0M=
+cloud.google.com/go/eventarc v1.7.0/go.mod h1:6ctpF3zTnaQCxUjHUdcfgcA1A2T309+omHZth7gDfmc=
+cloud.google.com/go/eventarc v1.8.0/go.mod h1:imbzxkyAU4ubfsaKYdQg04WS1NvncblHEup4kvF+4gw=
+cloud.google.com/go/eventarc v1.10.0/go.mod h1:u3R35tmZ9HvswGRBnF48IlYgYeBcPUCjkr4BTdem2Kw=
+cloud.google.com/go/eventarc v1.11.0/go.mod h1:PyUjsUKPWoRBCHeOxZd/lbOOjahV41icXyUY5kSTvVY=
+cloud.google.com/go/filestore v1.3.0/go.mod h1:+qbvHGvXU1HaKX2nD0WEPo92TP/8AQuCVEBXNY9z0+w=
+cloud.google.com/go/filestore v1.4.0/go.mod h1:PaG5oDfo9r224f8OYXURtAsY+Fbyq/bLYoINEK8XQAI=
+cloud.google.com/go/filestore v1.5.0/go.mod h1:FqBXDWBp4YLHqRnVGveOkHDf8svj9r5+mUDLupOWEDs=
+cloud.google.com/go/filestore v1.6.0/go.mod h1:di5unNuss/qfZTw2U9nhFqo8/ZDSc466dre85Kydllg=
+cloud.google.com/go/firestore v1.9.0/go.mod h1:HMkjKHNTtRyZNiMzu7YAsLr9K3X2udY2AMwDaMEQiiE=
+cloud.google.com/go/functions v1.6.0/go.mod h1:3H1UA3qiIPRWD7PeZKLvHZ9SaQhR26XIJcC0A5GbvAk=
+cloud.google.com/go/functions v1.7.0/go.mod h1:+d+QBcWM+RsrgZfV9xo6KfA1GlzJfxcfZcRPEhDDfzg=
+cloud.google.com/go/functions v1.8.0/go.mod h1:RTZ4/HsQjIqIYP9a9YPbU+QFoQsAlYgrwOXJWHn1POY=
+cloud.google.com/go/functions v1.9.0/go.mod h1:Y+Dz8yGguzO3PpIjhLTbnqV1CWmgQ5UwtlpzoyquQ08=
+cloud.google.com/go/functions v1.10.0/go.mod h1:0D3hEOe3DbEvCXtYOZHQZmD+SzYsi1YbI7dGvHfldXw=
+cloud.google.com/go/functions v1.12.0/go.mod h1:AXWGrF3e2C/5ehvwYo/GH6O5s09tOPksiKhz+hH8WkA=
+cloud.google.com/go/functions v1.13.0/go.mod h1:EU4O007sQm6Ef/PwRsI8N2umygGqPBS/IZQKBQBcJ3c=
+cloud.google.com/go/gaming v1.5.0/go.mod h1:ol7rGcxP/qHTRQE/RO4bxkXq+Fix0j6D4LFPzYTIrDM=
+cloud.google.com/go/gaming v1.6.0/go.mod h1:YMU1GEvA39Qt3zWGyAVA9bpYz/yAhTvaQ1t2sK4KPUA=
+cloud.google.com/go/gaming v1.7.0/go.mod h1:LrB8U7MHdGgFG851iHAfqUdLcKBdQ55hzXy9xBJz0+w=
+cloud.google.com/go/gaming v1.8.0/go.mod h1:xAqjS8b7jAVW0KFYeRUxngo9My3f33kFmua++Pi+ggM=
+cloud.google.com/go/gaming v1.9.0/go.mod h1:Fc7kEmCObylSWLO334NcO+O9QMDyz+TKC4v1D7X+Bc0=
+cloud.google.com/go/gkebackup v0.2.0/go.mod h1:XKvv/4LfG829/B8B7xRkk8zRrOEbKtEam6yNfuQNH60=
+cloud.google.com/go/gkebackup v0.3.0/go.mod h1:n/E671i1aOQvUxT541aTkCwExO/bTer2HDlj4TsBRAo=
+cloud.google.com/go/gkebackup v0.4.0/go.mod h1:byAyBGUwYGEEww7xsbnUTBHIYcOPy/PgUWUtOeRm9Vg=
+cloud.google.com/go/gkeconnect v0.5.0/go.mod h1:c5lsNAg5EwAy7fkqX/+goqFsU1Da/jQFqArp+wGNr/o=
+cloud.google.com/go/gkeconnect v0.6.0/go.mod h1:Mln67KyU/sHJEBY8kFZ0xTeyPtzbq9StAVvEULYK16A=
+cloud.google.com/go/gkeconnect v0.7.0/go.mod h1:SNfmVqPkaEi3bF/B3CNZOAYPYdg7sU+obZ+QTky2Myw=
+cloud.google.com/go/gkehub v0.9.0/go.mod h1:WYHN6WG8w9bXU0hqNxt8rm5uxnk8IH+lPY9J2TV7BK0=
+cloud.google.com/go/gkehub v0.10.0/go.mod h1:UIPwxI0DsrpsVoWpLB0stwKCP+WFVG9+y977wO+hBH0=
+cloud.google.com/go/gkehub v0.11.0/go.mod h1:JOWHlmN+GHyIbuWQPl47/C2RFhnFKH38jH9Ascu3n0E=
+cloud.google.com/go/gkehub v0.12.0/go.mod h1:djiIwwzTTBrF5NaXCGv3mf7klpEMcST17VBTVVDcuaw=
+cloud.google.com/go/gkemulticloud v0.3.0/go.mod h1:7orzy7O0S+5kq95e4Hpn7RysVA7dPs8W/GgfUtsPbrA=
+cloud.google.com/go/gkemulticloud v0.4.0/go.mod h1:E9gxVBnseLWCk24ch+P9+B2CoDFJZTyIgLKSalC7tuI=
+cloud.google.com/go/gkemulticloud v0.5.0/go.mod h1:W0JDkiyi3Tqh0TJr//y19wyb1yf8llHVto2Htf2Ja3Y=
+cloud.google.com/go/grafeas v0.2.0/go.mod h1:KhxgtF2hb0P191HlY5besjYm6MqTSTj3LSI+M+ByZHc=
+cloud.google.com/go/gsuiteaddons v1.3.0/go.mod h1:EUNK/J1lZEZO8yPtykKxLXI6JSVN2rg9bN8SXOa0bgM=
+cloud.google.com/go/gsuiteaddons v1.4.0/go.mod h1:rZK5I8hht7u7HxFQcFei0+AtfS9uSushomRlg+3ua1o=
+cloud.google.com/go/gsuiteaddons v1.5.0/go.mod h1:TFCClYLd64Eaa12sFVmUyG62tk4mdIsI7pAnSXRkcFo=
+cloud.google.com/go/iam v0.1.0/go.mod h1:vcUNEa0pEm0qRVpmWepWaFMIAI8/hjB9mO8rNCJtF6c=
+cloud.google.com/go/iam v0.3.0/go.mod h1:XzJPvDayI+9zsASAFO68Hk07u3z+f+JrT2xXNdp4bnY=
+cloud.google.com/go/iam v0.5.0/go.mod h1:wPU9Vt0P4UmCux7mqtRu6jcpPAb74cP1fh50J3QpkUc=
+cloud.google.com/go/iam v0.6.0/go.mod h1:+1AH33ueBne5MzYccyMHtEKqLE4/kJOibtffMHDMFMc=
+cloud.google.com/go/iam v0.7.0/go.mod h1:H5Br8wRaDGNc8XP3keLc4unfUUZeyH3Sfl9XpQEYOeg=
+cloud.google.com/go/iam v0.8.0/go.mod h1:lga0/y3iH6CX7sYqypWJ33hf7kkfXJag67naqGESjkE=
+cloud.google.com/go/iam v0.11.0/go.mod h1:9PiLDanza5D+oWFZiH1uG+RnRCfEGKoyl6yo4cgWZGY=
+cloud.google.com/go/iam v0.12.0/go.mod h1:knyHGviacl11zrtZUoDuYpDgLjvr28sLQaG0YB2GYAY=
+cloud.google.com/go/iam v0.13.0/go.mod h1:ljOg+rcNfzZ5d6f1nAUJ8ZIxOaZUVoS14bKCtaLZ/D0=
+cloud.google.com/go/iap v1.4.0/go.mod h1:RGFwRJdihTINIe4wZ2iCP0zF/qu18ZwyKxrhMhygBEc=
+cloud.google.com/go/iap v1.5.0/go.mod h1:UH/CGgKd4KyohZL5Pt0jSKE4m3FR51qg6FKQ/z/Ix9A=
+cloud.google.com/go/iap v1.6.0/go.mod h1:NSuvI9C/j7UdjGjIde7t7HBz+QTwBcapPE07+sSRcLk=
+cloud.google.com/go/iap v1.7.0/go.mod h1:beqQx56T9O1G1yNPph+spKpNibDlYIiIixiqsQXxLIo=
+cloud.google.com/go/iap v1.7.1/go.mod h1:WapEwPc7ZxGt2jFGB/C/bm+hP0Y6NXzOYGjpPnmMS74=
+cloud.google.com/go/ids v1.1.0/go.mod h1:WIuwCaYVOzHIj2OhN9HAwvW+DBdmUAdcWlFxRl+KubM=
+cloud.google.com/go/ids v1.2.0/go.mod h1:5WXvp4n25S0rA/mQWAg1YEEBBq6/s+7ml1RDCW1IrcY=
+cloud.google.com/go/ids v1.3.0/go.mod h1:JBdTYwANikFKaDP6LtW5JAi4gubs57SVNQjemdt6xV4=
+cloud.google.com/go/iot v1.3.0/go.mod h1:r7RGh2B61+B8oz0AGE+J72AhA0G7tdXItODWsaA2oLs=
+cloud.google.com/go/iot v1.4.0/go.mod h1:dIDxPOn0UvNDUMD8Ger7FIaTuvMkj+aGk94RPP0iV+g=
+cloud.google.com/go/iot v1.5.0/go.mod h1:mpz5259PDl3XJthEmh9+ap0affn/MqNSP4My77Qql9o=
+cloud.google.com/go/iot v1.6.0/go.mod h1:IqdAsmE2cTYYNO1Fvjfzo9po179rAtJeVGUvkLN3rLE=
+cloud.google.com/go/kms v1.4.0/go.mod h1:fajBHndQ+6ubNw6Ss2sSd+SWvjL26RNo/dr7uxsnnOA=
+cloud.google.com/go/kms v1.5.0/go.mod h1:QJS2YY0eJGBg3mnDfuaCyLauWwBJiHRboYxJ++1xJNg=
+cloud.google.com/go/kms v1.6.0/go.mod h1:Jjy850yySiasBUDi6KFUwUv2n1+o7QZFyuUJg6OgjA0=
+cloud.google.com/go/kms v1.8.0/go.mod h1:4xFEhYFqvW+4VMELtZyxomGSYtSQKzM178ylFW4jMAg=
+cloud.google.com/go/kms v1.9.0/go.mod h1:qb1tPTgfF9RQP8e1wq4cLFErVuTJv7UsSC915J8dh3w=
+cloud.google.com/go/kms v1.10.0/go.mod h1:ng3KTUtQQU9bPX3+QGLsflZIHlkbn8amFAMY63m8d24=
+cloud.google.com/go/kms v1.10.1/go.mod h1:rIWk/TryCkR59GMC3YtHtXeLzd634lBbKenvyySAyYI=
+cloud.google.com/go/language v1.4.0/go.mod h1:F9dRpNFQmJbkaop6g0JhSBXCNlO90e1KWx5iDdxbWic=
+cloud.google.com/go/language v1.6.0/go.mod h1:6dJ8t3B+lUYfStgls25GusK04NLh3eDLQnWM3mdEbhI=
+cloud.google.com/go/language v1.7.0/go.mod h1:DJ6dYN/W+SQOjF8e1hLQXMF21AkH2w9wiPzPCJa2MIE=
+cloud.google.com/go/language v1.8.0/go.mod h1:qYPVHf7SPoNNiCL2Dr0FfEFNil1qi3pQEyygwpgVKB8=
+cloud.google.com/go/language v1.9.0/go.mod h1:Ns15WooPM5Ad/5no/0n81yUetis74g3zrbeJBE+ptUY=
+cloud.google.com/go/lifesciences v0.5.0/go.mod h1:3oIKy8ycWGPUyZDR/8RNnTOYevhaMLqh5vLUXs9zvT8=
+cloud.google.com/go/lifesciences v0.6.0/go.mod h1:ddj6tSX/7BOnhxCSd3ZcETvtNr8NZ6t/iPhY2Tyfu08=
+cloud.google.com/go/lifesciences v0.8.0/go.mod h1:lFxiEOMqII6XggGbOnKiyZ7IBwoIqA84ClvoezaA/bo=
+cloud.google.com/go/logging v1.6.1/go.mod h1:5ZO0mHHbvm8gEmeEUHrmDlTDSu5imF6MUP9OfilNXBw=
+cloud.google.com/go/logging v1.7.0/go.mod h1:3xjP2CjkM3ZkO73aj4ASA5wRPGGCRrPIAeNqVNkzY8M=
+cloud.google.com/go/longrunning v0.1.1/go.mod h1:UUFxuDWkv22EuY93jjmDMFT5GPQKeFVJBIF6QlTqdsE=
+cloud.google.com/go/longrunning v0.3.0/go.mod h1:qth9Y41RRSUE69rDcOn6DdK3HfQfsUI0YSmW3iIlLJc=
+cloud.google.com/go/longrunning v0.4.1/go.mod h1:4iWDqhBZ70CvZ6BfETbvam3T8FMvLK+eFj0E6AaRQTo=
+cloud.google.com/go/managedidentities v1.3.0/go.mod h1:UzlW3cBOiPrzucO5qWkNkh0w33KFtBJU281hacNvsdE=
+cloud.google.com/go/managedidentities v1.4.0/go.mod h1:NWSBYbEMgqmbZsLIyKvxrYbtqOsxY1ZrGM+9RgDqInM=
+cloud.google.com/go/managedidentities v1.5.0/go.mod h1:+dWcZ0JlUmpuxpIDfyP5pP5y0bLdRwOS4Lp7gMni/LA=
+cloud.google.com/go/maps v0.1.0/go.mod h1:BQM97WGyfw9FWEmQMpZ5T6cpovXXSd1cGmFma94eubI=
+cloud.google.com/go/maps v0.6.0/go.mod h1:o6DAMMfb+aINHz/p/jbcY+mYeXBoZoxTfdSQ8VAJaCw=
+cloud.google.com/go/maps v0.7.0/go.mod h1:3GnvVl3cqeSvgMcpRlQidXsPYuDGQ8naBis7MVzpXsY=
+cloud.google.com/go/mediatranslation v0.5.0/go.mod h1:jGPUhGTybqsPQn91pNXw0xVHfuJ3leR1wj37oU3y1f4=
+cloud.google.com/go/mediatranslation v0.6.0/go.mod h1:hHdBCTYNigsBxshbznuIMFNe5QXEowAuNmmC7h8pu5w=
+cloud.google.com/go/mediatranslation v0.7.0/go.mod h1:LCnB/gZr90ONOIQLgSXagp8XUW1ODs2UmUMvcgMfI2I=
+cloud.google.com/go/memcache v1.4.0/go.mod h1:rTOfiGZtJX1AaFUrOgsMHX5kAzaTQ8azHiuDoTPzNsE=
+cloud.google.com/go/memcache v1.5.0/go.mod h1:dk3fCK7dVo0cUU2c36jKb4VqKPS22BTkf81Xq617aWM=
+cloud.google.com/go/memcache v1.6.0/go.mod h1:XS5xB0eQZdHtTuTF9Hf8eJkKtR3pVRCcvJwtm68T3rA=
+cloud.google.com/go/memcache v1.7.0/go.mod h1:ywMKfjWhNtkQTxrWxCkCFkoPjLHPW6A7WOTVI8xy3LY=
+cloud.google.com/go/memcache v1.9.0/go.mod h1:8oEyzXCu+zo9RzlEaEjHl4KkgjlNDaXbCQeQWlzNFJM=
+cloud.google.com/go/metastore v1.5.0/go.mod h1:2ZNrDcQwghfdtCwJ33nM0+GrBGlVuh8rakL3vdPY3XY=
+cloud.google.com/go/metastore v1.6.0/go.mod h1:6cyQTls8CWXzk45G55x57DVQ9gWg7RiH65+YgPsNh9s=
+cloud.google.com/go/metastore v1.7.0/go.mod h1:s45D0B4IlsINu87/AsWiEVYbLaIMeUSoxlKKDqBGFS8=
+cloud.google.com/go/metastore v1.8.0/go.mod h1:zHiMc4ZUpBiM7twCIFQmJ9JMEkDSyZS9U12uf7wHqSI=
+cloud.google.com/go/metastore v1.10.0/go.mod h1:fPEnH3g4JJAk+gMRnrAnoqyv2lpUCqJPWOodSaf45Eo=
+cloud.google.com/go/monitoring v1.7.0/go.mod h1:HpYse6kkGo//7p6sT0wsIC6IBDET0RhIsnmlA53dvEk=
+cloud.google.com/go/monitoring v1.8.0/go.mod h1:E7PtoMJ1kQXWxPjB6mv2fhC5/15jInuulFdYYtlcvT4=
+cloud.google.com/go/monitoring v1.12.0/go.mod h1:yx8Jj2fZNEkL/GYZyTLS4ZtZEZN8WtDEiEqG4kLK50w=
+cloud.google.com/go/monitoring v1.13.0/go.mod h1:k2yMBAB1H9JT/QETjNkgdCGD9bPF712XiLTVr+cBrpw=
+cloud.google.com/go/networkconnectivity v1.4.0/go.mod h1:nOl7YL8odKyAOtzNX73/M5/mGZgqqMeryi6UPZTk/rA=
+cloud.google.com/go/networkconnectivity v1.5.0/go.mod h1:3GzqJx7uhtlM3kln0+x5wyFvuVH1pIBJjhCpjzSt75o=
+cloud.google.com/go/networkconnectivity v1.6.0/go.mod h1:OJOoEXW+0LAxHh89nXd64uGG+FbQoeH8DtxCHVOMlaM=
+cloud.google.com/go/networkconnectivity v1.7.0/go.mod h1:RMuSbkdbPwNMQjB5HBWD5MpTBnNm39iAVpC3TmsExt8=
+cloud.google.com/go/networkconnectivity v1.10.0/go.mod h1:UP4O4sWXJG13AqrTdQCD9TnLGEbtNRqjuaaA7bNjF5E=
+cloud.google.com/go/networkconnectivity v1.11.0/go.mod h1:iWmDD4QF16VCDLXUqvyspJjIEtBR/4zq5hwnY2X3scM=
+cloud.google.com/go/networkmanagement v1.4.0/go.mod h1:Q9mdLLRn60AsOrPc8rs8iNV6OHXaGcDdsIQe1ohekq8=
+cloud.google.com/go/networkmanagement v1.5.0/go.mod h1:ZnOeZ/evzUdUsnvRt792H0uYEnHQEMaz+REhhzJRcf4=
+cloud.google.com/go/networkmanagement v1.6.0/go.mod h1:5pKPqyXjB/sgtvB5xqOemumoQNB7y95Q7S+4rjSOPYY=
+cloud.google.com/go/networksecurity v0.5.0/go.mod h1:xS6fOCoqpVC5zx15Z/MqkfDwH4+m/61A3ODiDV1xmiQ=
+cloud.google.com/go/networksecurity v0.6.0/go.mod h1:Q5fjhTr9WMI5mbpRYEbiexTzROf7ZbDzvzCrNl14nyU=
+cloud.google.com/go/networksecurity v0.7.0/go.mod h1:mAnzoxx/8TBSyXEeESMy9OOYwo1v+gZ5eMRnsT5bC8k=
+cloud.google.com/go/networksecurity v0.8.0/go.mod h1:B78DkqsxFG5zRSVuwYFRZ9Xz8IcQ5iECsNrPn74hKHU=
+cloud.google.com/go/notebooks v1.2.0/go.mod h1:9+wtppMfVPUeJ8fIWPOq1UnATHISkGXGqTkxeieQ6UY=
+cloud.google.com/go/notebooks v1.3.0/go.mod h1:bFR5lj07DtCPC7YAAJ//vHskFBxA5JzYlH68kXVdk34=
+cloud.google.com/go/notebooks v1.4.0/go.mod h1:4QPMngcwmgb6uw7Po99B2xv5ufVoIQ7nOGDyL4P8AgA=
+cloud.google.com/go/notebooks v1.5.0/go.mod h1:q8mwhnP9aR8Hpfnrc5iN5IBhrXUy8S2vuYs+kBJ/gu0=
+cloud.google.com/go/notebooks v1.7.0/go.mod h1:PVlaDGfJgj1fl1S3dUwhFMXFgfYGhYQt2164xOMONmE=
+cloud.google.com/go/notebooks v1.8.0/go.mod h1:Lq6dYKOYOWUCTvw5t2q1gp1lAp0zxAxRycayS0iJcqQ=
+cloud.google.com/go/optimization v1.1.0/go.mod h1:5po+wfvX5AQlPznyVEZjGJTMr4+CAkJf2XSTQOOl9l4=
+cloud.google.com/go/optimization v1.2.0/go.mod h1:Lr7SOHdRDENsh+WXVmQhQTrzdu9ybg0NecjHidBq6xs=
+cloud.google.com/go/optimization v1.3.1/go.mod h1:IvUSefKiwd1a5p0RgHDbWCIbDFgKuEdB+fPPuP0IDLI=
+cloud.google.com/go/orchestration v1.3.0/go.mod h1:Sj5tq/JpWiB//X/q3Ngwdl5K7B7Y0KZ7bfv0wL6fqVA=
+cloud.google.com/go/orchestration v1.4.0/go.mod h1:6W5NLFWs2TlniBphAViZEVhrXRSMgUGDfW7vrWKvsBk=
+cloud.google.com/go/orchestration v1.6.0/go.mod h1:M62Bevp7pkxStDfFfTuCOaXgaaqRAga1yKyoMtEoWPQ=
+cloud.google.com/go/orgpolicy v1.4.0/go.mod h1:xrSLIV4RePWmP9P3tBl8S93lTmlAxjm06NSm2UTmKvE=
+cloud.google.com/go/orgpolicy v1.5.0/go.mod h1:hZEc5q3wzwXJaKrsx5+Ewg0u1LxJ51nNFlext7Tanwc=
+cloud.google.com/go/orgpolicy v1.10.0/go.mod h1:w1fo8b7rRqlXlIJbVhOMPrwVljyuW5mqssvBtU18ONc=
+cloud.google.com/go/osconfig v1.7.0/go.mod h1:oVHeCeZELfJP7XLxcBGTMBvRO+1nQ5tFG9VQTmYS2Fs=
+cloud.google.com/go/osconfig v1.8.0/go.mod h1:EQqZLu5w5XA7eKizepumcvWx+m8mJUhEwiPqWiZeEdg=
+cloud.google.com/go/osconfig v1.9.0/go.mod h1:Yx+IeIZJ3bdWmzbQU4fxNl8xsZ4amB+dygAwFPlvnNo=
+cloud.google.com/go/osconfig v1.10.0/go.mod h1:uMhCzqC5I8zfD9zDEAfvgVhDS8oIjySWh+l4WK6GnWw=
+cloud.google.com/go/osconfig v1.11.0/go.mod h1:aDICxrur2ogRd9zY5ytBLV89KEgT2MKB2L/n6x1ooPw=
+cloud.google.com/go/oslogin v1.4.0/go.mod h1:YdgMXWRaElXz/lDk1Na6Fh5orF7gvmJ0FGLIs9LId4E=
+cloud.google.com/go/oslogin v1.5.0/go.mod h1:D260Qj11W2qx/HVF29zBg+0fd6YCSjSqLUkY/qEenQU=
+cloud.google.com/go/oslogin v1.6.0/go.mod h1:zOJ1O3+dTU8WPlGEkFSh7qeHPPSoxrcMbbK1Nm2iX70=
+cloud.google.com/go/oslogin v1.7.0/go.mod h1:e04SN0xO1UNJ1M5GP0vzVBFicIe4O53FOfcixIqTyXo=
+cloud.google.com/go/oslogin v1.9.0/go.mod h1:HNavntnH8nzrn8JCTT5fj18FuJLFJc4NaZJtBnQtKFs=
+cloud.google.com/go/phishingprotection v0.5.0/go.mod h1:Y3HZknsK9bc9dMi+oE8Bim0lczMU6hrX0UpADuMefr0=
+cloud.google.com/go/phishingprotection v0.6.0/go.mod h1:9Y3LBLgy0kDTcYET8ZH3bq/7qni15yVUoAxiFxnlSUA=
+cloud.google.com/go/phishingprotection v0.7.0/go.mod h1:8qJI4QKHoda/sb/7/YmMQ2omRLSLYSu9bU0EKCNI+Lk=
+cloud.google.com/go/policytroubleshooter v1.3.0/go.mod h1:qy0+VwANja+kKrjlQuOzmlvscn4RNsAc0e15GGqfMxg=
+cloud.google.com/go/policytroubleshooter v1.4.0/go.mod h1:DZT4BcRw3QoO8ota9xw/LKtPa8lKeCByYeKTIf/vxdE=
+cloud.google.com/go/policytroubleshooter v1.5.0/go.mod h1:Rz1WfV+1oIpPdN2VvvuboLVRsB1Hclg3CKQ53j9l8vw=
+cloud.google.com/go/policytroubleshooter v1.6.0/go.mod h1:zYqaPTsmfvpjm5ULxAyD/lINQxJ0DDsnWOP/GZ7xzBc=
+cloud.google.com/go/privatecatalog v0.5.0/go.mod h1:XgosMUvvPyxDjAVNDYxJ7wBW8//hLDDYmnsNcMGq1K0=
+cloud.google.com/go/privatecatalog v0.6.0/go.mod h1:i/fbkZR0hLN29eEWiiwue8Pb+GforiEIBnV9yrRUOKI=
+cloud.google.com/go/privatecatalog v0.7.0/go.mod h1:2s5ssIFO69F5csTXcwBP7NPFTZvps26xGzvQ2PQaBYg=
+cloud.google.com/go/privatecatalog v0.8.0/go.mod h1:nQ6pfaegeDAq/Q5lrfCQzQLhubPiZhSaNhIgfJlnIXs=
cloud.google.com/go/pubsub v1.0.1/go.mod h1:R0Gpsv3s54REJCy4fxDixWD93lHJMoZTyQ2kNxGRt3I=
cloud.google.com/go/pubsub v1.1.0/go.mod h1:EwwdRX2sKPjnvnqCa270oGRyludottCI76h+R3AArQw=
cloud.google.com/go/pubsub v1.2.0/go.mod h1:jhfEVHT8odbXTkndysNHCcx0awwzvfOlguIAii9o8iA=
cloud.google.com/go/pubsub v1.3.1/go.mod h1:i+ucay31+CNRpDW4Lu78I4xXG+O1r/MAHgjpRVR+TSU=
+cloud.google.com/go/pubsub v1.26.0/go.mod h1:QgBH3U/jdJy/ftjPhTkyXNj543Tin1pRYcdcPRnFIRI=
+cloud.google.com/go/pubsub v1.27.1/go.mod h1:hQN39ymbV9geqBnfQq6Xf63yNhUAhv9CZhzp5O6qsW0=
+cloud.google.com/go/pubsub v1.28.0/go.mod h1:vuXFpwaVoIPQMGXqRyUQigu/AX1S3IWugR9xznmcXX8=
+cloud.google.com/go/pubsub v1.30.0/go.mod h1:qWi1OPS0B+b5L+Sg6Gmc9zD1Y+HaM0MdUr7LsupY1P4=
+cloud.google.com/go/pubsublite v1.5.0/go.mod h1:xapqNQ1CuLfGi23Yda/9l4bBCKz/wC3KIJ5gKcxveZg=
+cloud.google.com/go/pubsublite v1.6.0/go.mod h1:1eFCS0U11xlOuMFV/0iBqw3zP12kddMeCbj/F3FSj9k=
+cloud.google.com/go/pubsublite v1.7.0/go.mod h1:8hVMwRXfDfvGm3fahVbtDbiLePT3gpoiJYJY+vxWxVM=
+cloud.google.com/go/recaptchaenterprise v1.3.1/go.mod h1:OdD+q+y4XGeAlxRaMn1Y7/GveP6zmq76byL6tjPE7d4=
+cloud.google.com/go/recaptchaenterprise/v2 v2.1.0/go.mod h1:w9yVqajwroDNTfGuhmOjPDN//rZGySaf6PtFVcSCa7o=
+cloud.google.com/go/recaptchaenterprise/v2 v2.2.0/go.mod h1:/Zu5jisWGeERrd5HnlS3EUGb/D335f9k51B/FVil0jk=
+cloud.google.com/go/recaptchaenterprise/v2 v2.3.0/go.mod h1:O9LwGCjrhGHBQET5CA7dd5NwwNQUErSgEDit1DLNTdo=
+cloud.google.com/go/recaptchaenterprise/v2 v2.4.0/go.mod h1:Am3LHfOuBstrLrNCBrlI5sbwx9LBg3te2N6hGvHn2mE=
+cloud.google.com/go/recaptchaenterprise/v2 v2.5.0/go.mod h1:O8LzcHXN3rz0j+LBC91jrwI3R+1ZSZEWrfL7XHgNo9U=
+cloud.google.com/go/recaptchaenterprise/v2 v2.6.0/go.mod h1:RPauz9jeLtB3JVzg6nCbe12qNoaa8pXc4d/YukAmcnA=
+cloud.google.com/go/recaptchaenterprise/v2 v2.7.0/go.mod h1:19wVj/fs5RtYtynAPJdDTb69oW0vNHYDBTbB4NvMD9c=
+cloud.google.com/go/recommendationengine v0.5.0/go.mod h1:E5756pJcVFeVgaQv3WNpImkFP8a+RptV6dDLGPILjvg=
+cloud.google.com/go/recommendationengine v0.6.0/go.mod h1:08mq2umu9oIqc7tDy8sx+MNJdLG0fUi3vaSVbztHgJ4=
+cloud.google.com/go/recommendationengine v0.7.0/go.mod h1:1reUcE3GIu6MeBz/h5xZJqNLuuVjNg1lmWMPyjatzac=
+cloud.google.com/go/recommender v1.5.0/go.mod h1:jdoeiBIVrJe9gQjwd759ecLJbxCDED4A6p+mqoqDvTg=
+cloud.google.com/go/recommender v1.6.0/go.mod h1:+yETpm25mcoiECKh9DEScGzIRyDKpZ0cEhWGo+8bo+c=
+cloud.google.com/go/recommender v1.7.0/go.mod h1:XLHs/W+T8olwlGOgfQenXBTbIseGclClff6lhFVe9Bs=
+cloud.google.com/go/recommender v1.8.0/go.mod h1:PkjXrTT05BFKwxaUxQmtIlrtj0kph108r02ZZQ5FE70=
+cloud.google.com/go/recommender v1.9.0/go.mod h1:PnSsnZY7q+VL1uax2JWkt/UegHssxjUVVCrX52CuEmQ=
+cloud.google.com/go/redis v1.7.0/go.mod h1:V3x5Jq1jzUcg+UNsRvdmsfuFnit1cfe3Z/PGyq/lm4Y=
+cloud.google.com/go/redis v1.8.0/go.mod h1:Fm2szCDavWzBk2cDKxrkmWBqoCiL1+Ctwq7EyqBCA/A=
+cloud.google.com/go/redis v1.9.0/go.mod h1:HMYQuajvb2D0LvMgZmLDZW8V5aOC/WxstZHiy4g8OiA=
+cloud.google.com/go/redis v1.10.0/go.mod h1:ThJf3mMBQtW18JzGgh41/Wld6vnDDc/F/F35UolRZPM=
+cloud.google.com/go/redis v1.11.0/go.mod h1:/X6eicana+BWcUda5PpwZC48o37SiFVTFSs0fWAJ7uQ=
+cloud.google.com/go/resourcemanager v1.3.0/go.mod h1:bAtrTjZQFJkiWTPDb1WBjzvc6/kifjj4QBYuKCCoqKA=
+cloud.google.com/go/resourcemanager v1.4.0/go.mod h1:MwxuzkumyTX7/a3n37gmsT3py7LIXwrShilPh3P1tR0=
+cloud.google.com/go/resourcemanager v1.5.0/go.mod h1:eQoXNAiAvCf5PXxWxXjhKQoTMaUSNrEfg+6qdf/wots=
+cloud.google.com/go/resourcemanager v1.6.0/go.mod h1:YcpXGRs8fDzcUl1Xw8uOVmI8JEadvhRIkoXXUNVYcVo=
+cloud.google.com/go/resourcemanager v1.7.0/go.mod h1:HlD3m6+bwhzj9XCouqmeiGuni95NTrExfhoSrkC/3EI=
+cloud.google.com/go/resourcesettings v1.3.0/go.mod h1:lzew8VfESA5DQ8gdlHwMrqZs1S9V87v3oCnKCWoOuQU=
+cloud.google.com/go/resourcesettings v1.4.0/go.mod h1:ldiH9IJpcrlC3VSuCGvjR5of/ezRrOxFtpJoJo5SmXg=
+cloud.google.com/go/resourcesettings v1.5.0/go.mod h1:+xJF7QSG6undsQDfsCJyqWXyBwUoJLhetkRMDRnIoXA=
+cloud.google.com/go/retail v1.8.0/go.mod h1:QblKS8waDmNUhghY2TI9O3JLlFk8jybHeV4BF19FrE4=
+cloud.google.com/go/retail v1.9.0/go.mod h1:g6jb6mKuCS1QKnH/dpu7isX253absFl6iE92nHwlBUY=
+cloud.google.com/go/retail v1.10.0/go.mod h1:2gDk9HsL4HMS4oZwz6daui2/jmKvqShXKQuB2RZ+cCc=
+cloud.google.com/go/retail v1.11.0/go.mod h1:MBLk1NaWPmh6iVFSz9MeKG/Psyd7TAgm6y/9L2B4x9Y=
+cloud.google.com/go/retail v1.12.0/go.mod h1:UMkelN/0Z8XvKymXFbD4EhFJlYKRx1FGhQkVPU5kF14=
+cloud.google.com/go/run v0.2.0/go.mod h1:CNtKsTA1sDcnqqIFR3Pb5Tq0usWxJJvsWOCPldRU3Do=
+cloud.google.com/go/run v0.3.0/go.mod h1:TuyY1+taHxTjrD0ZFk2iAR+xyOXEA0ztb7U3UNA0zBo=
+cloud.google.com/go/run v0.8.0/go.mod h1:VniEnuBwqjigv0A7ONfQUaEItaiCRVujlMqerPPiktM=
+cloud.google.com/go/run v0.9.0/go.mod h1:Wwu+/vvg8Y+JUApMwEDfVfhetv30hCG4ZwDR/IXl2Qg=
+cloud.google.com/go/scheduler v1.4.0/go.mod h1:drcJBmxF3aqZJRhmkHQ9b3uSSpQoltBPGPxGAWROx6s=
+cloud.google.com/go/scheduler v1.5.0/go.mod h1:ri073ym49NW3AfT6DZi21vLZrG07GXr5p3H1KxN5QlI=
+cloud.google.com/go/scheduler v1.6.0/go.mod h1:SgeKVM7MIwPn3BqtcBntpLyrIJftQISRrYB5ZtT+KOk=
+cloud.google.com/go/scheduler v1.7.0/go.mod h1:jyCiBqWW956uBjjPMMuX09n3x37mtyPJegEWKxRsn44=
+cloud.google.com/go/scheduler v1.8.0/go.mod h1:TCET+Y5Gp1YgHT8py4nlg2Sew8nUHMqcpousDgXJVQc=
+cloud.google.com/go/scheduler v1.9.0/go.mod h1:yexg5t+KSmqu+njTIh3b7oYPheFtBWGcbVUYF1GGMIc=
+cloud.google.com/go/secretmanager v1.6.0/go.mod h1:awVa/OXF6IiyaU1wQ34inzQNc4ISIDIrId8qE5QGgKA=
+cloud.google.com/go/secretmanager v1.8.0/go.mod h1:hnVgi/bN5MYHd3Gt0SPuTPPp5ENina1/LxM+2W9U9J4=
+cloud.google.com/go/secretmanager v1.9.0/go.mod h1:b71qH2l1yHmWQHt9LC80akm86mX8AL6X1MA01dW8ht4=
+cloud.google.com/go/secretmanager v1.10.0/go.mod h1:MfnrdvKMPNra9aZtQFvBcvRU54hbPD8/HayQdlUgJpU=
+cloud.google.com/go/security v1.5.0/go.mod h1:lgxGdyOKKjHL4YG3/YwIL2zLqMFCKs0UbQwgyZmfJl4=
+cloud.google.com/go/security v1.7.0/go.mod h1:mZklORHl6Bg7CNnnjLH//0UlAlaXqiG7Lb9PsPXLfD0=
+cloud.google.com/go/security v1.8.0/go.mod h1:hAQOwgmaHhztFhiQ41CjDODdWP0+AE1B3sX4OFlq+GU=
+cloud.google.com/go/security v1.9.0/go.mod h1:6Ta1bO8LXI89nZnmnsZGp9lVoVWXqsVbIq/t9dzI+2Q=
+cloud.google.com/go/security v1.10.0/go.mod h1:QtOMZByJVlibUT2h9afNDWRZ1G96gVywH8T5GUSb9IA=
+cloud.google.com/go/security v1.12.0/go.mod h1:rV6EhrpbNHrrxqlvW0BWAIawFWq3X90SduMJdFwtLB8=
+cloud.google.com/go/security v1.13.0/go.mod h1:Q1Nvxl1PAgmeW0y3HTt54JYIvUdtcpYKVfIB8AOMZ+0=
+cloud.google.com/go/securitycenter v1.13.0/go.mod h1:cv5qNAqjY84FCN6Y9z28WlkKXyWsgLO832YiWwkCWcU=
+cloud.google.com/go/securitycenter v1.14.0/go.mod h1:gZLAhtyKv85n52XYWt6RmeBdydyxfPeTrpToDPw4Auc=
+cloud.google.com/go/securitycenter v1.15.0/go.mod h1:PeKJ0t8MoFmmXLXWm41JidyzI3PJjd8sXWaVqg43WWk=
+cloud.google.com/go/securitycenter v1.16.0/go.mod h1:Q9GMaLQFUD+5ZTabrbujNWLtSLZIZF7SAR0wWECrjdk=
+cloud.google.com/go/securitycenter v1.18.1/go.mod h1:0/25gAzCM/9OL9vVx4ChPeM/+DlfGQJDwBy/UC8AKK0=
+cloud.google.com/go/securitycenter v1.19.0/go.mod h1:LVLmSg8ZkkyaNy4u7HCIshAngSQ8EcIRREP3xBnyfag=
+cloud.google.com/go/servicecontrol v1.4.0/go.mod h1:o0hUSJ1TXJAmi/7fLJAedOovnujSEvjKCAFNXPQ1RaU=
+cloud.google.com/go/servicecontrol v1.5.0/go.mod h1:qM0CnXHhyqKVuiZnGKrIurvVImCs8gmqWsDoqe9sU1s=
+cloud.google.com/go/servicecontrol v1.10.0/go.mod h1:pQvyvSRh7YzUF2efw7H87V92mxU8FnFDawMClGCNuAA=
+cloud.google.com/go/servicecontrol v1.11.0/go.mod h1:kFmTzYzTUIuZs0ycVqRHNaNhgR+UMUpw9n02l/pY+mc=
+cloud.google.com/go/servicecontrol v1.11.1/go.mod h1:aSnNNlwEFBY+PWGQ2DoM0JJ/QUXqV5/ZD9DOLB7SnUk=
+cloud.google.com/go/servicedirectory v1.4.0/go.mod h1:gH1MUaZCgtP7qQiI+F+A+OpeKF/HQWgtAddhTbhL2bs=
+cloud.google.com/go/servicedirectory v1.5.0/go.mod h1:QMKFL0NUySbpZJ1UZs3oFAmdvVxhhxB6eJ/Vlp73dfg=
+cloud.google.com/go/servicedirectory v1.6.0/go.mod h1:pUlbnWsLH9c13yGkxCmfumWEPjsRs1RlmJ4pqiNjVL4=
+cloud.google.com/go/servicedirectory v1.7.0/go.mod h1:5p/U5oyvgYGYejufvxhgwjL8UVXjkuw7q5XcG10wx1U=
+cloud.google.com/go/servicedirectory v1.8.0/go.mod h1:srXodfhY1GFIPvltunswqXpVxFPpZjf8nkKQT7XcXaY=
+cloud.google.com/go/servicedirectory v1.9.0/go.mod h1:29je5JjiygNYlmsGz8k6o+OZ8vd4f//bQLtvzkPPT/s=
+cloud.google.com/go/servicemanagement v1.4.0/go.mod h1:d8t8MDbezI7Z2R1O/wu8oTggo3BI2GKYbdG4y/SJTco=
+cloud.google.com/go/servicemanagement v1.5.0/go.mod h1:XGaCRe57kfqu4+lRxaFEAuqmjzF0r+gWHjWqKqBvKFo=
+cloud.google.com/go/servicemanagement v1.6.0/go.mod h1:aWns7EeeCOtGEX4OvZUWCCJONRZeFKiptqKf1D0l/Jc=
+cloud.google.com/go/servicemanagement v1.8.0/go.mod h1:MSS2TDlIEQD/fzsSGfCdJItQveu9NXnUniTrq/L8LK4=
+cloud.google.com/go/serviceusage v1.3.0/go.mod h1:Hya1cozXM4SeSKTAgGXgj97GlqUvF5JaoXacR1JTP/E=
+cloud.google.com/go/serviceusage v1.4.0/go.mod h1:SB4yxXSaYVuUBYUml6qklyONXNLt83U0Rb+CXyhjEeU=
+cloud.google.com/go/serviceusage v1.5.0/go.mod h1:w8U1JvqUqwJNPEOTQjrMHkw3IaIFLoLsPLvsE3xueec=
+cloud.google.com/go/serviceusage v1.6.0/go.mod h1:R5wwQcbOWsyuOfbP9tGdAnCAc6B9DRwPG1xtWMDeuPA=
+cloud.google.com/go/shell v1.3.0/go.mod h1:VZ9HmRjZBsjLGXusm7K5Q5lzzByZmJHf1d0IWHEN5X4=
+cloud.google.com/go/shell v1.4.0/go.mod h1:HDxPzZf3GkDdhExzD/gs8Grqk+dmYcEjGShZgYa9URw=
+cloud.google.com/go/shell v1.6.0/go.mod h1:oHO8QACS90luWgxP3N9iZVuEiSF84zNyLytb+qE2f9A=
+cloud.google.com/go/spanner v1.41.0/go.mod h1:MLYDBJR/dY4Wt7ZaMIQ7rXOTLjYrmxLE/5ve9vFfWos=
+cloud.google.com/go/spanner v1.44.0/go.mod h1:G8XIgYdOK+Fbcpbs7p2fiprDw4CaZX63whnSMLVBxjk=
+cloud.google.com/go/spanner v1.45.0/go.mod h1:FIws5LowYz8YAE1J8fOS7DJup8ff7xJeetWEo5REA2M=
+cloud.google.com/go/speech v1.6.0/go.mod h1:79tcr4FHCimOp56lwC01xnt/WPJZc4v3gzyT7FoBkCM=
+cloud.google.com/go/speech v1.7.0/go.mod h1:KptqL+BAQIhMsj1kOP2la5DSEEerPDuOP/2mmkhHhZQ=
+cloud.google.com/go/speech v1.8.0/go.mod h1:9bYIl1/tjsAnMgKGHKmBZzXKEkGgtU+MpdDPTE9f7y0=
+cloud.google.com/go/speech v1.9.0/go.mod h1:xQ0jTcmnRFFM2RfX/U+rk6FQNUF6DQlydUSyoooSpco=
+cloud.google.com/go/speech v1.14.1/go.mod h1:gEosVRPJ9waG7zqqnsHpYTOoAS4KouMRLDFMekpJ0J0=
+cloud.google.com/go/speech v1.15.0/go.mod h1:y6oH7GhqCaZANH7+Oe0BhgIogsNInLlz542tg3VqeYI=
cloud.google.com/go/storage v1.0.0/go.mod h1:IhtSnM/ZTZV8YYJWCY8RULGVqBDmpoyjwiyrjsg+URw=
cloud.google.com/go/storage v1.5.0/go.mod h1:tpKbwo567HUNpVclU5sGELwQWBDZ8gh0ZeosJ0Rtdos=
cloud.google.com/go/storage v1.6.0/go.mod h1:N7U0C8pVQ/+NIKOBQyamJIeKQKkZ+mxpohlUTyfDhBk=
cloud.google.com/go/storage v1.8.0/go.mod h1:Wv1Oy7z6Yz3DshWRJFhqM/UCfaWIRTdp0RXyy7KQOVs=
cloud.google.com/go/storage v1.10.0/go.mod h1:FLPqc6j+Ki4BU591ie1oL6qBQGu2Bl/tZ9ullr3+Kg0=
+cloud.google.com/go/storage v1.14.0/go.mod h1:GrKmX003DSIwi9o29oFT7YDnHYwZoctc3fOKtUw0Xmo=
+cloud.google.com/go/storage v1.22.1/go.mod h1:S8N1cAStu7BOeFfE8KAQzmyyLkK8p/vmRq6kuBTW58Y=
+cloud.google.com/go/storage v1.23.0/go.mod h1:vOEEDNFnciUMhBeT6hsJIn3ieU5cFRmzeLgDvXzfIXc=
+cloud.google.com/go/storage v1.27.0/go.mod h1:x9DOL8TK/ygDUMieqwfhdpQryTeEkhGKMi80i/iqR2s=
+cloud.google.com/go/storage v1.28.1/go.mod h1:Qnisd4CqDdo6BGs2AD5LLnEsmSQ80wQ5ogcBBKhU86Y=
+cloud.google.com/go/storage v1.29.0/go.mod h1:4puEjyTKnku6gfKoTfNOU/W+a9JyuVNxjpS5GBrB8h4=
+cloud.google.com/go/storagetransfer v1.5.0/go.mod h1:dxNzUopWy7RQevYFHewchb29POFv3/AaBgnhqzqiK0w=
+cloud.google.com/go/storagetransfer v1.6.0/go.mod h1:y77xm4CQV/ZhFZH75PLEXY0ROiS7Gh6pSKrM8dJyg6I=
+cloud.google.com/go/storagetransfer v1.7.0/go.mod h1:8Giuj1QNb1kfLAiWM1bN6dHzfdlDAVC9rv9abHot2W4=
+cloud.google.com/go/storagetransfer v1.8.0/go.mod h1:JpegsHHU1eXg7lMHkvf+KE5XDJ7EQu0GwNJbbVGanEw=
+cloud.google.com/go/talent v1.1.0/go.mod h1:Vl4pt9jiHKvOgF9KoZo6Kob9oV4lwd/ZD5Cto54zDRw=
+cloud.google.com/go/talent v1.2.0/go.mod h1:MoNF9bhFQbiJ6eFD3uSsg0uBALw4n4gaCaEjBw9zo8g=
+cloud.google.com/go/talent v1.3.0/go.mod h1:CmcxwJ/PKfRgd1pBjQgU6W3YBwiewmUzQYH5HHmSCmM=
+cloud.google.com/go/talent v1.4.0/go.mod h1:ezFtAgVuRf8jRsvyE6EwmbTK5LKciD4KVnHuDEFmOOA=
+cloud.google.com/go/talent v1.5.0/go.mod h1:G+ODMj9bsasAEJkQSzO2uHQWXHHXUomArjWQQYkqK6c=
+cloud.google.com/go/texttospeech v1.4.0/go.mod h1:FX8HQHA6sEpJ7rCMSfXuzBcysDAuWusNNNvN9FELDd8=
+cloud.google.com/go/texttospeech v1.5.0/go.mod h1:oKPLhR4n4ZdQqWKURdwxMy0uiTS1xU161C8W57Wkea4=
+cloud.google.com/go/texttospeech v1.6.0/go.mod h1:YmwmFT8pj1aBblQOI3TfKmwibnsfvhIBzPXcW4EBovc=
+cloud.google.com/go/tpu v1.3.0/go.mod h1:aJIManG0o20tfDQlRIej44FcwGGl/cD0oiRyMKG19IQ=
+cloud.google.com/go/tpu v1.4.0/go.mod h1:mjZaX8p0VBgllCzF6wcU2ovUXN9TONFLd7iz227X2Xg=
+cloud.google.com/go/tpu v1.5.0/go.mod h1:8zVo1rYDFuW2l4yZVY0R0fb/v44xLh3llq7RuV61fPM=
+cloud.google.com/go/trace v1.3.0/go.mod h1:FFUE83d9Ca57C+K8rDl/Ih8LwOzWIV1krKgxg6N0G28=
+cloud.google.com/go/trace v1.4.0/go.mod h1:UG0v8UBqzusp+z63o7FK74SdFE+AXpCLdFb1rshXG+Y=
+cloud.google.com/go/trace v1.8.0/go.mod h1:zH7vcsbAhklH8hWFig58HvxcxyQbaIqMarMg9hn5ECA=
+cloud.google.com/go/trace v1.9.0/go.mod h1:lOQqpE5IaWY0Ixg7/r2SjixMuc6lfTFeO4QGM4dQWOk=
+cloud.google.com/go/translate v1.3.0/go.mod h1:gzMUwRjvOqj5i69y/LYLd8RrNQk+hOmIXTi9+nb3Djs=
+cloud.google.com/go/translate v1.4.0/go.mod h1:06Dn/ppvLD6WvA5Rhdp029IX2Mi3Mn7fpMRLPvXT5Wg=
+cloud.google.com/go/translate v1.5.0/go.mod h1:29YDSYveqqpA1CQFD7NQuP49xymq17RXNaUDdc0mNu0=
+cloud.google.com/go/translate v1.6.0/go.mod h1:lMGRudH1pu7I3n3PETiOB2507gf3HnfLV8qlkHZEyos=
+cloud.google.com/go/translate v1.7.0/go.mod h1:lMGRudH1pu7I3n3PETiOB2507gf3HnfLV8qlkHZEyos=
+cloud.google.com/go/video v1.8.0/go.mod h1:sTzKFc0bUSByE8Yoh8X0mn8bMymItVGPfTuUBUyRgxk=
+cloud.google.com/go/video v1.9.0/go.mod h1:0RhNKFRF5v92f8dQt0yhaHrEuH95m068JYOvLZYnJSw=
+cloud.google.com/go/video v1.12.0/go.mod h1:MLQew95eTuaNDEGriQdcYn0dTwf9oWiA4uYebxM5kdg=
+cloud.google.com/go/video v1.13.0/go.mod h1:ulzkYlYgCp15N2AokzKjy7MQ9ejuynOJdf1tR5lGthk=
+cloud.google.com/go/video v1.14.0/go.mod h1:SkgaXwT+lIIAKqWAJfktHT/RbgjSuY6DobxEp0C5yTQ=
+cloud.google.com/go/video v1.15.0/go.mod h1:SkgaXwT+lIIAKqWAJfktHT/RbgjSuY6DobxEp0C5yTQ=
+cloud.google.com/go/videointelligence v1.6.0/go.mod h1:w0DIDlVRKtwPCn/C4iwZIJdvC69yInhW0cfi+p546uU=
+cloud.google.com/go/videointelligence v1.7.0/go.mod h1:k8pI/1wAhjznARtVT9U1llUaFNPh7muw8QyOUpavru4=
+cloud.google.com/go/videointelligence v1.8.0/go.mod h1:dIcCn4gVDdS7yte/w+koiXn5dWVplOZkE+xwG9FgK+M=
+cloud.google.com/go/videointelligence v1.9.0/go.mod h1:29lVRMPDYHikk3v8EdPSaL8Ku+eMzDljjuvRs105XoU=
+cloud.google.com/go/videointelligence v1.10.0/go.mod h1:LHZngX1liVtUhZvi2uNS0VQuOzNi2TkY1OakiuoUOjU=
+cloud.google.com/go/vision v1.2.0/go.mod h1:SmNwgObm5DpFBme2xpyOyasvBc1aPdjvMk2bBk0tKD0=
+cloud.google.com/go/vision/v2 v2.2.0/go.mod h1:uCdV4PpN1S0jyCyq8sIM42v2Y6zOLkZs+4R9LrGYwFo=
+cloud.google.com/go/vision/v2 v2.3.0/go.mod h1:UO61abBx9QRMFkNBbf1D8B1LXdS2cGiiCRx0vSpZoUo=
+cloud.google.com/go/vision/v2 v2.4.0/go.mod h1:VtI579ll9RpVTrdKdkMzckdnwMyX2JILb+MhPqRbPsY=
+cloud.google.com/go/vision/v2 v2.5.0/go.mod h1:MmaezXOOE+IWa+cS7OhRRLK2cNv1ZL98zhqFFZaaH2E=
+cloud.google.com/go/vision/v2 v2.6.0/go.mod h1:158Hes0MvOS9Z/bDMSFpjwsUrZ5fPrdwuyyvKSGAGMY=
+cloud.google.com/go/vision/v2 v2.7.0/go.mod h1:H89VysHy21avemp6xcf9b9JvZHVehWbET0uT/bcuY/0=
+cloud.google.com/go/vmmigration v1.2.0/go.mod h1:IRf0o7myyWFSmVR1ItrBSFLFD/rJkfDCUTO4vLlJvsE=
+cloud.google.com/go/vmmigration v1.3.0/go.mod h1:oGJ6ZgGPQOFdjHuocGcLqX4lc98YQ7Ygq8YQwHh9A7g=
+cloud.google.com/go/vmmigration v1.5.0/go.mod h1:E4YQ8q7/4W9gobHjQg4JJSgXXSgY21nA5r8swQV+Xxc=
+cloud.google.com/go/vmmigration v1.6.0/go.mod h1:bopQ/g4z+8qXzichC7GW1w2MjbErL54rk3/C843CjfY=
+cloud.google.com/go/vmwareengine v0.1.0/go.mod h1:RsdNEf/8UDvKllXhMz5J40XxDrNJNN4sagiox+OI208=
+cloud.google.com/go/vmwareengine v0.2.2/go.mod h1:sKdctNJxb3KLZkE/6Oui94iw/xs9PRNC2wnNLXsHvH8=
+cloud.google.com/go/vmwareengine v0.3.0/go.mod h1:wvoyMvNWdIzxMYSpH/R7y2h5h3WFkx6d+1TIsP39WGY=
+cloud.google.com/go/vpcaccess v1.4.0/go.mod h1:aQHVbTWDYUR1EbTApSVvMq1EnT57ppDmQzZ3imqIk4w=
+cloud.google.com/go/vpcaccess v1.5.0/go.mod h1:drmg4HLk9NkZpGfCmZ3Tz0Bwnm2+DKqViEpeEpOq0m8=
+cloud.google.com/go/vpcaccess v1.6.0/go.mod h1:wX2ILaNhe7TlVa4vC5xce1bCnqE3AeH27RV31lnmZes=
+cloud.google.com/go/webrisk v1.4.0/go.mod h1:Hn8X6Zr+ziE2aNd8SliSDWpEnSS1u4R9+xXZmFiHmGE=
+cloud.google.com/go/webrisk v1.5.0/go.mod h1:iPG6fr52Tv7sGk0H6qUFzmL3HHZev1htXuWDEEsqMTg=
+cloud.google.com/go/webrisk v1.6.0/go.mod h1:65sW9V9rOosnc9ZY7A7jsy1zoHS5W9IAXv6dGqhMQMc=
+cloud.google.com/go/webrisk v1.7.0/go.mod h1:mVMHgEYH0r337nmt1JyLthzMr6YxwN1aAIEc2fTcq7A=
+cloud.google.com/go/webrisk v1.8.0/go.mod h1:oJPDuamzHXgUc+b8SiHRcVInZQuybnvEW72PqTc7sSg=
+cloud.google.com/go/websecurityscanner v1.3.0/go.mod h1:uImdKm2wyeXQevQJXeh8Uun/Ym1VqworNDlBXQevGMo=
+cloud.google.com/go/websecurityscanner v1.4.0/go.mod h1:ebit/Fp0a+FWu5j4JOmJEV8S8CzdTkAS77oDsiSqYWQ=
+cloud.google.com/go/websecurityscanner v1.5.0/go.mod h1:Y6xdCPy81yi0SQnDY1xdNTNpfY1oAgXUlcfN3B3eSng=
+cloud.google.com/go/workflows v1.6.0/go.mod h1:6t9F5h/unJz41YqfBmqSASJSXccBLtD1Vwf+KmJENM0=
+cloud.google.com/go/workflows v1.7.0/go.mod h1:JhSrZuVZWuiDfKEFxU0/F1PQjmpnpcoISEXH2bcHC3M=
+cloud.google.com/go/workflows v1.8.0/go.mod h1:ysGhmEajwZxGn1OhGOGKsTXc5PyxOc0vfKf5Af+to4M=
+cloud.google.com/go/workflows v1.9.0/go.mod h1:ZGkj1aFIOd9c8Gerkjjq7OW7I5+l6cSvT3ujaO/WwSA=
+cloud.google.com/go/workflows v1.10.0/go.mod h1:fZ8LmRmZQWacon9UCX1r/g/DfAXx5VcPALq2CxzdePw=
dario.cat/mergo v1.0.0 h1:AGCNq9Evsj31mOgNPcLyXc+4PNABt905YmuqPYYpBWk=
dario.cat/mergo v1.0.0/go.mod h1:uNxQE+84aUszobStD9th8a29P2fMDhsBdgRYvZOxGmk=
dmitri.shuralyov.com/gpu/mtl v0.0.0-20190408044501-666a987793e9/go.mod h1:H6x//7gZCb22OMCxBHrMx7a5I7Hp++hsVxbQ4BYO7hU=
+gioui.org v0.0.0-20210308172011-57750fc8a0a6/go.mod h1:RSH6KIUZ0p2xy5zHDxgAM4zumjgTw83q2ge/PI+yyw8=
+git.sr.ht/~sbinet/gg v0.3.1/go.mod h1:KGYtlADtqsqANL9ueOFkWymvzUvLMQllU5Ixo+8v3pc=
github.com/Azure/go-ansiterm v0.0.0-20230124172434-306776ec8161 h1:L/gRVlceqvL25UVaW/CKtUDjefjrs0SPonmDGUVOYP0=
github.com/Azure/go-ansiterm v0.0.0-20230124172434-306776ec8161/go.mod h1:xomTg63KZ2rFqZQzSB4Vz2SUXa1BpHTVz9L5PTmPC4E=
github.com/BurntSushi/toml v0.3.1/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU=
github.com/BurntSushi/toml v1.3.2 h1:o7IhLm0Msx3BaB+n3Ag7L8EVlByGnpq14C4YWiu/gL8=
github.com/BurntSushi/toml v1.3.2/go.mod h1:CxXYINrC8qIiEnFrOxCa7Jy5BFHlXnUU2pbicEuybxQ=
github.com/BurntSushi/xgb v0.0.0-20160522181843-27f122750802/go.mod h1:IVnqGOEym/WlBOVXweHU+Q+/VP0lqqI8lqeDx9IjBqo=
+github.com/JohnCGriffin/overflow v0.0.0-20211019200055-46fa312c352c/go.mod h1:X0CRv0ky0k6m906ixxpzmDRLvX58TFUKS2eePweuyxk=
+github.com/OneOfOne/xxhash v1.2.2/go.mod h1:HSdplMjZKSmBqAxg5vPj2TmRDmfkzw+cTzAElWljhcU=
+github.com/ajstarks/deck v0.0.0-20200831202436-30c9fc6549a9/go.mod h1:JynElWSGnm/4RlzPXRlREEwqTHAN3T56Bv2ITsFT3gY=
+github.com/ajstarks/deck/generate v0.0.0-20210309230005-c3f852c02e19/go.mod h1:T13YZdzov6OU0A1+RfKZiZN9ca6VeKdBdyDV+BY97Tk=
+github.com/ajstarks/svgo v0.0.0-20180226025133-644b8db467af/go.mod h1:K08gAheRH3/J6wwsYMMT4xOr94bZjxIelGM0+d/wbFw=
+github.com/ajstarks/svgo v0.0.0-20211024235047-1546f124cd8b/go.mod h1:1KcenG0jGWcpt8ov532z81sp/kMMUG485J2InIOyADM=
+github.com/alecthomas/kingpin/v2 v2.3.1/go.mod h1:oYL5vtsvEHZGHxU7DMp32Dvx+qL+ptGn6lWaot2vCNE=
+github.com/alecthomas/kingpin/v2 v2.3.2/go.mod h1:0gyi0zQnjuFk8xrkNKamJoyUo382HRL7ATRpFZCw6tE=
+github.com/alecthomas/kingpin/v2 v2.4.0/go.mod h1:0gyi0zQnjuFk8xrkNKamJoyUo382HRL7ATRpFZCw6tE=
github.com/alecthomas/template v0.0.0-20160405071501-a0175ee3bccc/go.mod h1:LOuyumcjzFXgccqObfd/Ljyb9UuFJ6TxHnclSeseNhc=
github.com/alecthomas/template v0.0.0-20190718012654-fb15b899a751/go.mod h1:LOuyumcjzFXgccqObfd/Ljyb9UuFJ6TxHnclSeseNhc=
github.com/alecthomas/units v0.0.0-20151022065526-2efee857e7cf/go.mod h1:ybxpYRFXyAe+OPACYpWeL0wqObRcbAqCMya13uyzqw0=
github.com/alecthomas/units v0.0.0-20190717042225-c3de453c63f4/go.mod h1:ybxpYRFXyAe+OPACYpWeL0wqObRcbAqCMya13uyzqw0=
github.com/alecthomas/units v0.0.0-20190924025748-f65c72e2690d/go.mod h1:rBZYJk541a8SKzHPHnH3zbiI+7dagKZ0cgpgrD7Fyho=
+github.com/alecthomas/units v0.0.0-20211218093645-b94a6e3cc137/go.mod h1:OMCwj8VM1Kc9e19TLln2VL61YJF0x1XFtfdL4JdbSyE=
+github.com/andybalholm/brotli v1.0.4/go.mod h1:fO7iG3H7G2nSZ7m0zPUDn85XEX2GTukHGRSepvi9Eig=
+github.com/antihax/optional v1.0.0/go.mod h1:uupD/76wgC+ih3iEmQUL+0Ugr19nfwCT1kdvxnR2qWY=
+github.com/apache/arrow/go/v10 v10.0.1/go.mod h1:YvhnlEePVnBS4+0z3fhPfUy7W1Ikj0Ih0vcRo/gZ1M0=
+github.com/apache/arrow/go/v11 v11.0.0/go.mod h1:Eg5OsL5H+e299f7u5ssuXsuHQVEGC4xei5aX110hRiI=
+github.com/apache/thrift v0.16.0/go.mod h1:PHK3hniurgQaNMZYaCLEqXKsYK8upmhPbmdP2FXSqgU=
github.com/armon/go-proxyproto v0.1.0 h1:TWWcSsjco7o2itn6r25/5AqKBiWmsiuzsUDLT/MTl7k=
github.com/armon/go-proxyproto v0.1.0/go.mod h1:Xj90dce2VKbHzRAeiVQAMBtj4M5oidoXJ8lmgyW21mw=
github.com/beorn7/perks v0.0.0-20180321164747-3a771d992973/go.mod h1:Dwedo/Wpr24TaqPxmxbtue+5NUziq4I4S80YR8gNf3Q=
@@ -52,15 +633,34 @@ github.com/beorn7/perks v1.0.1 h1:VlbKKnNfV8bJzeqoa4cOKqO6bYr3WgKZxO8Z16+hsOM=
github.com/beorn7/perks v1.0.1/go.mod h1:G2ZrVWU2WbWT9wwq4/hrbKbnv/1ERSJQ0ibhJ6rlkpw=
github.com/blang/semver/v4 v4.0.0 h1:1PFHFE6yCCTv8C1TeyNNarDzntLi7wMI5i/pzqYIsAM=
github.com/blang/semver/v4 v4.0.0/go.mod h1:IbckMUScFkM3pff0VJDNKRiT6TG/YpiHIM2yvyW5YoQ=
+github.com/boombuler/barcode v1.0.0/go.mod h1:paBWMcWSl3LHKBqUq+rly7CNSldXjb2rDl3JlRe0mD8=
+github.com/boombuler/barcode v1.0.1/go.mod h1:paBWMcWSl3LHKBqUq+rly7CNSldXjb2rDl3JlRe0mD8=
github.com/census-instrumentation/opencensus-proto v0.2.1/go.mod h1:f6KPmirojxKA12rnyqOA5BBL4O983OfeGPqjHWSTneU=
+github.com/census-instrumentation/opencensus-proto v0.3.0/go.mod h1:f6KPmirojxKA12rnyqOA5BBL4O983OfeGPqjHWSTneU=
+github.com/census-instrumentation/opencensus-proto v0.4.1/go.mod h1:4T9NM4+4Vw91VeyqjLS6ao50K5bOcLKN6Q42XnYaRYw=
+github.com/cespare/xxhash v1.1.0/go.mod h1:XrSqR1VqqWfGrhpAt58auRo0WTKS1nRRg3ghfAqPWnc=
github.com/cespare/xxhash/v2 v2.1.1/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs=
-github.com/cespare/xxhash/v2 v2.2.0 h1:DC2CZ1Ep5Y4k3ZQ899DldepgrayRUGE6BBZ/cd9Cj44=
+github.com/cespare/xxhash/v2 v2.1.2/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs=
github.com/cespare/xxhash/v2 v2.2.0/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs=
+github.com/cespare/xxhash/v2 v2.3.0 h1:UL815xU9SqsFlibzuggzjXhog7bL6oX9BbNZnL2UFvs=
+github.com/cespare/xxhash/v2 v2.3.0/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs=
github.com/chzyer/logex v1.1.10/go.mod h1:+Ywpsq7O8HXn0nuIou7OrIPyXbp3wmkHB+jjWRnGsAI=
github.com/chzyer/readline v0.0.0-20180603132655-2972be24d48e/go.mod h1:nSuG5e5PlCu98SY8svDHJxuZscDgtXS6KTTbou5AhLI=
github.com/chzyer/test v0.0.0-20180213035817-a1ea475d72b1/go.mod h1:Q3SI9o4m/ZMnBNeIyt5eFwwo7qiLfzFZmjNmxjkiQlU=
github.com/client9/misspell v0.3.4/go.mod h1:qj6jICC3Q7zFZvVWo7KLAzC3yx5G7kyvSDkc90ppPyw=
github.com/cncf/udpa/go v0.0.0-20191209042840-269d4d468f6f/go.mod h1:M8M6+tZqaGXZJjfX53e64911xZQV5JYwmTeXPW+k8Sc=
+github.com/cncf/udpa/go v0.0.0-20200629203442-efcf912fb354/go.mod h1:WmhPx2Nbnhtbo57+VJT5O0JRkEi1Wbu0z5j0R8u5Hbk=
+github.com/cncf/udpa/go v0.0.0-20201120205902-5459f2c99403/go.mod h1:WmhPx2Nbnhtbo57+VJT5O0JRkEi1Wbu0z5j0R8u5Hbk=
+github.com/cncf/udpa/go v0.0.0-20210930031921-04548b0d99d4/go.mod h1:6pvJx4me5XPnfI9Z40ddWsdw2W/uZgQLFXToKeRcDiI=
+github.com/cncf/udpa/go v0.0.0-20220112060539-c52dc94e7fbe/go.mod h1:6pvJx4me5XPnfI9Z40ddWsdw2W/uZgQLFXToKeRcDiI=
+github.com/cncf/xds/go v0.0.0-20210312221358-fbca930ec8ed/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs=
+github.com/cncf/xds/go v0.0.0-20210805033703-aa0b78936158/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs=
+github.com/cncf/xds/go v0.0.0-20210922020428-25de7278fc84/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs=
+github.com/cncf/xds/go v0.0.0-20211001041855-01bcc9b48dfe/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs=
+github.com/cncf/xds/go v0.0.0-20211011173535-cb28da3451f1/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs=
+github.com/cncf/xds/go v0.0.0-20220314180256-7f1daf1720fc/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs=
+github.com/cncf/xds/go v0.0.0-20230105202645-06c439db220b/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs=
+github.com/cncf/xds/go v0.0.0-20230310173818-32f1caf87195/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs=
github.com/coreos/go-systemd/v22 v22.5.0 h1:RrqgGjYQKalulkV8NGVIfkXQf6YYmOyiJKk8iXXhfZs=
github.com/coreos/go-systemd/v22 v22.5.0/go.mod h1:Y58oyj3AT4RCenI/lSvhwexgC+NSVTIJ3seZv2GcEnc=
github.com/cpuguy83/go-md2man/v2 v2.0.3/go.mod h1:tgQtvFlXSQOSOSIRvRPT7W67SCa46tRHOmNcaadrF8o=
@@ -72,20 +672,35 @@ github.com/cyphar/filepath-securejoin v0.2.4/go.mod h1:aPGpWjXOXUn2NCNjFvBE6aRxG
github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c=
github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
+github.com/docopt/docopt-go v0.0.0-20180111231733-ee0de3bc6815/go.mod h1:WwZ+bS3ebgob9U8Nd0kOddGdZWjyMGR8Wziv+TBNwSE=
+github.com/dustin/go-humanize v1.0.0/go.mod h1:HtrtbFcZ19U5GC7JDqmcUSB87Iq5E25KnS6fMYU6eOk=
github.com/eapache/channels v1.1.0 h1:F1taHcn7/F0i8DYqKXJnyhJcVpp2kgFcNePxXtnyu4k=
github.com/eapache/channels v1.1.0/go.mod h1:jMm2qB5Ubtg9zLd+inMZd2/NUvXgzmWXsDaLyQIGfH0=
github.com/eapache/queue v1.1.0 h1:YOEu7KNc61ntiQlcEeUIoDTJ2o8mQznoNvUhiigpIqc=
github.com/eapache/queue v1.1.0/go.mod h1:6eCeP0CKFpHLu8blIFXhExK/dRa7WDZfr6jVFPTqq+I=
-github.com/emicklei/go-restful/v3 v3.11.3 h1:yagOQz/38xJmcNeZJtrUcKjkHRltIaIFXKWeG1SkWGE=
-github.com/emicklei/go-restful/v3 v3.11.3/go.mod h1:6n3XBCmQQb25CM2LCACGz8ukIrRry+4bhvbpWn3mrbc=
+github.com/emicklei/go-restful/v3 v3.12.0 h1:y2DdzBAURM29NFF94q6RaY4vjIH1rtwDapwQtU84iWk=
+github.com/emicklei/go-restful/v3 v3.12.0/go.mod h1:6n3XBCmQQb25CM2LCACGz8ukIrRry+4bhvbpWn3mrbc=
github.com/envoyproxy/go-control-plane v0.9.0/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4=
github.com/envoyproxy/go-control-plane v0.9.1-0.20191026205805-5f8ba28d4473/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4=
github.com/envoyproxy/go-control-plane v0.9.4/go.mod h1:6rpuAdCZL397s3pYoYcLgu1mIlRU8Am5FuJP05cCM98=
+github.com/envoyproxy/go-control-plane v0.9.7/go.mod h1:cwu0lG7PUMfa9snN8LXBig5ynNVH9qI8YYLbd1fK2po=
+github.com/envoyproxy/go-control-plane v0.9.9-0.20201210154907-fd9021fe5dad/go.mod h1:cXg6YxExXjJnVBQHBLXeUAgxn2UodCpnH306RInaBQk=
+github.com/envoyproxy/go-control-plane v0.9.9-0.20210217033140-668b12f5399d/go.mod h1:cXg6YxExXjJnVBQHBLXeUAgxn2UodCpnH306RInaBQk=
+github.com/envoyproxy/go-control-plane v0.9.9-0.20210512163311-63b5d3c536b0/go.mod h1:hliV/p42l8fGbc6Y9bQ70uLwIvmJyVE5k4iMKlh8wCQ=
+github.com/envoyproxy/go-control-plane v0.9.10-0.20210907150352-cf90f659a021/go.mod h1:AFq3mo9L8Lqqiid3OhADV3RfLJnjiw63cSpi+fDTRC0=
+github.com/envoyproxy/go-control-plane v0.10.2-0.20220325020618-49ff273808a1/go.mod h1:KJwIaB5Mv44NWtYuAOFCVOjcI94vtpEz2JU/D2v6IjE=
+github.com/envoyproxy/go-control-plane v0.10.3/go.mod h1:fJJn/j26vwOu972OllsvAgJJM//w9BV6Fxbg2LuVd34=
+github.com/envoyproxy/go-control-plane v0.11.0/go.mod h1:VnHyVMpzcLvCFt9yUz1UnCwHLhwx1WguiVDV7pTG/tI=
github.com/envoyproxy/protoc-gen-validate v0.1.0/go.mod h1:iSmxcyjqTsJpI2R4NaDN7+kN2VEUnK/pcBlmesArF7c=
+github.com/envoyproxy/protoc-gen-validate v0.6.7/go.mod h1:dyJXwwfPK2VSqiB9Klm1J6romD608Ba7Hij42vrOBCo=
+github.com/envoyproxy/protoc-gen-validate v0.9.1/go.mod h1:OKNgG7TCp5pF4d6XftA0++PMirau2/yoOwVac3AbF2w=
+github.com/envoyproxy/protoc-gen-validate v0.10.0/go.mod h1:DRjgyB0I43LtJapqN6NiRwroiAU2PaFuvk/vjgh61ss=
github.com/evanphx/json-patch v5.9.0+incompatible h1:fBXyNpNMuTTDdquAq/uisOr2lShz4oaXpDTX2bLe7ls=
github.com/evanphx/json-patch v5.9.0+incompatible/go.mod h1:50XU6AFN0ol/bzJsmQLiYLvXMP4fmwYFNcr97nuDLSk=
github.com/evanphx/json-patch/v5 v5.9.0 h1:kcBlZQbplgElYIlo/n1hJbls2z/1awpXxpRi0/FOJfg=
github.com/evanphx/json-patch/v5 v5.9.0/go.mod h1:VNkHZ/282BpEyt/tObQO8s5CMPmYYq14uClGH4abBuQ=
+github.com/fogleman/gg v1.2.1-0.20190220221249-0403632d5b90/go.mod h1:R/bRT+9gY/C5z7JzPU0zXsXHKM4/ayA+zqcVNZzPa1k=
+github.com/fogleman/gg v1.3.0/go.mod h1:R/bRT+9gY/C5z7JzPU0zXsXHKM4/ayA+zqcVNZzPa1k=
github.com/fsnotify/fsnotify v1.4.7/go.mod h1:jwhsz4b93w/PPRr/qN1Yymfu8t87LnFCMoQvtojpjFo=
github.com/fsnotify/fsnotify v1.4.9/go.mod h1:znqG4EE+3YCdAaPaxE2ZRY/06pZUdp0tY4IgpuI1SZQ=
github.com/fsnotify/fsnotify v1.7.0 h1:8JEhPFa5W2WU7YfeZzPNqzMP6Lwt7L2715Ggo0nosvA=
@@ -93,39 +708,55 @@ github.com/fsnotify/fsnotify v1.7.0/go.mod h1:40Bi/Hjc2AVfZrqy+aj+yEI+/bRxZnMJyT
github.com/fullsailor/pkcs7 v0.0.0-20160414161337-2585af45975b/go.mod h1:KnogPXtdwXqoenmZCw6S+25EAm2MkxbG0deNDu4cbSA=
github.com/fullsailor/pkcs7 v0.0.0-20190404230743-d7302db945fa h1:RDBNVkRviHZtvDvId8XSGPu3rmpmSe+wKRcEWNgsfWU=
github.com/fullsailor/pkcs7 v0.0.0-20190404230743-d7302db945fa/go.mod h1:KnogPXtdwXqoenmZCw6S+25EAm2MkxbG0deNDu4cbSA=
+github.com/ghodss/yaml v1.0.0/go.mod h1:4dBDuWmgqj2HViK6kFavaiC9ZROes6MMH2rRYeMEF04=
github.com/go-errors/errors v1.5.1 h1:ZwEMSLRCapFLflTpT7NKaAc7ukJ8ZPEjzlxt8rPN8bk=
github.com/go-errors/errors v1.5.1/go.mod h1:sIVyrIiJhuEF+Pj9Ebtd6P/rEYROXFi3BopGUQ5a5Og=
+github.com/go-fonts/dejavu v0.1.0/go.mod h1:4Wt4I4OU2Nq9asgDCteaAaWZOV24E+0/Pwo0gppep4g=
+github.com/go-fonts/latin-modern v0.2.0/go.mod h1:rQVLdDMK+mK1xscDwsqM5J8U2jrRa3T0ecnM9pNujks=
+github.com/go-fonts/liberation v0.1.1/go.mod h1:K6qoJYypsmfVjWg8KOVDQhLc8UDgIK2HYqyqAO9z7GY=
+github.com/go-fonts/liberation v0.2.0/go.mod h1:K6qoJYypsmfVjWg8KOVDQhLc8UDgIK2HYqyqAO9z7GY=
+github.com/go-fonts/stix v0.1.0/go.mod h1:w/c1f0ldAUlJmLBvlbkvVXLAD+tAMqobIIQpmnUIzUY=
github.com/go-gl/glfw v0.0.0-20190409004039-e6da0acd62b1/go.mod h1:vR7hzQXu2zJy9AVAgeJqvqgH9Q5CA+iKCZ2gyEVpxRU=
github.com/go-gl/glfw/v3.3/glfw v0.0.0-20191125211704-12ad95a8df72/go.mod h1:tQ2UAYgL5IevRw8kRxooKSPJfGvJ9fJQFa0TUsXzTg8=
github.com/go-gl/glfw/v3.3/glfw v0.0.0-20200222043503-6f7a984d4dc4/go.mod h1:tQ2UAYgL5IevRw8kRxooKSPJfGvJ9fJQFa0TUsXzTg8=
github.com/go-kit/kit v0.8.0/go.mod h1:xBxKIO96dXMWWy0MnWVtmwkA9/13aqxPnvrjFYMA2as=
github.com/go-kit/kit v0.9.0/go.mod h1:xBxKIO96dXMWWy0MnWVtmwkA9/13aqxPnvrjFYMA2as=
github.com/go-kit/log v0.1.0/go.mod h1:zbhenjAZHb184qTLMA9ZjW7ThYL0H2mk7Q6pNt4vbaY=
+github.com/go-kit/log v0.2.0/go.mod h1:NwTd00d/i8cPZ3xOwwiv2PO5MOcx78fFErGNcVmBjv0=
+github.com/go-kit/log v0.2.1/go.mod h1:NwTd00d/i8cPZ3xOwwiv2PO5MOcx78fFErGNcVmBjv0=
+github.com/go-latex/latex v0.0.0-20210118124228-b3d85cf34e07/go.mod h1:CO1AlKB2CSIqUrmQPqA0gdRIlnLEY0gK5JGjh37zN5U=
+github.com/go-latex/latex v0.0.0-20210823091927-c0d11ff05a81/go.mod h1:SX0U8uGpxhq9o2S/CELCSUxEWWAuoCUcVCQWv7G2OCk=
github.com/go-logfmt/logfmt v0.3.0/go.mod h1:Qt1PoO58o5twSAckw1HlFXLmHsOX5/0LbT9GBnD5lWE=
github.com/go-logfmt/logfmt v0.4.0/go.mod h1:3RMwSq7FuexP4Kalkev3ejPJsZTpXXBr9+V4qmtdjCk=
github.com/go-logfmt/logfmt v0.5.0/go.mod h1:wCYkCAKZfumFQihp8CzCvQ3paCTfi41vtzG1KdI/P7A=
-github.com/go-logr/logr v0.2.0/go.mod h1:z6/tIYblkpsD+a4lm/fGIIU9mZ+XfAiaFtq7xTgseGU=
+github.com/go-logfmt/logfmt v0.5.1/go.mod h1:WYhtIu8zTZfxdn5+rREduYbwxfcBr/Vr6KEVveWlfTs=
github.com/go-logr/logr v1.4.1 h1:pKouT5E8xu9zeFC39JXRDukb6JFQPXM5p5I91188VAQ=
github.com/go-logr/logr v1.4.1/go.mod h1:9T104GzyrTigFIr8wt5mBrctHMim0Nb2HLGrmQ40KvY=
github.com/go-logr/zapr v1.3.0 h1:XGdV8XW8zdwFiwOA2Dryh1gj2KRQyOOoNmBy4EplIcQ=
github.com/go-logr/zapr v1.3.0/go.mod h1:YKepepNBd1u/oyhd/yQmtjVXmm9uML4IXUgMOwR8/Gg=
-github.com/go-openapi/jsonpointer v0.20.2 h1:mQc3nmndL8ZBzStEo3JYF8wzmeWffDH4VbXz58sAx6Q=
-github.com/go-openapi/jsonpointer v0.20.2/go.mod h1:bHen+N0u1KEO3YlmqOjTT9Adn1RfD91Ar825/PuiRVs=
-github.com/go-openapi/jsonreference v0.20.4 h1:bKlDxQxQJgwpUSgOENiMPzCTBVuc7vTdXSSgNeAhojU=
-github.com/go-openapi/jsonreference v0.20.4/go.mod h1:5pZJyJP2MnYCpoeoMAql78cCHauHj0V9Lhc506VOpw4=
-github.com/go-openapi/swag v0.22.9 h1:XX2DssF+mQKM2DHsbgZK74y/zj4mo9I99+89xUmuZCE=
-github.com/go-openapi/swag v0.22.9/go.mod h1:3/OXnFfnMAwBD099SwYRk7GD3xOrr1iL7d/XNLXVVwE=
+github.com/go-openapi/jsonpointer v0.21.0 h1:YgdVicSA9vH5RiHs9TZW5oyafXZFc6+2Vc1rr/O9oNQ=
+github.com/go-openapi/jsonpointer v0.21.0/go.mod h1:IUyH9l/+uyhIYQ/PXVA41Rexl+kOkAPDdXEYns6fzUY=
+github.com/go-openapi/jsonreference v0.21.0 h1:Rs+Y7hSXT83Jacb7kFyjn4ijOuVGSvOdF2+tg1TRrwQ=
+github.com/go-openapi/jsonreference v0.21.0/go.mod h1:LmZmgsrTkVg9LG4EaHeY8cBDslNPMo06cago5JNLkm4=
+github.com/go-openapi/swag v0.23.0 h1:vsEVJDUo2hPJ2tu0/Xc+4noaxyEffXNIs3cOULZ+GrE=
+github.com/go-openapi/swag v0.23.0/go.mod h1:esZ8ITTYEsH1V2trKHjAN8Ai7xHb8RV+YSZ577vPjgQ=
+github.com/go-pdf/fpdf v0.5.0/go.mod h1:HzcnA+A23uwogo0tp9yU+l3V+KXhiESpt1PMayhOh5M=
+github.com/go-pdf/fpdf v0.6.0/go.mod h1:HzcnA+A23uwogo0tp9yU+l3V+KXhiESpt1PMayhOh5M=
github.com/go-stack/stack v1.8.0/go.mod h1:v0f6uXyyMGvRgIKkXu+yp6POWl0qKG85gN/melR3HDY=
github.com/go-task/slim-sprig v0.0.0-20210107165309-348f09dbbbc0/go.mod h1:fyg7847qk6SyHyPtNmDHnmrv/HOrqktSC+C9fM+CJOE=
-github.com/go-task/slim-sprig v0.0.0-20230315185526-52ccab3ef572 h1:tfuBGBXKqDEevZMzYi5KSi8KkcZtzBcTgAUUtapy0OI=
-github.com/go-task/slim-sprig v0.0.0-20230315185526-52ccab3ef572/go.mod h1:9Pwr4B2jHnOSGXyyzV8ROjYa2ojvAY6HCGYYfMoC3Ls=
+github.com/go-task/slim-sprig/v3 v3.0.0 h1:sUs3vkvUymDpBKi3qH1YSqBQk9+9D/8M2mN1vB6EwHI=
+github.com/go-task/slim-sprig/v3 v3.0.0/go.mod h1:W848ghGpv3Qj3dhTPRyJypKRiqCdHZiAzKg9hl15HA8=
+github.com/goccy/go-json v0.9.11/go.mod h1:6MelG93GURQebXPDq3khkgXZkazVtN9CRI+MGFi0w8I=
github.com/godbus/dbus/v5 v5.0.4/go.mod h1:xhWf0FNVPg57R7Z0UbKHbJfkEywrmjJnf7w5xrFpKfA=
github.com/godbus/dbus/v5 v5.1.0 h1:4KLkAxT3aOY8Li4FRJe/KvhoNFFxo0m6fNuFUO8QJUk=
github.com/godbus/dbus/v5 v5.1.0/go.mod h1:xhWf0FNVPg57R7Z0UbKHbJfkEywrmjJnf7w5xrFpKfA=
github.com/gogo/protobuf v1.1.1/go.mod h1:r8qH/GZQm5c6nD/R0oafs1akxWv10x8SbQlK7atdtwQ=
github.com/gogo/protobuf v1.3.2 h1:Ov1cvc58UF3b5XjBnZv7+opcTcQFZebYjWzi34vdm4Q=
github.com/gogo/protobuf v1.3.2/go.mod h1:P1XiOD3dCwIKUDQYPy72D8LYyHL2YPYrpS2s69NZV8Q=
+github.com/golang/freetype v0.0.0-20170609003504-e2365dfdc4a0/go.mod h1:E/TSTwGwJL78qG/PmXZO1EjYhfJinVAhrmmHX6Z8B9k=
github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b/go.mod h1:SBH7ygxi8pfUlaOkMMuAQtPIUF8ecWP5IEl/CR7VP2Q=
+github.com/golang/glog v1.0.0/go.mod h1:EWib/APOK0SL3dFbYqvxE3UYd8E6s1ouQ7iEp/0LWV4=
+github.com/golang/glog v1.1.0/go.mod h1:pfYeQZ3JWZoXTV5sFc986z3HTpwQs9At6P4ImfuP3NQ=
github.com/golang/groupcache v0.0.0-20190702054246-869f871628b6/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc=
github.com/golang/groupcache v0.0.0-20191227052852-215e87163ea7/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc=
github.com/golang/groupcache v0.0.0-20200121045136-8c9f03a8e57e/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc=
@@ -138,6 +769,8 @@ github.com/golang/mock v1.4.0/go.mod h1:UOMv5ysSaYNkG+OFQykRIcU/QvvxJf3p21QfJ2Bt
github.com/golang/mock v1.4.1/go.mod h1:UOMv5ysSaYNkG+OFQykRIcU/QvvxJf3p21QfJ2Bt3cw=
github.com/golang/mock v1.4.3/go.mod h1:UOMv5ysSaYNkG+OFQykRIcU/QvvxJf3p21QfJ2Bt3cw=
github.com/golang/mock v1.4.4/go.mod h1:l3mdAwkq5BuhzHwde/uurv3sEJeZMXNpwsxVWU71h+4=
+github.com/golang/mock v1.5.0/go.mod h1:CWnOUgYIOo4TcNZ0wHX3YZCqsaM1I1Jvs6v3mP3KVu8=
+github.com/golang/mock v1.6.0/go.mod h1:p6yTPP+5HYm5mzsMV8JkE6ZKdX+/wYM6Hr+LicevLPs=
github.com/golang/protobuf v1.2.0/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
github.com/golang/protobuf v1.3.1/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
github.com/golang/protobuf v1.3.2/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
@@ -153,9 +786,13 @@ github.com/golang/protobuf v1.4.1/go.mod h1:U8fpvMrcmy5pZrNK1lt4xCsGvpyWQ/VVv6QD
github.com/golang/protobuf v1.4.2/go.mod h1:oDoupMAO8OvCJWAcko0GGGIgR6R6ocIYbsSw735rRwI=
github.com/golang/protobuf v1.4.3/go.mod h1:oDoupMAO8OvCJWAcko0GGGIgR6R6ocIYbsSw735rRwI=
github.com/golang/protobuf v1.5.0/go.mod h1:FsONVRAS9T7sI+LIUmWTfcYkHO4aIWwzhcaSAoJOfIk=
+github.com/golang/protobuf v1.5.1/go.mod h1:DopwsBzvsk0Fs44TXzsVbJyPhcCPeIwnvohx4u74HPM=
github.com/golang/protobuf v1.5.2/go.mod h1:XVQd3VNwM+JqD3oG2Ue2ip4fOMUkwXdXDdiuN0vRsmY=
+github.com/golang/protobuf v1.5.3/go.mod h1:XVQd3VNwM+JqD3oG2Ue2ip4fOMUkwXdXDdiuN0vRsmY=
github.com/golang/protobuf v1.5.4 h1:i7eJL8qZTpSEXOPTxNKhASYpMn+8e5Q6AdndVa1dWek=
github.com/golang/protobuf v1.5.4/go.mod h1:lnTiLA8Wa4RWRcIUkrtSVa5nRhsEGBg48fD6rSs7xps=
+github.com/golang/snappy v0.0.3/go.mod h1:/XxbfmMg8lxefKM7IXC3fBNl/7bRcc72aCRzEWrmP2Q=
+github.com/golang/snappy v0.0.4/go.mod h1:/XxbfmMg8lxefKM7IXC3fBNl/7bRcc72aCRzEWrmP2Q=
github.com/gomarkdown/markdown v0.0.0-20210514010506-3b9f47219fe7/go.mod h1:aii0r/K0ZnHv7G0KF7xy1v0A7s2Ljrb5byB7MO5p6TU=
github.com/gomarkdown/markdown v0.0.0-20231222211730-1d6d20845b47 h1:k4Tw0nt6lwro3Uin8eqoET7MDA4JnT8YgbCjc/g5E3k=
github.com/gomarkdown/markdown v0.0.0-20231222211730-1d6d20845b47/go.mod h1:JDGcbDT52eL4fju3sZ4TeHGsQwhG9nbDV21aMyhwPoA=
@@ -163,6 +800,7 @@ github.com/google/btree v0.0.0-20180813153112-4030bb1f1f0c/go.mod h1:lNA+9X1NB3Z
github.com/google/btree v1.0.0/go.mod h1:lNA+9X1NB3Zf8V7Ke586lFgjr2dZNuvo3lPJSGZ5JPQ=
github.com/google/btree v1.1.2 h1:xf4v41cLI2Z6FxbKm+8Bu+m8ifhj15JuZ9sa0jZCMUU=
github.com/google/btree v1.1.2/go.mod h1:qOPhT0dTNdNzV6Z/lhRX0YXUafgPLFUh+gZMl761Gm4=
+github.com/google/flatbuffers v2.0.8+incompatible/go.mod h1:1AeVuKshWv4vARoZatz6mlQ0JxURH0Kv5+zNeJKJCa8=
github.com/google/gnostic-models v0.6.8 h1:yo/ABAfM5IMRsS1VnXjTBvUb61tFIHozhlYvRgGre9I=
github.com/google/gnostic-models v0.6.8/go.mod h1:5n7qKqH0f5wFt+aWF8CW6pZLLNOfYuF5OpfBSENuI8U=
github.com/google/go-cmp v0.2.0/go.mod h1:oXzfMopK8JAjlY9xF4vHSVASa0yLyX7SntLO5aqRK0M=
@@ -172,18 +810,24 @@ github.com/google/go-cmp v0.4.0/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/
github.com/google/go-cmp v0.4.1/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
github.com/google/go-cmp v0.5.0/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
github.com/google/go-cmp v0.5.1/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
+github.com/google/go-cmp v0.5.2/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
+github.com/google/go-cmp v0.5.3/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
github.com/google/go-cmp v0.5.4/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
github.com/google/go-cmp v0.5.5/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
github.com/google/go-cmp v0.5.6/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
+github.com/google/go-cmp v0.5.7/go.mod h1:n+brtR0CgQNWTVd5ZUFpTBC8YFBDLK/h/bpaJ8/DtOE=
+github.com/google/go-cmp v0.5.8/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY=
github.com/google/go-cmp v0.5.9/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY=
github.com/google/go-cmp v0.6.0 h1:ofyhxvXcZhMsU5ulbFiLKl/XBFqE1GSq7atu8tAmTRI=
github.com/google/go-cmp v0.6.0/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY=
github.com/google/gofuzz v1.0.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
-github.com/google/gofuzz v1.1.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
github.com/google/gofuzz v1.2.0 h1:xRy4A+RhZaiKjJ1bPfwQ8sedCA+YS2YcCHW6ec7JMi0=
github.com/google/gofuzz v1.2.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
github.com/google/martian v2.1.0+incompatible/go.mod h1:9I4somxYTbIHy5NJKHRl3wXiIaQGbYVAs8BPL6v8lEs=
github.com/google/martian/v3 v3.0.0/go.mod h1:y5Zk1BBys9G+gd6Jrk0W3cC1+ELVxBWuIGO+w/tUAp0=
+github.com/google/martian/v3 v3.1.0/go.mod h1:y5Zk1BBys9G+gd6Jrk0W3cC1+ELVxBWuIGO+w/tUAp0=
+github.com/google/martian/v3 v3.2.1/go.mod h1:oBOf6HBosgwRXnUGWUB05QECsc6uvmMiJ3+6W4l/CUk=
+github.com/google/martian/v3 v3.3.2/go.mod h1:oBOf6HBosgwRXnUGWUB05QECsc6uvmMiJ3+6W4l/CUk=
github.com/google/pprof v0.0.0-20181206194817-3ea8567a2e57/go.mod h1:zfwlbNMJ+OItoe0UupaVj+oy1omPYYDuagoSzA8v9mc=
github.com/google/pprof v0.0.0-20190515194954-54271f7e092f/go.mod h1:zfwlbNMJ+OItoe0UupaVj+oy1omPYYDuagoSzA8v9mc=
github.com/google/pprof v0.0.0-20191218002539-d4f498aebedc/go.mod h1:ZgVRPoUq/hfqzAqh7sHMqb3I9Rq5C59dIz2SbBwJ4eM=
@@ -191,21 +835,58 @@ github.com/google/pprof v0.0.0-20200212024743-f11f1df84d12/go.mod h1:ZgVRPoUq/hf
github.com/google/pprof v0.0.0-20200229191704-1ebb73c60ed3/go.mod h1:ZgVRPoUq/hfqzAqh7sHMqb3I9Rq5C59dIz2SbBwJ4eM=
github.com/google/pprof v0.0.0-20200430221834-fc25d7d30c6d/go.mod h1:ZgVRPoUq/hfqzAqh7sHMqb3I9Rq5C59dIz2SbBwJ4eM=
github.com/google/pprof v0.0.0-20200708004538-1a94d8640e99/go.mod h1:ZgVRPoUq/hfqzAqh7sHMqb3I9Rq5C59dIz2SbBwJ4eM=
-github.com/google/pprof v0.0.0-20240225044709-fd706174c886 h1:JSJUTZTQT1Gzb2ROdAKOY3HwzBYcclS2GgumhMfHqjw=
-github.com/google/pprof v0.0.0-20240225044709-fd706174c886/go.mod h1:czg5+yv1E0ZGTi6S6vVK1mke0fV+FaUhNGcd6VRS9Ik=
+github.com/google/pprof v0.0.0-20201023163331-3e6fc7fc9c4c/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
+github.com/google/pprof v0.0.0-20201203190320-1bf35d6f28c2/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
+github.com/google/pprof v0.0.0-20201218002935-b9804c9f04c2/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
+github.com/google/pprof v0.0.0-20210122040257-d980be63207e/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
+github.com/google/pprof v0.0.0-20210226084205-cbba55b83ad5/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
+github.com/google/pprof v0.0.0-20210601050228-01bbb1931b22/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
+github.com/google/pprof v0.0.0-20210609004039-a478d1d731e9/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
+github.com/google/pprof v0.0.0-20210720184732-4bb14d4b1be1/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
+github.com/google/pprof v0.0.0-20240424215950-a892ee059fd6 h1:k7nVchz72niMH6YLQNvHSdIE7iqsQxK1P41mySCvssg=
+github.com/google/pprof v0.0.0-20240424215950-a892ee059fd6/go.mod h1:kf6iHlnVGwgKolg33glAes7Yg/8iWP8ukqeldJSO7jw=
github.com/google/renameio v0.1.0/go.mod h1:KWCgfxg9yswjAJkECMjeO8J8rahYeXnNhOm40UhjYkI=
+github.com/google/s2a-go v0.1.0/go.mod h1:OJpEgntRZo8ugHpF9hkoLJbS5dSI20XZeXJ9JVywLlM=
+github.com/google/s2a-go v0.1.3/go.mod h1:Ej+mSEMGRnqRzjc7VtF+jdBwYG5fuJfiZ8ELkjEwM0A=
+github.com/google/s2a-go v0.1.4/go.mod h1:Ej+mSEMGRnqRzjc7VtF+jdBwYG5fuJfiZ8ELkjEwM0A=
github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 h1:El6M4kTTCOh6aBiKaUGG7oYTSPP8MxqL4YI3kZKwcP4=
github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510/go.mod h1:pupxD2MaaD3pAXIBCelhxNneeOaAeabZDe5s4K6zSpQ=
+github.com/google/uuid v1.1.2/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
+github.com/google/uuid v1.3.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
github.com/google/uuid v1.6.0 h1:NIvaJDMOsjHA8n1jAhLSgzrAzy1Hgr+hNrb57e+94F0=
github.com/google/uuid v1.6.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
+github.com/googleapis/enterprise-certificate-proxy v0.0.0-20220520183353-fd19c99a87aa/go.mod h1:17drOmN3MwGY7t0e+Ei9b45FFGA3fBs3x36SsCg1hq8=
+github.com/googleapis/enterprise-certificate-proxy v0.1.0/go.mod h1:17drOmN3MwGY7t0e+Ei9b45FFGA3fBs3x36SsCg1hq8=
+github.com/googleapis/enterprise-certificate-proxy v0.2.0/go.mod h1:8C0jb7/mgJe/9KK8Lm7X9ctZC2t60YyIpYEI16jx0Qg=
+github.com/googleapis/enterprise-certificate-proxy v0.2.1/go.mod h1:AwSRAtLfXpU5Nm3pW+v7rGDHp09LsPtGY9MduiEsR9k=
+github.com/googleapis/enterprise-certificate-proxy v0.2.3/go.mod h1:AwSRAtLfXpU5Nm3pW+v7rGDHp09LsPtGY9MduiEsR9k=
github.com/googleapis/gax-go/v2 v2.0.4/go.mod h1:0Wqv26UfaUD9n4G6kQubkQ+KchISgw+vpHVxEJEs9eg=
github.com/googleapis/gax-go/v2 v2.0.5/go.mod h1:DWXyrwAJ9X0FpwwEdw+IPEYBICEFu5mhpdKc/us6bOk=
+github.com/googleapis/gax-go/v2 v2.1.0/go.mod h1:Q3nei7sK6ybPYH7twZdmQpAd1MKb7pfu6SK+H1/DsU0=
+github.com/googleapis/gax-go/v2 v2.1.1/go.mod h1:hddJymUZASv3XPyGkUpKj8pPO47Rmb0eJc8R6ouapiM=
+github.com/googleapis/gax-go/v2 v2.2.0/go.mod h1:as02EH8zWkzwUoLbBaFeQ+arQaj/OthfcblKl4IGNaM=
+github.com/googleapis/gax-go/v2 v2.3.0/go.mod h1:b8LNqSzNabLiUpXKkY7HAR5jr6bIT99EXz9pXxye9YM=
+github.com/googleapis/gax-go/v2 v2.4.0/go.mod h1:XOTVJ59hdnfJLIP/dh8n5CGryZR2LxK9wbMD5+iXC6c=
+github.com/googleapis/gax-go/v2 v2.5.1/go.mod h1:h6B0KMMFNtI2ddbGJn3T3ZbwkeT6yqEF02fYlzkUCyo=
+github.com/googleapis/gax-go/v2 v2.6.0/go.mod h1:1mjbznJAPHFpesgE5ucqfYEscaz5kMdcIDwU/6+DDoY=
+github.com/googleapis/gax-go/v2 v2.7.0/go.mod h1:TEop28CZZQ2y+c0VxMUmu1lV+fQx57QpBWsYpwqHJx8=
+github.com/googleapis/gax-go/v2 v2.7.1/go.mod h1:4orTrqY6hXxxaUL4LHIPl6lGo8vAE38/qKbhSAKP6QI=
+github.com/googleapis/gax-go/v2 v2.8.0/go.mod h1:4orTrqY6hXxxaUL4LHIPl6lGo8vAE38/qKbhSAKP6QI=
+github.com/googleapis/gax-go/v2 v2.10.0/go.mod h1:4UOEnMCrxsSqQ940WnTiD6qJ63le2ev3xfyagutxiPw=
+github.com/googleapis/gax-go/v2 v2.11.0/go.mod h1:DxmR61SGKkGLa2xigwuZIQpkCI2S5iydzRfb3peWZJI=
+github.com/googleapis/go-type-adapters v1.0.0/go.mod h1:zHW75FOG2aur7gAO2B+MLby+cLsWGBF62rFAi7WjWO4=
+github.com/googleapis/google-cloud-go-testing v0.0.0-20200911160855-bcd43fbb19e8/go.mod h1:dvDLG8qkwmyD9a/MJJN3XJcT3xFxOKAvTZGvuZmac9g=
github.com/gregjones/httpcache v0.0.0-20190611155906-901d90724c79 h1:+ngKgrYPPJrOjhax5N+uePQ0Fh1Z7PheYoUI/0nzkPA=
github.com/gregjones/httpcache v0.0.0-20190611155906-901d90724c79/go.mod h1:FecbI9+v66THATjSRHfNgh1IVFe/9kFxbXtjV0ctIMA=
+github.com/grpc-ecosystem/grpc-gateway v1.16.0/go.mod h1:BDjrQk3hbvj6Nolgz8mAMFbcEtjT1g+wF4CSlocrBnw=
+github.com/grpc-ecosystem/grpc-gateway/v2 v2.7.0/go.mod h1:hgWBS7lorOAVIJEQMi4ZsPv9hVvWI6+ch50m39Pf2Ks=
+github.com/grpc-ecosystem/grpc-gateway/v2 v2.11.3/go.mod h1:o//XUCC/F+yRGJoPO/VU0GSB0f8Nhgmxx0VIRUvaC0w=
github.com/hashicorp/golang-lru v0.5.0/go.mod h1:/m3WP610KZHVQ1SGc6re/UDhFvYD7pJ4Ao+sR/qLZy8=
github.com/hashicorp/golang-lru v0.5.1/go.mod h1:/m3WP610KZHVQ1SGc6re/UDhFvYD7pJ4Ao+sR/qLZy8=
github.com/hpcloud/tail v1.0.0/go.mod h1:ab1qPbhIpdTxEkNHXyeSf5vhxWSCs/tWer42PpOxQnU=
+github.com/iancoleman/strcase v0.2.0/go.mod h1:iwCmte+B7n89clKwxIoIXy/HfoL7AsD47ZCWhYzw7ho=
github.com/ianlancetaylor/demangle v0.0.0-20181102032728-5e5cf60278f6/go.mod h1:aSSvb/t6k1mPoxDqO4vJh6VOCGPwU4O0C2/Eqndh1Sc=
+github.com/ianlancetaylor/demangle v0.0.0-20200824232613-28f6c0f3b639/go.mod h1:aSSvb/t6k1mPoxDqO4vJh6VOCGPwU4O0C2/Eqndh1Sc=
github.com/imdario/mergo v0.3.16 h1:wwQJbIsHYGMUyLSPrEq1CT16AhnhNJQ51+4fdHUnCl4=
github.com/imdario/mergo v0.3.16/go.mod h1:WBLT9ZmE3lPoWsEzCh9LPo3TiwVN+ZKEjmz+hD27ysY=
github.com/inconshreveable/mousetrap v1.1.0 h1:wN+x4NVGpMsO7ErUn/mUI3vEoE6Jt13X2s0bqwp9tc8=
@@ -222,13 +903,19 @@ github.com/jstemmer/go-junit-report v0.0.0-20190106144839-af01ea7f8024/go.mod h1
github.com/jstemmer/go-junit-report v0.9.1/go.mod h1:Brl9GWCQeLvo8nXZwPNNblvFj/XSXhF0NWZEnDohbsk=
github.com/julienschmidt/httprouter v1.2.0/go.mod h1:SYymIcj16QtmaHHD7aYtjjsJG7VTCxuUUipMqKk8s4w=
github.com/julienschmidt/httprouter v1.3.0/go.mod h1:JR6WtHb+2LUe8TCKY3cZOxFyyO8IZAc4RVcycCCAKdM=
+github.com/jung-kurt/gofpdf v1.0.0/go.mod h1:7Id9E/uU8ce6rXgefFLlgrJj/GYY22cpxn+r32jIOes=
+github.com/jung-kurt/gofpdf v1.0.3-0.20190309125859-24315acbbda5/go.mod h1:7Id9E/uU8ce6rXgefFLlgrJj/GYY22cpxn+r32jIOes=
+github.com/kballard/go-shellquote v0.0.0-20180428030007-95032a82bc51/go.mod h1:CzGEWj7cYgsdH8dAjBGEr58BoE7ScuLd+fwFZ44+/x8=
github.com/kisielk/errcheck v1.5.0/go.mod h1:pFxgyoBC7bSaBwPgfKdkLd5X25qrDl4LWUI2bnpBCr8=
github.com/kisielk/gotool v1.0.0/go.mod h1:XhKaO+MFFWcvkIS/tQcRk01m1F5IRFswLeQ+oQHNcck=
+github.com/klauspost/asmfmt v1.3.2/go.mod h1:AG8TuvYojzulgDAMCnYn50l/5QV3Bs/tp6j0HLHbNSE=
+github.com/klauspost/compress v1.15.9/go.mod h1:PhcZ0MbTNciWF3rruxRgKxI5NkcHHrHUDtV4Yw2GlzU=
+github.com/klauspost/cpuid/v2 v2.0.9/go.mod h1:FInQzS24/EEf25PyTYn52gqo7WaD8xa0213Md/qVLRg=
github.com/konsorten/go-windows-terminal-sequences v1.0.1/go.mod h1:T0+1ngSBFLxvqU3pZ+m/2kptfBszLMUkC4ZK/EgS/cQ=
github.com/konsorten/go-windows-terminal-sequences v1.0.3/go.mod h1:T0+1ngSBFLxvqU3pZ+m/2kptfBszLMUkC4ZK/EgS/cQ=
+github.com/kr/fs v0.1.0/go.mod h1:FFnZGqtBN9Gxj7eW1uZ42v5BccTP0vu6NEaFoC2HwRg=
github.com/kr/logfmt v0.0.0-20140226030751-b84e30acd515/go.mod h1:+0opPa2QZZtGFBFZlji/RkVcI2GknAs/DXo4wKdlNEc=
github.com/kr/pretty v0.1.0/go.mod h1:dAy3ld7l9f0ibDNOQOHHMYYIIbhfbHSm3C4ZsoJORNo=
-github.com/kr/pretty v0.2.0/go.mod h1:ipq/a2n7PKx3OHsz4KJII5eveXtPO4qwEXGdVfWzfnI=
github.com/kr/pretty v0.2.1/go.mod h1:ipq/a2n7PKx3OHsz4KJII5eveXtPO4qwEXGdVfWzfnI=
github.com/kr/pretty v0.3.0/go.mod h1:640gp4NfQd8pI5XOwp5fnNeVWj67G7CFk/SaSQn7NBk=
github.com/kr/pretty v0.3.1 h1:flRD4NNwYAUpkphVc1HcthR4KEIFJ65n8Mw5qdRn3LE=
@@ -241,14 +928,23 @@ github.com/kylelemons/godebug v1.1.0 h1:RPNrshWIDI6G2gRW9EHilWtl7Z6Sb1BR0xunSBf0
github.com/kylelemons/godebug v1.1.0/go.mod h1:9/0rRGxNHcop5bhtWyNeEfOS8JIWk580+fNqagV/RAw=
github.com/liggitt/tabwriter v0.0.0-20181228230101-89fcab3d43de h1:9TO3cAIGXtEhnIaL+V+BEER86oLrvS+kWobKpbJuye0=
github.com/liggitt/tabwriter v0.0.0-20181228230101-89fcab3d43de/go.mod h1:zAbeS9B/r2mtpb6U+EI2rYA5OAXxsYw6wTamcNW+zcE=
+github.com/lyft/protoc-gen-star v0.6.0/go.mod h1:TGAoBVkt8w7MPG72TrKIu85MIdXwDuzJYeZuUPFPNwA=
+github.com/lyft/protoc-gen-star v0.6.1/go.mod h1:TGAoBVkt8w7MPG72TrKIu85MIdXwDuzJYeZuUPFPNwA=
+github.com/lyft/protoc-gen-star/v2 v2.0.1/go.mod h1:RcCdONR2ScXaYnQC5tUzxzlpA3WVYF7/opLeUgcQs/o=
github.com/mailru/easyjson v0.7.7 h1:UGYAvKxe3sBsEDzO8ZeWOSlIQfWFlxbzLZe7hwFURr0=
github.com/mailru/easyjson v0.7.7/go.mod h1:xzfreul335JAWq5oZzymOObrkdz5UnU4kGfJJLY9Nlc=
github.com/mattn/go-colorable v0.1.13 h1:fFA4WZxdEF4tXPZVKMLwD8oUnCTTo08duU7wxecdEvA=
github.com/mattn/go-colorable v0.1.13/go.mod h1:7S9/ev0klgBDR4GtXTXX8a3vIGJpMovkB8vQcUbaXHg=
+github.com/mattn/go-isatty v0.0.12/go.mod h1:cbi8OIDigv2wuxKPP5vlRcQ1OAZbq2CE4Kysco4FUpU=
github.com/mattn/go-isatty v0.0.16/go.mod h1:kYGgaQfpe5nmfYZH+SKPsOc2e4SrIfOl2e/yFXSvRLM=
github.com/mattn/go-isatty v0.0.19 h1:JITubQf0MOLdlGRuRq+jtsDlekdYPia9ZFsB8h/APPA=
github.com/mattn/go-isatty v0.0.19/go.mod h1:W+V8PltTTMOvKvAeJH7IuucS94S2C6jfK/D7dTCTo3Y=
+github.com/mattn/go-sqlite3 v1.14.14/go.mod h1:NyWgC/yNuGj7Q9rpYnZvas74GogHl5/Z4A/KQRfk6bU=
github.com/matttproud/golang_protobuf_extensions v1.0.1/go.mod h1:D8He9yQNgCq6Z5Ld7szi9bcBfOoFv/3dc6xSMkL2PC0=
+github.com/matttproud/golang_protobuf_extensions v1.0.4/go.mod h1:BSXmuO+STAnVfrANrmjBb36TMTDstsz7MSK+HVaYKv4=
+github.com/matttproud/golang_protobuf_extensions/v2 v2.0.0/go.mod h1:QUyp042oQthUoa9bqDv0ER0wrtXnBruoNd7aNjkbP+k=
+github.com/minio/asm2plan9s v0.0.0-20200509001527-cdd76441f9d8/go.mod h1:mC1jAcsrzbxHt8iiaC+zU4b1ylILSosueou12R++wfY=
+github.com/minio/c2goasm v0.0.0-20190812172519-36a3d3bbc4f3/go.mod h1:RagcQ7I8IeTMnF8JTXieKnO4Z6JCsikNEzj0DwauVzE=
github.com/mitchellh/go-ps v1.0.0 h1:i6ampVEEF4wQFF+bkYfwYgY+F/uYJDktmvLPf7qIgjc=
github.com/mitchellh/go-ps v1.0.0/go.mod h1:J4lOc8z8yJs6vUwklHw2XEIiT4z4C40KtWVN3nvg8Pg=
github.com/mitchellh/hashstructure/v2 v2.0.2 h1:vGKWl0YJqUNxE8d+h8f6NJLcCJrgbhC4NcD46KavDd4=
@@ -279,8 +975,8 @@ github.com/mwitkow/go-conntrack v0.0.0-20190716064945-2f068394615f/go.mod h1:qRW
github.com/ncabatoff/fakescraper v0.0.0-20201102132415-4b37ba603d65/go.mod h1:Tx6UMSMyIsjLG/VU/F6xA1+0XI+/f9o1dGJnf1l+bPg=
github.com/ncabatoff/go-seq v0.0.0-20180805175032-b08ef85ed833 h1:t4WWQ9I797y7QUgeEjeXnVb+oYuEDQc6gLvrZJTYo94=
github.com/ncabatoff/go-seq v0.0.0-20180805175032-b08ef85ed833/go.mod h1:0CznHmXSjMEqs5Tezj/w2emQoM41wzYM9KpDKUHPYag=
-github.com/ncabatoff/process-exporter v0.7.10 h1:+Ere7+3se6QqP54gg7aBRagWcL8bq3u5zNi/GRSWeKQ=
-github.com/ncabatoff/process-exporter v0.7.10/go.mod h1:DHZRZjqxw9LCOpLlX0DjBuyn6d5plh41Jv6Tmttj7Ek=
+github.com/ncabatoff/process-exporter v0.7.11 h1:BEKcgOZCa0h4jvBzTUTX0oPyEW+Zhy4JL6KKDnySEfg=
+github.com/ncabatoff/process-exporter v0.7.11/go.mod h1:A2ThOqSI56jai50qiZ7EOJsWGWM6n1ties0wSJxvRlo=
github.com/nxadm/tail v1.4.4/go.mod h1:kenIhsEOeOJmVchQTgglprH7qJGnHDVpk1VPCcaMI8A=
github.com/nxadm/tail v1.4.8 h1:nPr65rt6Y5JFSKQO7qToXr7pePgD6Gwiw05lkbyAQTE=
github.com/nxadm/tail v1.4.8/go.mod h1:+ncqLTQzXmGhMZNUePPaPqPvBxHAIsmXswZKocGu+AU=
@@ -288,57 +984,88 @@ github.com/onsi/ginkgo v1.6.0/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+W
github.com/onsi/ginkgo v1.12.1/go.mod h1:zj2OWP4+oCPe1qIXoGWkgMRwljMUYCdkwsT2108oapk=
github.com/onsi/ginkgo v1.16.5 h1:8xi0RTUf59SOSfEtZMvwTvXYMzG4gV23XVHOZiXNtnE=
github.com/onsi/ginkgo v1.16.5/go.mod h1:+E8gABHa3K6zRBolWtd+ROzc/U5bkGt0FwiG042wbpU=
-github.com/onsi/ginkgo/v2 v2.17.1 h1:V++EzdbhI4ZV4ev0UTIj0PzhzOcReJFyJaLjtSF55M8=
-github.com/onsi/ginkgo/v2 v2.17.1/go.mod h1:llBI3WDLL9Z6taip6f33H76YcWtJv+7R3HigUjbIBOs=
+github.com/onsi/ginkgo/v2 v2.17.2 h1:7eMhcy3GimbsA3hEnVKdw/PQM9XN9krpKVXsZdph0/g=
+github.com/onsi/ginkgo/v2 v2.17.2/go.mod h1:nP2DPOQoNsQmsVyv5rDA8JkXQoCs6goXIvr/PRJ1eCc=
github.com/onsi/gomega v1.7.1/go.mod h1:XdKZgCCFLUoM/7CFJVPcG8C1xQ1AJ0vpAezJrB7JYyY=
github.com/onsi/gomega v1.10.1/go.mod h1:iN09h71vgCQne3DLsj+A5owkum+a2tYe+TOCB1ybHNo=
-github.com/onsi/gomega v1.31.0 h1:54UJxxj6cPInHS3a35wm6BK/F9nHYueZ1NVujHDrnXE=
-github.com/onsi/gomega v1.31.0/go.mod h1:DW9aCi7U6Yi40wNVAvT6kzFnEVEI5n3DloYBiKiT6zk=
+github.com/onsi/gomega v1.33.1 h1:dsYjIxxSR755MDmKVsaFQTE22ChNBcuuTWgkUDSubOk=
+github.com/onsi/gomega v1.33.1/go.mod h1:U4R44UsT+9eLIaYRB2a5qajjtQYn0hauxvRm16AVYg0=
github.com/opencontainers/runc v1.1.12 h1:BOIssBaW1La0/qbNZHXOOa71dZfZEQOzW7dqQf3phss=
github.com/opencontainers/runc v1.1.12/go.mod h1:S+lQwSfncpBha7XTy/5lBwWgm5+y5Ma/O44Ekby9FK8=
github.com/opencontainers/runtime-spec v1.2.0 h1:z97+pHb3uELt/yiAWD691HNHQIF07bE7dzrbT927iTk=
github.com/opencontainers/runtime-spec v1.2.0/go.mod h1:jwyrGlmzljRJv/Fgzds9SsS/C5hL+LL3ko9hs6T5lQ0=
github.com/peterbourgon/diskv v2.0.1+incompatible h1:UBdAOUP5p4RWqPBg048CAvpKN+vxiaj6gdUUzhl4XmI=
github.com/peterbourgon/diskv v2.0.1+incompatible/go.mod h1:uqqh8zWWbv1HBMNONnaR/tNboyR3/BZd58JJSHlUSCU=
+github.com/phpdave11/gofpdf v1.4.2/go.mod h1:zpO6xFn9yxo3YLyMvW8HcKWVdbNqgIfOOp2dXMnm1mY=
+github.com/phpdave11/gofpdi v1.0.12/go.mod h1:vBmVV0Do6hSBHC8uKUQ71JGW+ZGQq74llk/7bXwjDoI=
+github.com/phpdave11/gofpdi v1.0.13/go.mod h1:vBmVV0Do6hSBHC8uKUQ71JGW+ZGQq74llk/7bXwjDoI=
+github.com/pierrec/lz4/v4 v4.1.15/go.mod h1:gZWDp/Ze/IJXGXf23ltt2EXimqmTUXEy0GFuRQyBid4=
github.com/pkg/diff v0.0.0-20210226163009-20ebb0f2a09e/go.mod h1:pJLUxLENpZxwdsKMEsNbx1VGcRFpLqf3715MtcvvzbA=
github.com/pkg/errors v0.8.0/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
github.com/pkg/errors v0.8.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
github.com/pkg/errors v0.9.1 h1:FEBLx1zS214owpjy7qsBeixbURkuhQAwrK5UwLGTwt4=
github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
+github.com/pkg/sftp v1.10.1/go.mod h1:lYOWFsE0bwd1+KfKJaKeuokY15vzFx25BLbzYYoAxZI=
+github.com/pkg/sftp v1.13.1/go.mod h1:3HaPG6Dq1ILlpPZRO0HVMrsydcdLt6HRDccSgb87qRg=
github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
github.com/prometheus/client_golang v0.9.1/go.mod h1:7SWBe2y4D6OKWSNQJUaRYU/AaXPKyh/dDVn+NZz0KFw=
github.com/prometheus/client_golang v1.0.0/go.mod h1:db9x61etRT2tGnBNRi70OPL5FsnadC4Ky3P0J6CfImo=
github.com/prometheus/client_golang v1.7.1/go.mod h1:PY5Wy2awLA44sXw4AOSfFBetzPP4j5+D6mVACh+pe2M=
github.com/prometheus/client_golang v1.11.0/go.mod h1:Z6t4BnS23TR94PD6BsDNk8yVqroYurpAkEiz0P2BEV0=
+github.com/prometheus/client_golang v1.12.1/go.mod h1:3Z9XVyYiZYEO+YQWt3RD2R3jrbd179Rt297l4aS6nDY=
+github.com/prometheus/client_golang v1.14.0/go.mod h1:8vpkKitgIVNcqrRBWh1C4TIUQgYNtG/XQE4E/Zae36Y=
+github.com/prometheus/client_golang v1.15.1/go.mod h1:e9yaBhRPU2pPNsZwE+JdQl0KEt1N9XgF6zxWmaC0xOk=
+github.com/prometheus/client_golang v1.17.0/go.mod h1:VeL+gMmOAxkS2IqfCq0ZmHSL+LjWfWDUmp1mBz9JgUY=
+github.com/prometheus/client_golang v1.18.0/go.mod h1:T+GXkCk5wSJyOqMIzVgvvjFDlkOQntgjkJWKrN5txjA=
github.com/prometheus/client_golang v1.19.0 h1:ygXvpU1AoN1MhdzckN+PyD9QJOSD4x7kmXYlnfbA6JU=
github.com/prometheus/client_golang v1.19.0/go.mod h1:ZRM9uEAypZakd+q/x7+gmsvXdURP+DABIEIjnmDdp+k=
github.com/prometheus/client_model v0.0.0-20180712105110-5c3871d89910/go.mod h1:MbSGuTsp3dbXC40dX6PRTWyKYBIrTGTE9sqQNg2J8bo=
github.com/prometheus/client_model v0.0.0-20190129233127-fd36f4220a90/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
github.com/prometheus/client_model v0.0.0-20190812154241-14fe0d1b01d4/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
github.com/prometheus/client_model v0.2.0/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
+github.com/prometheus/client_model v0.3.0/go.mod h1:LDGWKZIo7rky3hgvBe+caln+Dr3dPggB5dvjtD7w9+w=
+github.com/prometheus/client_model v0.4.0/go.mod h1:oMQmHW1/JoDwqLtg57MGgP/Fb1CJEYF2imWWhWtMkYU=
+github.com/prometheus/client_model v0.4.1-0.20230718164431-9a2bf3000d16/go.mod h1:oMQmHW1/JoDwqLtg57MGgP/Fb1CJEYF2imWWhWtMkYU=
+github.com/prometheus/client_model v0.5.0/go.mod h1:dTiFglRmd66nLR9Pv9f0mZi7B7fk5Pm3gvsjB5tr+kI=
+github.com/prometheus/client_model v0.6.0/go.mod h1:NTQHnmxFpouOD0DpvP4XujX3CdOAGQPoaGhyTchlyt8=
github.com/prometheus/client_model v0.6.1 h1:ZKSh/rekM+n3CeS952MLRAdFwIKqeY8b62p8ais2e9E=
github.com/prometheus/client_model v0.6.1/go.mod h1:OrxVMOVHjw3lKMa8+x6HeMGkHMQyHDk9E3jmP2AmGiY=
github.com/prometheus/common v0.4.1/go.mod h1:TNfzLD0ON7rHzMJeJkieUDPYmFC7Snx/y86RQel1bk4=
github.com/prometheus/common v0.10.0/go.mod h1:Tlit/dnDKsSWFlCLTWaA1cyBgKHSMdTB80sz/V91rCo=
github.com/prometheus/common v0.26.0/go.mod h1:M7rCNAaPfAosfx8veZJCuw84e35h3Cfd9VFqTh1DIvc=
-github.com/prometheus/common v0.29.0/go.mod h1:vu+V0TpY+O6vW9J44gczi3Ap/oXXR10b+M/gUGO4Hls=
+github.com/prometheus/common v0.32.1/go.mod h1:vu+V0TpY+O6vW9J44gczi3Ap/oXXR10b+M/gUGO4Hls=
+github.com/prometheus/common v0.37.0/go.mod h1:phzohg0JFMnBEFGxTDbfu3QyL5GI8gTQJFhYO5B3mfA=
+github.com/prometheus/common v0.42.0/go.mod h1:xBwqVerjNdUDjgODMpudtOMwlOwf2SaTr1yjz4b7Zbc=
+github.com/prometheus/common v0.44.0/go.mod h1:ofAIvZbQ1e/nugmZGz4/qCb9Ap1VoSTIO7x0VV9VvuY=
+github.com/prometheus/common v0.45.0/go.mod h1:YJmSTw9BoKxJplESWWxlbyttQR4uaEcGyv9MZjVOJsY=
+github.com/prometheus/common v0.48.0/go.mod h1:0/KsvlIEfPQCQ5I2iNSAWKPZziNCvRs5EC6ILDTlAPc=
+github.com/prometheus/common v0.52.3/go.mod h1:BrxBKv3FWBIGXw89Mg1AeBq7FSyRzXWI3l3e7W3RN5U=
github.com/prometheus/common v0.53.0 h1:U2pL9w9nmJwJDa4qqLQ3ZaePJ6ZTwt7cMD3AG3+aLCE=
github.com/prometheus/common v0.53.0/go.mod h1:BrxBKv3FWBIGXw89Mg1AeBq7FSyRzXWI3l3e7W3RN5U=
-github.com/prometheus/exporter-toolkit v0.7.0/go.mod h1:ZUBIj498ePooX9t/2xtDjeQYwvRpiPP2lh5u4iblj2g=
+github.com/prometheus/exporter-toolkit v0.11.0/go.mod h1:BVnENhnNecpwoTLiABx7mrPB/OLRIgN74qlQbV+FK1Q=
github.com/prometheus/procfs v0.0.0-20181005140218-185b4288413d/go.mod h1:c3At6R/oaqEKCNdg8wHV1ftS6bRYblBhIjjI8uT2IGk=
github.com/prometheus/procfs v0.0.2/go.mod h1:TjEm7ze935MbeOT/UhFTIMYKhuLP4wbCsTZCD3I8kEA=
github.com/prometheus/procfs v0.1.3/go.mod h1:lV6e/gmhEcM9IjHGsFOCxxuZ+z1YqCvr4OA4YeYWdaU=
github.com/prometheus/procfs v0.6.0/go.mod h1:cz+aTbrPOrUb4q7XlbU9ygM+/jj0fzG6c1xBZuNvfVA=
github.com/prometheus/procfs v0.7.3/go.mod h1:cz+aTbrPOrUb4q7XlbU9ygM+/jj0fzG6c1xBZuNvfVA=
-github.com/prometheus/procfs v0.12.0 h1:jluTpSng7V9hY0O2R9DzzJHYb2xULk9VTR1V1R/k6Bo=
+github.com/prometheus/procfs v0.8.0/go.mod h1:z7EfXMXOkbkqb9IINtpCn86r/to3BnA0uaxHdg830/4=
+github.com/prometheus/procfs v0.9.0/go.mod h1:+pB4zwohETzFnmlpe6yd2lSc+0/46IYZRB/chUwxUZY=
+github.com/prometheus/procfs v0.11.1/go.mod h1:eesXgaPo1q7lBpVMoMy0ZOFTth9hBn4W/y0/p/ScXhY=
github.com/prometheus/procfs v0.12.0/go.mod h1:pcuDEFsWDnvcgNzo4EEweacyhjeA9Zk3cnaOZAZEfOo=
+github.com/prometheus/procfs v0.13.0 h1:GqzLlQyfsPbaEHaQkO7tbDlriv/4o5Hudv6OXHGKX7o=
+github.com/prometheus/procfs v0.13.0/go.mod h1:cd4PFCR54QLnGKPaKGA6l+cfuNXtht43ZKY6tow0Y1g=
+github.com/remyoudompheng/bigfft v0.0.0-20200410134404-eec4a21b6bb0/go.mod h1:qqbHyh8v60DhA7CoWK5oRCqLrMHRGoxYCSS9EjAz6Eo=
+github.com/rogpeppe/fastuuid v1.2.0/go.mod h1:jVj6XXZzXRy/MSR5jhDC/2q6DgLz+nrA6LYCDYWNEvQ=
github.com/rogpeppe/go-internal v1.3.0/go.mod h1:M8bDsm7K2OlrFYOpmOWEs/qY81heoFRclV5y23lUDJ4=
github.com/rogpeppe/go-internal v1.6.1/go.mod h1:xXDCJY+GAPziupqXw64V24skbSoqbTEfhy4qGm1nDQc=
-github.com/rogpeppe/go-internal v1.8.0/go.mod h1:WmiCO8CzOY8rg0OYDC4/i/2WRWAB6poM+XZ2dLUbcbE=
+github.com/rogpeppe/go-internal v1.9.0/go.mod h1:WtVeX8xhTBvf0smdhujwtBcq4Qrzq/fJaraNFVN+nFs=
+github.com/rogpeppe/go-internal v1.10.0/go.mod h1:UQnix2H7Ngw/k4C5ijL5+65zddjncjaFoBhdsK/akog=
github.com/rogpeppe/go-internal v1.11.0 h1:cWPaGQEPrBb5/AsnsZesgZZ9yb1OQ+GOISoDNXVBh4M=
github.com/rogpeppe/go-internal v1.11.0/go.mod h1:ddIwULY96R17DhadqLgMfk9H9tvdUzkipdSkR5nkCZA=
github.com/russross/blackfriday/v2 v2.1.0/go.mod h1:+Rmxgy9KzJVeS9/2gXHxylqXiyQDYRxCVz55jmeOWTM=
+github.com/ruudk/golang-pdf417 v0.0.0-20181029194003-1af4ab5afa58/go.mod h1:6lfFZQK844Gfx8o5WFuvpxWRwnSoipWe/p622j1v06w=
+github.com/ruudk/golang-pdf417 v0.0.0-20201230142125-a7e3863a1245/go.mod h1:pQAZKsJ8yyVxGRWYNEm9oFB8ieLgKFnamEyDmSA0BRk=
github.com/sergi/go-diff v1.3.1 h1:xkr+Oxo4BOQKmkn/B9eMK0g5Kg/983T9DqqPHwYqD+8=
github.com/sergi/go-diff v1.3.1/go.mod h1:aMJSSKb2lpPvRNec0+w3fl7LP9IOFzdc9Pa4NFbPK1I=
github.com/sirupsen/logrus v1.2.0/go.mod h1:LxeOpSwHxABJmUn/MG1IvRgCAasNZTLOkJPxbbu5VWo=
@@ -346,12 +1073,18 @@ github.com/sirupsen/logrus v1.4.2/go.mod h1:tLMulIdttU9McNUspp0xgXVQah82FyeX6Mwd
github.com/sirupsen/logrus v1.6.0/go.mod h1:7uNnSEd1DgxDLC74fIahvMZmmYsHGZGEOFrfsX/uA88=
github.com/sirupsen/logrus v1.9.3 h1:dueUQJ1C2q9oE3F7wvmSGAaVtTmUizReu6fjN8uqzbQ=
github.com/sirupsen/logrus v1.9.3/go.mod h1:naHLuLoDiP4jHNo9R0sCBMtWGeIprob74mVsIT4qYEQ=
+github.com/spaolacci/murmur3 v0.0.0-20180118202830-f09979ecbc72/go.mod h1:JwIasOWyU6f++ZhiEuf87xNszmSA2myDM2Kzu9HwQUA=
+github.com/spf13/afero v1.3.3/go.mod h1:5KUK8ByomD5Ti5Artl0RtHeI5pTF7MIDuXL3yY520V4=
+github.com/spf13/afero v1.6.0/go.mod h1:Ai8FlHk4v/PARR026UzYexafAt9roJ7LcLMAmO6Z93I=
+github.com/spf13/afero v1.9.2/go.mod h1:iUV7ddyEEZPO5gA3zD4fJt6iStLlL+Lg4m2cihcDf8Y=
github.com/spf13/cobra v1.8.0 h1:7aJaZx1B85qltLMc546zn58BxxfZdR/W22ej9CFoEf0=
github.com/spf13/cobra v1.8.0/go.mod h1:WXLWApfZ71AjXPya3WOlMsY9yMs7YeiHhFVlvLyhcho=
github.com/spf13/pflag v1.0.5 h1:iy+VFUOCP1a+8yFto/drg2CJ5u0yRoB7fZw3DKv/JXA=
github.com/spf13/pflag v1.0.5/go.mod h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg=
github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
github.com/stretchr/objx v0.1.1/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
+github.com/stretchr/objx v0.4.0/go.mod h1:YvHI0jy2hoMjB+UWwv71VJQ9isScKT/TqJzVSSt89Yw=
+github.com/stretchr/objx v0.5.0/go.mod h1:Yh+to48EsGEfYuaHDzXPcE3xhTkx73EhmCGUpEOglKo=
github.com/stretchr/objx v0.5.2 h1:xuMeJ0Sdp5ZMRXx/aWO6RZxdr3beISkG5/G/aIRr3pY=
github.com/stretchr/objx v0.5.2/go.mod h1:FRsXN1f5AsAjCGJKqEizvkpNtU+EGNCLh3NxZ/8L+MA=
github.com/stretchr/testify v1.1.3/go.mod h1:a8OnRcib4nhh0OaRAV+Yts87kKdq0PP7pXfy6kDkUVs=
@@ -361,9 +1094,15 @@ github.com/stretchr/testify v1.4.0/go.mod h1:j7eGeouHqKxXV5pUuKE4zz7dFj8WfuZ+81P
github.com/stretchr/testify v1.5.1/go.mod h1:5W2xD1RspED5o8YsWQXVCued0rvSQ+mT+I5cxcmMvtA=
github.com/stretchr/testify v1.6.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
github.com/stretchr/testify v1.7.0/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
+github.com/stretchr/testify v1.7.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
+github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO+kdMU+MU=
+github.com/stretchr/testify v1.8.1/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=
+github.com/stretchr/testify v1.8.2/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=
github.com/stretchr/testify v1.9.0 h1:HtqpIVDClZ4nwg75+f6Lvsy/wHu+3BoSGCbBAcpTsTg=
github.com/stretchr/testify v1.9.0/go.mod h1:r2ic/lqez/lEtzL7wO/rwa5dbSLXVDPFyf8C91i36aY=
github.com/urfave/cli v1.17.1-0.20160602030128-01a33823596e/go.mod h1:70zkFmudgCuE/ngEzBv17Jvp/497gISqfk5gWijbERA=
+github.com/xhit/go-str2duration v1.2.0/go.mod h1:3cPSlfZlUHVlneIVfePFWcJZsuwf+P1v2SRTV4cUmp4=
+github.com/xhit/go-str2duration/v2 v2.1.0/go.mod h1:ohY8p+0f07DiV6Em5LKB0s2YpLtXVyJfNt1+BlmyAsU=
github.com/xlab/treeprint v1.2.0 h1:HzHnuAF1plUN2zGlAFHbSQP2qJ0ZAD3XF5XD7OesXRQ=
github.com/xlab/treeprint v1.2.0/go.mod h1:gj5Gd3gPdKtR1ikdDK6fnFLdmIS0X30kTTuNd/WEJu0=
github.com/yudai/gojsondiff v1.0.0 h1:27cbfqXLVEJ1o8I6v3y9lg8Ydm53EKqHXAOMxEGlCOA=
@@ -376,47 +1115,85 @@ github.com/yuin/goldmark v1.1.25/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9de
github.com/yuin/goldmark v1.1.27/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
github.com/yuin/goldmark v1.1.32/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
github.com/yuin/goldmark v1.2.1/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
+github.com/yuin/goldmark v1.3.5/go.mod h1:mwnBkeHKe2W/ZEtQ+71ViKU8L12m81fl3OWwC1Zlc8k=
+github.com/yuin/goldmark v1.4.1/go.mod h1:mwnBkeHKe2W/ZEtQ+71ViKU8L12m81fl3OWwC1Zlc8k=
github.com/yuin/goldmark v1.4.13/go.mod h1:6yULJ656Px+3vBD8DxQVa3kxgyrAnzto9xy5taEt/CY=
github.com/zakjan/cert-chain-resolver v0.0.0-20221221105603-fcedb00c5b30 h1:rzHvkiukOVYcf840FqAsHqBMhfLofvQIxWtczkGRklU=
github.com/zakjan/cert-chain-resolver v0.0.0-20221221105603-fcedb00c5b30/go.mod h1:/Hzu8ych2oXCs1iNI+MeASyFzWTncQ6nlu/wgqbqC2A=
+github.com/zeebo/assert v1.3.0/go.mod h1:Pq9JiuJQpG8JLJdtkwrJESF0Foym2/D9XMU5ciN/wJ0=
+github.com/zeebo/xxh3 v1.0.2/go.mod h1:5NWz9Sef7zIDm2JHfFlcQvNekmcEl9ekUZQQKCYaDcA=
go.opencensus.io v0.21.0/go.mod h1:mSImk1erAIZhrmZN+AvHh14ztQfjbGwt4TtuofqLduU=
go.opencensus.io v0.22.0/go.mod h1:+kGneAE2xo2IficOXnaByMWTGM9T73dGwxeWcUqIpI8=
go.opencensus.io v0.22.2/go.mod h1:yxeiOL68Rb0Xd1ddK5vPZ/oVn4vY4Ynel7k9FzqtOIw=
go.opencensus.io v0.22.3/go.mod h1:yxeiOL68Rb0Xd1ddK5vPZ/oVn4vY4Ynel7k9FzqtOIw=
go.opencensus.io v0.22.4/go.mod h1:yxeiOL68Rb0Xd1ddK5vPZ/oVn4vY4Ynel7k9FzqtOIw=
+go.opencensus.io v0.22.5/go.mod h1:5pWMHQbX5EPX2/62yrJeAkowc+lfs/XD7Uxpq3pI6kk=
+go.opencensus.io v0.23.0/go.mod h1:XItmlyltB5F7CS4xOC1DcqMoFqwtC6OG2xF7mCv7P7E=
+go.opencensus.io v0.24.0/go.mod h1:vNK8G9p7aAivkbmorf4v+7Hgx+Zs0yY+0fOtgBfjQKo=
+go.opentelemetry.io/proto/otlp v0.7.0/go.mod h1:PqfVotwruBrMGOCsRd/89rSnXhoiJIqeYNgFYFoEGnI=
+go.opentelemetry.io/proto/otlp v0.15.0/go.mod h1:H7XAot3MsfNsj7EXtrA2q5xSNQ10UqI405h3+duxN4U=
+go.opentelemetry.io/proto/otlp v0.19.0/go.mod h1:H7XAot3MsfNsj7EXtrA2q5xSNQ10UqI405h3+duxN4U=
go.starlark.net v0.0.0-20240123142251-f86470692795 h1:LmbG8Pq7KDGkglKVn8VpZOZj6vb9b8nKEGcg9l03epM=
go.starlark.net v0.0.0-20240123142251-f86470692795/go.mod h1:LcLNIzVOMp4oV+uusnpk+VU+SzXaJakUuBjoCSWH5dM=
go.uber.org/goleak v1.3.0 h1:2K3zAYmnTNqV73imy9J1T3WC+gmCePx2hEGkimedGto=
go.uber.org/goleak v1.3.0/go.mod h1:CoHD4mav9JJNrW/WLlf7HGZPjdw8EucARQHekz1X6bE=
go.uber.org/multierr v1.11.0 h1:blXXJkSxSSfBVBlC76pxqeO+LN3aDfLQo+309xJstO0=
go.uber.org/multierr v1.11.0/go.mod h1:20+QtiLqy0Nd6FdQB9TLXag12DsQkrbs3htMFfDN80Y=
-go.uber.org/zap v1.26.0 h1:sI7k6L95XOKS281NhVKOFCUNIvv9e0w4BF8N3u+tCRo=
-go.uber.org/zap v1.26.0/go.mod h1:dtElttAiwGvoJ/vj4IwHBS/gXsEu/pZ50mUIRWuG0so=
+go.uber.org/zap v1.27.0 h1:aJMhYGrd5QSmlpLMr2MftRKl7t8J8PTZPA732ud/XR8=
+go.uber.org/zap v1.27.0/go.mod h1:GB2qFLM7cTU87MWRP2mPIjqfIDnGu+VIO4V/SdhGo2E=
golang.org/dl v0.0.0-20190829154251-82a15e2f2ead/go.mod h1:IUMfjQLJQd4UTqG1Z90tenwKoCX93Gn3MAQJMOSBsDQ=
golang.org/x/crypto v0.0.0-20180904163835-0709b304e793/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4=
golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
golang.org/x/crypto v0.0.0-20190510104115-cbcb75029529/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
golang.org/x/crypto v0.0.0-20190605123033-f99c8df09eb5/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
+golang.org/x/crypto v0.0.0-20190820162420-60c769a6c586/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
-golang.org/x/crypto v0.0.0-20210616213533-5ff15b29337e/go.mod h1:GvvjBRRGRdwPK5ydBHafDWAxML/pGHZbMvKqRZ5+Abc=
+golang.org/x/crypto v0.0.0-20210421170649-83a5a9bb288b/go.mod h1:T9bdIzuCu7OtxOm1hfPfRQxPLYneinmdGuTeoZ9dtd4=
golang.org/x/crypto v0.0.0-20210921155107-089bfa567519/go.mod h1:GvvjBRRGRdwPK5ydBHafDWAxML/pGHZbMvKqRZ5+Abc=
+golang.org/x/crypto v0.0.0-20211108221036-ceb1ce70b4fa/go.mod h1:GvvjBRRGRdwPK5ydBHafDWAxML/pGHZbMvKqRZ5+Abc=
+golang.org/x/crypto v0.0.0-20220314234659-1baeb1ce4c0b/go.mod h1:IxCIyHEi3zRg3s0A5j5BB6A9Jmi73HwBIUl50j+osU4=
+golang.org/x/crypto v0.1.0/go.mod h1:RecgLatLF4+eUMCP1PoPZQb+cVrJcOPbHkTkbkB9sbw=
+golang.org/x/crypto v0.7.0/go.mod h1:pYwdfH91IfpZVANVyUOhSIPZaFoJGxTFbZhFTx+dXZU=
+golang.org/x/crypto v0.9.0/go.mod h1:yrmDGqONDYtNj3tH8X9dzUun2m2lzPa9ngI6/RUPGR0=
+golang.org/x/crypto v0.13.0/go.mod h1:y6Z2r+Rw4iayiXXAIxJIDAJ1zMW4yaTpebo8fPOliYc=
+golang.org/x/crypto v0.14.0/go.mod h1:MVFd36DqK4CsrnJYDkBA3VC4m2GkXAM0PvzMCn4JQf4=
+golang.org/x/crypto v0.16.0/go.mod h1:gCAAfMLgwOJRpTjQ2zCCt2OcSfYMTeZVSRtQlPC7Nq4=
+golang.org/x/crypto v0.18.0/go.mod h1:R0j02AL6hcrfOiy9T4ZYp/rcWeMxM3L6QYxlOuEG1mg=
+golang.org/x/crypto v0.19.0/go.mod h1:Iy9bg/ha4yyC70EfRS8jz+B6ybOBKMaSxLj6P6oBDfU=
+golang.org/x/crypto v0.21.0/go.mod h1:0BP7YvVV9gBbVKyeTG0Gyn+gZm94bibOW5BjDEYAOMs=
golang.org/x/crypto v0.22.0 h1:g1v0xeRhjcugydODzvb3mEM9SQ0HGp9s/nh3COQ/C30=
golang.org/x/crypto v0.22.0/go.mod h1:vr6Su+7cTlO45qkww3VDJlzDn0ctJvRgYbC2NvXHt+M=
+golang.org/x/exp v0.0.0-20180321215751-8460e604b9de/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
+golang.org/x/exp v0.0.0-20180807140117-3d87b88a115f/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
+golang.org/x/exp v0.0.0-20190125153040-c74c464bbbf2/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
golang.org/x/exp v0.0.0-20190306152737-a1d7652674e8/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
golang.org/x/exp v0.0.0-20190510132918-efd6b22b2522/go.mod h1:ZjyILWgesfNpC6sMxTJOJm9Kp84zZh5NQWvqDGG3Qr8=
golang.org/x/exp v0.0.0-20190829153037-c13cbed26979/go.mod h1:86+5VVa7VpoJ4kLfm080zCjGlMRFzhUhsZKEZO7MGek=
+golang.org/x/exp v0.0.0-20191002040644-a1355ae1e2c3/go.mod h1:NOZ3BPKG0ec/BKJQgnvsSFpcKLM5xXVWnvZS97DWHgE=
golang.org/x/exp v0.0.0-20191030013958-a1ab85dbe136/go.mod h1:JXzH8nQsPlswgeRAPE3MuO9GYsAcnJvJ4vnMwN/5qkY=
golang.org/x/exp v0.0.0-20191129062945-2f5052295587/go.mod h1:2RIsYlXP63K8oxa1u096TMicItID8zy7Y6sNkU49FU4=
golang.org/x/exp v0.0.0-20191227195350-da58074b4299/go.mod h1:2RIsYlXP63K8oxa1u096TMicItID8zy7Y6sNkU49FU4=
golang.org/x/exp v0.0.0-20200119233911-0405dc783f0a/go.mod h1:2RIsYlXP63K8oxa1u096TMicItID8zy7Y6sNkU49FU4=
golang.org/x/exp v0.0.0-20200207192155-f17229e696bd/go.mod h1:J/WKrq2StrnmMY6+EHIKF9dgMWnmCNThgcyBT1FY9mM=
golang.org/x/exp v0.0.0-20200224162631-6cc2880d07d6/go.mod h1:3jZMyOhIsHpP37uCMkUooju7aAi5cS1Q23tOzKc+0MU=
-golang.org/x/exp v0.0.0-20220722155223-a9213eeb770e h1:+WEEuIdZHnUeJJmEUjyYC2gfUMj69yZXw17EnHg/otA=
-golang.org/x/exp v0.0.0-20220722155223-a9213eeb770e/go.mod h1:Kr81I6Kryrl9sr8s2FK3vxD90NdsKWRuOIl2O4CvYbA=
+golang.org/x/exp v0.0.0-20220827204233-334a2380cb91/go.mod h1:cyybsKvd6eL0RnXn6p/Grxp8F5bW7iYuBgsNCOHpMYE=
+golang.org/x/exp v0.0.0-20240416160154-fe59bbe5cc7f h1:99ci1mjWVBWwJiEKYY6jWa4d2nTQVIEhZIptnrVb1XY=
+golang.org/x/exp v0.0.0-20240416160154-fe59bbe5cc7f/go.mod h1:/lliqkxwWAhPjf5oSOIJup2XcqJaw8RGS6k3TGEc7GI=
+golang.org/x/image v0.0.0-20180708004352-c73c2afc3b81/go.mod h1:ux5Hcp/YLpHSI86hEcLt0YII63i6oz57MZXIpbrjZUs=
golang.org/x/image v0.0.0-20190227222117-0694c2d4d067/go.mod h1:kZ7UVZpmo3dzQBMxlp+ypCbDeSB+sBbTgSJuh5dn5js=
golang.org/x/image v0.0.0-20190802002840-cff245a6509b/go.mod h1:FeLwcggjj3mMvU+oOTbSwawSJRM1uh48EjtB4UJZlP0=
+golang.org/x/image v0.0.0-20190910094157-69e4b8554b2a/go.mod h1:FeLwcggjj3mMvU+oOTbSwawSJRM1uh48EjtB4UJZlP0=
+golang.org/x/image v0.0.0-20200119044424-58c23975cae1/go.mod h1:FeLwcggjj3mMvU+oOTbSwawSJRM1uh48EjtB4UJZlP0=
+golang.org/x/image v0.0.0-20200430140353-33d19683fad8/go.mod h1:FeLwcggjj3mMvU+oOTbSwawSJRM1uh48EjtB4UJZlP0=
+golang.org/x/image v0.0.0-20200618115811-c13761719519/go.mod h1:FeLwcggjj3mMvU+oOTbSwawSJRM1uh48EjtB4UJZlP0=
+golang.org/x/image v0.0.0-20201208152932-35266b937fa6/go.mod h1:FeLwcggjj3mMvU+oOTbSwawSJRM1uh48EjtB4UJZlP0=
+golang.org/x/image v0.0.0-20210216034530-4410531fe030/go.mod h1:FeLwcggjj3mMvU+oOTbSwawSJRM1uh48EjtB4UJZlP0=
+golang.org/x/image v0.0.0-20210607152325-775e3b0c77b9/go.mod h1:023OzeP/+EPmXeapQh35lcL3II3LrY8Ic+EFFKVhULM=
+golang.org/x/image v0.0.0-20210628002857-a66eb6448b8d/go.mod h1:023OzeP/+EPmXeapQh35lcL3II3LrY8Ic+EFFKVhULM=
+golang.org/x/image v0.0.0-20211028202545-6944b10bf410/go.mod h1:023OzeP/+EPmXeapQh35lcL3II3LrY8Ic+EFFKVhULM=
+golang.org/x/image v0.0.0-20220302094943-723b81ca9867/go.mod h1:023OzeP/+EPmXeapQh35lcL3II3LrY8Ic+EFFKVhULM=
golang.org/x/lint v0.0.0-20181026193005-c67002cb31c3/go.mod h1:UVdnD1Gm6xHRNCYTkRU2/jEulfH38KcIWyp/GAMgvoE=
golang.org/x/lint v0.0.0-20190227174305-5b3e6a55c961/go.mod h1:wehouNa3lNwaWXcvxsM5YxQ5yQlVC4a0KAMCusXpPoU=
golang.org/x/lint v0.0.0-20190301231843-5614ed5bae6f/go.mod h1:UVdnD1Gm6xHRNCYTkRU2/jEulfH38KcIWyp/GAMgvoE=
@@ -427,6 +1204,8 @@ golang.org/x/lint v0.0.0-20190930215403-16217165b5de/go.mod h1:6SW0HCj/g11FgYtHl
golang.org/x/lint v0.0.0-20191125180803-fdd1cda4f05f/go.mod h1:5qLYkcX4OjUUV8bRuDixDT3tpyyb+LUpUlRWLxfhWrs=
golang.org/x/lint v0.0.0-20200130185559-910be7a94367/go.mod h1:3xt1FjdF8hUf6vQPIChWIBhFzV8gjjsPE/fR3IyQdNY=
golang.org/x/lint v0.0.0-20200302205851-738671d3881b/go.mod h1:3xt1FjdF8hUf6vQPIChWIBhFzV8gjjsPE/fR3IyQdNY=
+golang.org/x/lint v0.0.0-20201208152925-83fdc39ff7b5/go.mod h1:3xt1FjdF8hUf6vQPIChWIBhFzV8gjjsPE/fR3IyQdNY=
+golang.org/x/lint v0.0.0-20210508222113-6edffad5e616/go.mod h1:3xt1FjdF8hUf6vQPIChWIBhFzV8gjjsPE/fR3IyQdNY=
golang.org/x/mobile v0.0.0-20190312151609-d3739f865fa6/go.mod h1:z+o9i4GpDbdi3rU15maQ/Ox0txvL9dWGYEHz965HBQE=
golang.org/x/mobile v0.0.0-20190719004257-d2bd2a29d028/go.mod h1:E/iHnbuqvinMTCcRqshq8CkpyQDoeVncDDYHnLhea+o=
golang.org/x/mod v0.0.0-20190513183733-4bf6d317e70e/go.mod h1:mXi4GBBbnImb6dmsKGUJ2LatrhH/nqhxcFungHvyanc=
@@ -435,9 +1214,17 @@ golang.org/x/mod v0.1.1-0.20191105210325-c90efee705ee/go.mod h1:QqPTAvyqsEbceGzB
golang.org/x/mod v0.1.1-0.20191107180719-034126e5016b/go.mod h1:QqPTAvyqsEbceGzBzNggFXnrqF1CaUcvgkdR5Ot7KZg=
golang.org/x/mod v0.2.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
golang.org/x/mod v0.3.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
+golang.org/x/mod v0.4.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
+golang.org/x/mod v0.4.1/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
+golang.org/x/mod v0.4.2/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
+golang.org/x/mod v0.5.0/go.mod h1:5OXOZSfqPIIbmVBIIKWRFfZjPR0E5r58TLhUjH0a2Ro=
+golang.org/x/mod v0.5.1/go.mod h1:5OXOZSfqPIIbmVBIIKWRFfZjPR0E5r58TLhUjH0a2Ro=
golang.org/x/mod v0.6.0-dev.0.20220419223038-86c51ed26bb4/go.mod h1:jJ57K6gSWd91VN4djpZkiMVwK6gcyfeH4XE8wZrZaV4=
-golang.org/x/mod v0.15.0 h1:SernR4v+D55NyBH2QiEQrlBAnj1ECL6AGrA5+dPaMY8=
-golang.org/x/mod v0.15.0/go.mod h1:hTbmBsO62+eylJbnUtE2MGJUyE7QWk4xUqPFrRgJ+7c=
+golang.org/x/mod v0.7.0/go.mod h1:iBbtSCu2XBx23ZKBPSOrRkjjQPZFPuis4dIYUhu/chs=
+golang.org/x/mod v0.8.0/go.mod h1:iBbtSCu2XBx23ZKBPSOrRkjjQPZFPuis4dIYUhu/chs=
+golang.org/x/mod v0.9.0/go.mod h1:iBbtSCu2XBx23ZKBPSOrRkjjQPZFPuis4dIYUhu/chs=
+golang.org/x/mod v0.17.0 h1:zY54UmvipHiNd+pm+m0x9KhZ9hl1/7QNMyxXbc6ICqA=
+golang.org/x/mod v0.17.0/go.mod h1:hTbmBsO62+eylJbnUtE2MGJUyE7QWk4xUqPFrRgJ+7c=
golang.org/x/net v0.0.0-20180724234803-3673e40ba225/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
golang.org/x/net v0.0.0-20180826012351-8a410e7b638d/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
golang.org/x/net v0.0.0-20180906233101-161cd47e91fd/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
@@ -469,19 +1256,82 @@ golang.org/x/net v0.0.0-20200625001655-4c5254603344/go.mod h1:/O7V0waA8r7cgGh81R
golang.org/x/net v0.0.0-20200707034311-ab3426394381/go.mod h1:/O7V0waA8r7cgGh81Ro3o1hOxt32SMVPicZroKQ2sZA=
golang.org/x/net v0.0.0-20200822124328-c89045814202/go.mod h1:/O7V0waA8r7cgGh81Ro3o1hOxt32SMVPicZroKQ2sZA=
golang.org/x/net v0.0.0-20201021035429-f5854403a974/go.mod h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU=
+golang.org/x/net v0.0.0-20201031054903-ff519b6c9102/go.mod h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU=
+golang.org/x/net v0.0.0-20201110031124-69a78807bb2b/go.mod h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU=
+golang.org/x/net v0.0.0-20201209123823-ac852fbbde11/go.mod h1:m0MpNAwzfU5UDzcl9v0D8zg8gWTRqZa9RBIspLL5mdg=
+golang.org/x/net v0.0.0-20201224014010-6772e930b67b/go.mod h1:m0MpNAwzfU5UDzcl9v0D8zg8gWTRqZa9RBIspLL5mdg=
+golang.org/x/net v0.0.0-20210119194325-5f4716e94777/go.mod h1:m0MpNAwzfU5UDzcl9v0D8zg8gWTRqZa9RBIspLL5mdg=
golang.org/x/net v0.0.0-20210226172049-e18ecbb05110/go.mod h1:m0MpNAwzfU5UDzcl9v0D8zg8gWTRqZa9RBIspLL5mdg=
+golang.org/x/net v0.0.0-20210316092652-d523dce5a7f4/go.mod h1:RBQZq4jEuRlivfhVLdyRGr576XBO4/greRjx4P4O3yc=
+golang.org/x/net v0.0.0-20210405180319-a5a99cb37ef4/go.mod h1:p54w0d4576C0XHj96bSt6lcn1PtDYWL6XObtHCRCNQM=
+golang.org/x/net v0.0.0-20210503060351-7fd8e65b6420/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
golang.org/x/net v0.0.0-20210525063256-abc453219eb5/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
+golang.org/x/net v0.0.0-20210813160813-60bc85c4be6d/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
+golang.org/x/net v0.0.0-20211015210444-4f30a5c0130f/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
+golang.org/x/net v0.0.0-20211112202133-69e39bad7dc2/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
+golang.org/x/net v0.0.0-20220127200216-cd36cc0744dd/go.mod h1:CfG3xpIq0wQ8r1q4Su4UZFWDARRcnwPjda9FqA0JpMk=
+golang.org/x/net v0.0.0-20220225172249-27dd8689420f/go.mod h1:CfG3xpIq0wQ8r1q4Su4UZFWDARRcnwPjda9FqA0JpMk=
+golang.org/x/net v0.0.0-20220325170049-de3da57026de/go.mod h1:CfG3xpIq0wQ8r1q4Su4UZFWDARRcnwPjda9FqA0JpMk=
+golang.org/x/net v0.0.0-20220412020605-290c469a71a5/go.mod h1:CfG3xpIq0wQ8r1q4Su4UZFWDARRcnwPjda9FqA0JpMk=
+golang.org/x/net v0.0.0-20220425223048-2871e0cb64e4/go.mod h1:CfG3xpIq0wQ8r1q4Su4UZFWDARRcnwPjda9FqA0JpMk=
+golang.org/x/net v0.0.0-20220607020251-c690dde0001d/go.mod h1:XRhObCWvk6IyKnWLug+ECip1KBveYUHfp+8e9klMJ9c=
+golang.org/x/net v0.0.0-20220617184016-355a448f1bc9/go.mod h1:XRhObCWvk6IyKnWLug+ECip1KBveYUHfp+8e9klMJ9c=
+golang.org/x/net v0.0.0-20220624214902-1bab6f366d9e/go.mod h1:XRhObCWvk6IyKnWLug+ECip1KBveYUHfp+8e9klMJ9c=
golang.org/x/net v0.0.0-20220722155237-a158d28d115b/go.mod h1:XRhObCWvk6IyKnWLug+ECip1KBveYUHfp+8e9klMJ9c=
-golang.org/x/net v0.23.0 h1:7EYJ93RZ9vYSZAIb2x3lnuvqO5zneoD6IvWjuhfxjTs=
-golang.org/x/net v0.23.0/go.mod h1:JKghWKKOSdJwpW2GEx0Ja7fmaKnMsbu+MWVZTokSYmg=
+golang.org/x/net v0.0.0-20220909164309-bea034e7d591/go.mod h1:YDH+HFinaLZZlnHAfSS6ZXJJ9M9t4Dl22yv3iI2vPwk=
+golang.org/x/net v0.0.0-20221012135044-0b7e1fb9d458/go.mod h1:YDH+HFinaLZZlnHAfSS6ZXJJ9M9t4Dl22yv3iI2vPwk=
+golang.org/x/net v0.0.0-20221014081412-f15817d10f9b/go.mod h1:YDH+HFinaLZZlnHAfSS6ZXJJ9M9t4Dl22yv3iI2vPwk=
+golang.org/x/net v0.1.0/go.mod h1:Cx3nUiGt4eDBEyega/BKRp+/AlGL8hYe7U9odMt2Cco=
+golang.org/x/net v0.2.0/go.mod h1:KqCZLdyyvdV855qA2rE3GC2aiw5xGR5TEjj8smXukLY=
+golang.org/x/net v0.4.0/go.mod h1:MBQ8lrhLObU/6UmLb4fmbmk5OcyYmqtbGd/9yIeKjEE=
+golang.org/x/net v0.5.0/go.mod h1:DivGGAXEgPSlEBzxGzZI+ZLohi+xUj054jfeKui00ws=
+golang.org/x/net v0.6.0/go.mod h1:2Tu9+aMcznHK/AK1HMvgo6xiTLG5rD5rZLDS+rp2Bjs=
+golang.org/x/net v0.7.0/go.mod h1:2Tu9+aMcznHK/AK1HMvgo6xiTLG5rD5rZLDS+rp2Bjs=
+golang.org/x/net v0.8.0/go.mod h1:QVkue5JL9kW//ek3r6jTKnTFis1tRmNAW2P1shuFdJc=
+golang.org/x/net v0.9.0/go.mod h1:d48xBJpPfHeWQsugry2m+kC02ZBRGRgulfHnEXEuWns=
+golang.org/x/net v0.10.0/go.mod h1:0qNGK6F8kojg2nk9dLZ2mShWaEBan6FAoqfSigmmuDg=
+golang.org/x/net v0.15.0/go.mod h1:idbUs1IY1+zTqbi8yxTbhexhEEk5ur9LInksu6HrEpk=
+golang.org/x/net v0.17.0/go.mod h1:NxSsAGuq816PNPmqtQdLE42eU2Fs7NoRIZrHJAlaCOE=
+golang.org/x/net v0.20.0/go.mod h1:z8BVo6PvndSri0LbOE3hAn0apkU+1YvI6E70E9jsnvY=
+golang.org/x/net v0.21.0/go.mod h1:bIjVDfnllIU7BJ2DNgfnXvpSvtn8VRwhlsaeUTyUS44=
+golang.org/x/net v0.22.0/go.mod h1:JKghWKKOSdJwpW2GEx0Ja7fmaKnMsbu+MWVZTokSYmg=
+golang.org/x/net v0.24.0 h1:1PcaxkF854Fu3+lvBIx5SYn9wRlBzzcnHZSiaFFAb0w=
+golang.org/x/net v0.24.0/go.mod h1:2Q7sJY5mzlzWjKtYUEXSlBWCdyaioyXzRB2RtU8KVE8=
golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U=
golang.org/x/oauth2 v0.0.0-20190226205417-e64efc72b421/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
golang.org/x/oauth2 v0.0.0-20190604053449-0f29369cfe45/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
golang.org/x/oauth2 v0.0.0-20191202225959-858c2ad4c8b6/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
golang.org/x/oauth2 v0.0.0-20200107190931-bf48bf16ab8d/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
+golang.org/x/oauth2 v0.0.0-20200902213428-5d25da1a8d43/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A=
+golang.org/x/oauth2 v0.0.0-20201109201403-9fd604954f58/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A=
+golang.org/x/oauth2 v0.0.0-20201208152858-08078c50e5b5/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A=
+golang.org/x/oauth2 v0.0.0-20210218202405-ba52d332ba99/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A=
+golang.org/x/oauth2 v0.0.0-20210220000619-9bb904979d93/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A=
+golang.org/x/oauth2 v0.0.0-20210313182246-cd4f82c27b84/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A=
golang.org/x/oauth2 v0.0.0-20210514164344-f6687ab2804c/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A=
-golang.org/x/oauth2 v0.18.0 h1:09qnuIAgzdx1XplqJvW6CQqMCtGZykZWcXzPMPUusvI=
+golang.org/x/oauth2 v0.0.0-20210628180205-a41e5a781914/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A=
+golang.org/x/oauth2 v0.0.0-20210805134026-6f1e6394065a/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A=
+golang.org/x/oauth2 v0.0.0-20210819190943-2bc19b11175f/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A=
+golang.org/x/oauth2 v0.0.0-20211104180415-d3ed0bb246c8/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A=
+golang.org/x/oauth2 v0.0.0-20220223155221-ee480838109b/go.mod h1:DAh4E804XQdzx2j+YRIaUnCqCV2RuMz24cGBJ5QYIrc=
+golang.org/x/oauth2 v0.0.0-20220309155454-6242fa91716a/go.mod h1:DAh4E804XQdzx2j+YRIaUnCqCV2RuMz24cGBJ5QYIrc=
+golang.org/x/oauth2 v0.0.0-20220411215720-9780585627b5/go.mod h1:DAh4E804XQdzx2j+YRIaUnCqCV2RuMz24cGBJ5QYIrc=
+golang.org/x/oauth2 v0.0.0-20220608161450-d0670ef3b1eb/go.mod h1:jaDAt6Dkxork7LmZnYtzbRWj0W47D86a3TGe0YHBvmE=
+golang.org/x/oauth2 v0.0.0-20220622183110-fd043fe589d2/go.mod h1:jaDAt6Dkxork7LmZnYtzbRWj0W47D86a3TGe0YHBvmE=
+golang.org/x/oauth2 v0.0.0-20220822191816-0ebed06d0094/go.mod h1:h4gKUeWbJ4rQPri7E0u6Gs4e9Ri2zaLxzw5DI5XGrYg=
+golang.org/x/oauth2 v0.0.0-20220909003341-f21342109be1/go.mod h1:h4gKUeWbJ4rQPri7E0u6Gs4e9Ri2zaLxzw5DI5XGrYg=
+golang.org/x/oauth2 v0.0.0-20221006150949-b44042a4b9c1/go.mod h1:h4gKUeWbJ4rQPri7E0u6Gs4e9Ri2zaLxzw5DI5XGrYg=
+golang.org/x/oauth2 v0.0.0-20221014153046-6fdb5e3db783/go.mod h1:h4gKUeWbJ4rQPri7E0u6Gs4e9Ri2zaLxzw5DI5XGrYg=
+golang.org/x/oauth2 v0.4.0/go.mod h1:RznEsdpjGAINPTOF0UH/t+xJ75L18YO3Ho6Pyn+uRec=
+golang.org/x/oauth2 v0.5.0/go.mod h1:9/XBHVqLaWO3/BRHs5jbpYCnOZVjj5V0ndyaAM7KB4I=
+golang.org/x/oauth2 v0.6.0/go.mod h1:ycmewcwgD4Rpr3eZJLSB4Kyyljb3qDh40vJ8STE5HKw=
+golang.org/x/oauth2 v0.7.0/go.mod h1:hPLQkd9LyjfXTiRohC/41GhcFqxisoUQ99sCUOHO9x4=
+golang.org/x/oauth2 v0.8.0/go.mod h1:yr7u4HXZRm1R1kBWqr/xKNqewf0plRYoB7sla+BCIXE=
+golang.org/x/oauth2 v0.12.0/go.mod h1:A74bZ3aGXgCY0qaIC9Ahg6Lglin4AMAco8cIv9baba4=
+golang.org/x/oauth2 v0.16.0/go.mod h1:hqZ+0LWXsiVoZpeld6jVt06P3adbS2Uu911W1SsJv2o=
golang.org/x/oauth2 v0.18.0/go.mod h1:Wf7knwG0MPoWIMMBgFlEaSUDaKskp0dCfrlJRJXbBi8=
+golang.org/x/oauth2 v0.20.0 h1:4mQdhULixXKP1rwYBW0vAijoXnkTG0BLCDRzfe1idMo=
+golang.org/x/oauth2 v0.20.0/go.mod h1:XYTD2NtWslqkgxebSiOHnXEap4TF09sJSc7H1sXbhtI=
golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sync v0.0.0-20181108010431-42b317875d0f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sync v0.0.0-20181221193216-37e7f081c4d4/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
@@ -492,9 +1342,18 @@ golang.org/x/sync v0.0.0-20200317015054-43a5402ce75a/go.mod h1:RxMgew5VJxzue5/jJ
golang.org/x/sync v0.0.0-20200625203802-6e8e738ad208/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sync v0.0.0-20201020160332-67f06af15bc9/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sync v0.0.0-20201207232520-09787c993a3a/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20210220032951-036812b2e83c/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20220601150217-0de741cfad7f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sync v0.0.0-20220722155255-886fb9371eb4/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
-golang.org/x/sync v0.6.0 h1:5BMeUDZ7vkXGfEr1x9B4bRcTH4lpkTkpdh0T/J+qjbQ=
+golang.org/x/sync v0.0.0-20220819030929-7fc1605a5dde/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20220929204114-8fcdb60fdcc0/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.1.0/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.2.0/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.3.0/go.mod h1:FU7BRWz2tNW+3quACPkgCx/L+uEAv1htQ0V83Z9Rj+Y=
+golang.org/x/sync v0.5.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk=
golang.org/x/sync v0.6.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk=
+golang.org/x/sync v0.7.0 h1:YsImfSBoP9QPYL0xyKJPq0gcaJdG3rInoqxTWbfQu9M=
+golang.org/x/sync v0.7.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk=
golang.org/x/sys v0.0.0-20180830151530-49385e6e1522/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
golang.org/x/sys v0.0.0-20180905080454-ebe1bf3edb33/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
golang.org/x/sys v0.0.0-20180909124046-d0be0721c37e/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
@@ -516,6 +1375,7 @@ golang.org/x/sys v0.0.0-20191204072324-ce4227a45e2e/go.mod h1:h1NjWce9XRLGQEsW7w
golang.org/x/sys v0.0.0-20191228213918-04cbcbbfeed8/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20200106162015-b016eb3dc98e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20200113162924-86b910548bc1/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200116001909-b77594299b42/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20200122134326-e047566fdf82/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20200202164722-d101bd2416d5/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20200212091648-12a6c2dcc1e4/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
@@ -530,23 +1390,90 @@ golang.org/x/sys v0.0.0-20200523222454-059865788121/go.mod h1:h1NjWce9XRLGQEsW7w
golang.org/x/sys v0.0.0-20200615200032-f1bc736245b1/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20200625212154-ddb9806d33ae/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20200803210538-64077c9b5642/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200905004654-be1d3432aa8f/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20200930185726-fdedc70b468f/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20201119102817-f84b799fce68/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20201201145000-ef89a241ccb3/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20210104204734-6f8348627aad/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20210112080510-489259a85091/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20210119212857-b64e53b001e4/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20210124154548-22da62e12c0c/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20210220050731-9a76102bfb43/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20210225134936-a50acf3fe073/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20210304124612-50617c2ba197/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20210305230114-8fe3ee5dd75b/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20210315160823-c6e025ad8005/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20210320140829-1e4c9ba3b0c4/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20210330210617-4fbd30eecc44/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20210423082822-04245dca01da/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20210423185535-09eb48e85fd7/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20210510120138-977fb7262007/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20210514084401-e8d321eab015/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.0.0-20210603081109-ebe580a85c40/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20210603125802-9665404d3644/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.0.0-20210615035016-665e8c7367d1/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.0.0-20210616094352-59db8d763f22/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20210630005230-0f9fa26af87c/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20210806184541-e5e7981a1069/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20210816183151-1e6c022a8912/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20210823070655-63515b42dcdf/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20210908233432-aa78b53d3365/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20211007075335-d3039528d8ac/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20211019181941-9d821ace8654/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20211124211545-fe61309f8881/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20211210111614-af8b64212486/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20211216021012-1d35b9e2eb4e/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20220114195835-da31bd327af9/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20220128215802-99c3d69c2c27/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20220209214540-3681064d5158/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20220227234510-4e6760a101f9/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20220328115105-d36c6a25d886/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20220412211240-33da011f77ad/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20220502124256-b6088ccd6cba/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20220503163025-988cb79eb6c6/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.0.0-20220520151302-bc2c85ada10a/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20220610221304-9f5ed59c137d/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20220615213510-4f61da869c0c/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20220624220833-87e55d714810/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.0.0-20220715151400-c0bba94af5f8/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.0.0-20220722155257-8c9f86f7a55f/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20220728004956-3c1f35247d10/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.0.0-20220811171246-fbc7d0a398ab/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20220829200755-d48e67d00261/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.1.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.2.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.3.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.4.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.5.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.19.0 h1:q5f1RH2jigJ1MoAWp2KTp3gm5zAGFUTarQZ5U386+4o=
-golang.org/x/sys v0.19.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
+golang.org/x/sys v0.7.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.8.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.9.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.11.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.12.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.13.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.15.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
+golang.org/x/sys v0.16.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
+golang.org/x/sys v0.17.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
+golang.org/x/sys v0.18.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
+golang.org/x/sys v0.20.0 h1:Od9JTbYCk261bKm4M/mw7AklTlFYIa0bIp9BgSm1S8Y=
+golang.org/x/sys v0.20.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8=
+golang.org/x/term v0.1.0/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8=
+golang.org/x/term v0.2.0/go.mod h1:TVmDHMZPmdnySmBfhjOoOdhjzdE1h4u1VwSiw2l1Nuc=
+golang.org/x/term v0.3.0/go.mod h1:q750SLmJuPmVoN1blW3UFBPREJfb1KmY3vwxfr+nFDA=
+golang.org/x/term v0.4.0/go.mod h1:9P2UbLfCdcvo3p/nzKvsmas4TnlujnuoV9hGgYzW1lQ=
+golang.org/x/term v0.5.0/go.mod h1:jMB1sMXY+tzblOD4FWmEbocvup2/aLOaQEp7JmGp78k=
+golang.org/x/term v0.6.0/go.mod h1:m6U89DPEgQRMq3DNkDClhWw02AUbt2daBVO4cn4Hv9U=
+golang.org/x/term v0.7.0/go.mod h1:P32HKFT3hSsZrRxla30E9HqToFYAQPCMs/zFMBUFqPY=
+golang.org/x/term v0.8.0/go.mod h1:xPskH00ivmX89bAKVGSKKtLOWNx2+17Eiy94tnKShWo=
+golang.org/x/term v0.12.0/go.mod h1:owVbMEjm3cBLCHdkQu9b1opXd4ETQWc3BhuQGKgXgvU=
+golang.org/x/term v0.13.0/go.mod h1:LTmsnFJwVN6bCy1rVCoS+qHT1HhALEFxKncY3WNNh4U=
+golang.org/x/term v0.15.0/go.mod h1:BDl952bC7+uMoWR75FIrCDx79TPU9oHkTZ9yRbYOrX0=
+golang.org/x/term v0.16.0/go.mod h1:yn7UURbUtPyrVJPGPq404EukNFxcm/foM+bV/bfcDsY=
+golang.org/x/term v0.17.0/go.mod h1:lLRBjIVuehSbZlaOtGMbcMncT+aqLLLmKrsjNrUguwk=
+golang.org/x/term v0.18.0/go.mod h1:ILwASektA3OnRv7amZ1xhE/KTR+u50pbXfZ03+6Nx58=
golang.org/x/term v0.19.0 h1:+ThwsDv+tYfnJFhF4L8jITxu1tdTWRTZpdsWgEgjL6Q=
golang.org/x/term v0.19.0/go.mod h1:2CuTdWZ7KHSQwUzKva0cbMg6q2DMI3Mmxp+gKJbskEk=
golang.org/x/text v0.0.0-20170915032832-14c0d48ead0c/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
@@ -554,18 +1481,33 @@ golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
golang.org/x/text v0.3.1-0.20180807135948-17ff2d5776d2/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
golang.org/x/text v0.3.2/go.mod h1:bEr9sfX3Q8Zfm5fL9x+3itogRgK3+ptLWKqgva+5dAk=
golang.org/x/text v0.3.3/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
+golang.org/x/text v0.3.4/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
+golang.org/x/text v0.3.5/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
golang.org/x/text v0.3.6/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
golang.org/x/text v0.3.7/go.mod h1:u+2+/6zg+i71rQMx5EYifcz6MCKuco9NR6JIITiCfzQ=
golang.org/x/text v0.3.8/go.mod h1:E6s5w1FMmriuDzIBO73fBruAKo1PCIq6d2Q6DHfQ8WQ=
-golang.org/x/text v0.14.0 h1:ScX5w1eTa3QqT8oi6+ziP7dTV1S2+ALU0bI+0zXKWiQ=
+golang.org/x/text v0.4.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8=
+golang.org/x/text v0.5.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8=
+golang.org/x/text v0.6.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8=
+golang.org/x/text v0.7.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8=
+golang.org/x/text v0.8.0/go.mod h1:e1OnstbJyHTd6l/uOt8jFFHp6TRDWZR/bV3emEE/zU8=
+golang.org/x/text v0.9.0/go.mod h1:e1OnstbJyHTd6l/uOt8jFFHp6TRDWZR/bV3emEE/zU8=
+golang.org/x/text v0.13.0/go.mod h1:TvPlkZtksWOMsz7fbANvkp4WM8x/WCo/om8BMLbz+aE=
golang.org/x/text v0.14.0/go.mod h1:18ZOQIKpY8NJVqYksKHtTdi31H5itFRjB5/qKTNYzSU=
+golang.org/x/text v0.15.0 h1:h1V/4gjBv8v9cjcR6+AR5+/cIYK5N/WAgiv4xlsEtAk=
+golang.org/x/text v0.15.0/go.mod h1:18ZOQIKpY8NJVqYksKHtTdi31H5itFRjB5/qKTNYzSU=
golang.org/x/time v0.0.0-20181108054448-85acf8d2951c/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
golang.org/x/time v0.0.0-20190308202827-9d24e82272b4/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
golang.org/x/time v0.0.0-20191024005414-555d28b269f0/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
+golang.org/x/time v0.0.0-20220922220347-f3bd1da661af/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
+golang.org/x/time v0.1.0/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
+golang.org/x/time v0.3.0/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
golang.org/x/time v0.5.0 h1:o7cqy6amK/52YcAKIPlM3a+Fpj35zvRj2TP+e1xFSfk=
golang.org/x/time v0.5.0/go.mod h1:3BpzKBy/shNhVucY/MWOyx10tF3SFh9QdLuxbVysPQM=
+golang.org/x/tools v0.0.0-20180525024113-a5b4c53f6e8b/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
golang.org/x/tools v0.0.0-20190114222345-bf090417da8b/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
+golang.org/x/tools v0.0.0-20190206041539-40960b6deb8e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
golang.org/x/tools v0.0.0-20190226205152-f727befe758c/go.mod h1:9Yl7xja0Znq3iFh3HoIrodX9oNMXvdceNzlUR8zjMvY=
golang.org/x/tools v0.0.0-20190311212946-11955173bddd/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs=
golang.org/x/tools v0.0.0-20190312151545-0bb0c0a6e846/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs=
@@ -578,6 +1520,7 @@ golang.org/x/tools v0.0.0-20190621195816-6e04913cbbac/go.mod h1:/rFqwRUd4F7ZHNgw
golang.org/x/tools v0.0.0-20190628153133-6cdbf07be9d0/go.mod h1:/rFqwRUd4F7ZHNgwSSTFct+R/Kf4OFW1sUzUTQQTgfc=
golang.org/x/tools v0.0.0-20190816200558-6889da9d5479/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
golang.org/x/tools v0.0.0-20190911174233-4f2ddba30aff/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
+golang.org/x/tools v0.0.0-20190927191325-030b2cf1153e/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
golang.org/x/tools v0.0.0-20191012152004-8de300cfc20a/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
golang.org/x/tools v0.0.0-20191113191852-77e3bb0ad9e7/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
golang.org/x/tools v0.0.0-20191115202509-3a792d9c32b2/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
@@ -598,7 +1541,6 @@ golang.org/x/tools v0.0.0-20200304193943-95d2e580d8eb/go.mod h1:o4KQGtdN14AW+yjs
golang.org/x/tools v0.0.0-20200312045724-11d5b4c81c7d/go.mod h1:o4KQGtdN14AW+yjsvvwRTJJuXz8XRtIHtEnmAXLyFUw=
golang.org/x/tools v0.0.0-20200331025713-a30bf2db82d4/go.mod h1:Sl4aGygMT6LrqrWclx+PTx3U+LnKx/seiNR+3G19Ar8=
golang.org/x/tools v0.0.0-20200501065659-ab2804fb9c9d/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
-golang.org/x/tools v0.0.0-20200505023115-26f46d2f7ef8/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
golang.org/x/tools v0.0.0-20200512131952-2bc93b1c0c88/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
golang.org/x/tools v0.0.0-20200515010526-7d3b6ebf133d/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
golang.org/x/tools v0.0.0-20200618134242-20370b0cb4b2/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
@@ -606,17 +1548,46 @@ golang.org/x/tools v0.0.0-20200619180055-7c47624df98f/go.mod h1:EkVYQZoAsY45+roY
golang.org/x/tools v0.0.0-20200729194436-6467de6f59a7/go.mod h1:njjCfa9FT2d7l9Bc6FUM5FLjQPp3cFF28FI3qnDFljA=
golang.org/x/tools v0.0.0-20200804011535-6c149bb5ef0d/go.mod h1:njjCfa9FT2d7l9Bc6FUM5FLjQPp3cFF28FI3qnDFljA=
golang.org/x/tools v0.0.0-20200825202427-b303f430e36d/go.mod h1:njjCfa9FT2d7l9Bc6FUM5FLjQPp3cFF28FI3qnDFljA=
+golang.org/x/tools v0.0.0-20200904185747-39188db58858/go.mod h1:Cj7w3i3Rnn0Xh82ur9kSqwfTHTeVxaDqrfMjpcNT6bE=
+golang.org/x/tools v0.0.0-20201110124207-079ba7bd75cd/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
+golang.org/x/tools v0.0.0-20201124115921-2c860bdd6e78/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
+golang.org/x/tools v0.0.0-20201201161351-ac6f37ff4c2a/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
+golang.org/x/tools v0.0.0-20201208233053-a543418bbed2/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
golang.org/x/tools v0.0.0-20201224043029-2b0845dc783e/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
+golang.org/x/tools v0.0.0-20210105154028-b0ab187a4818/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
golang.org/x/tools v0.0.0-20210106214847-113979e3529a/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
+golang.org/x/tools v0.0.0-20210108195828-e2f9c7f1fc8e/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
+golang.org/x/tools v0.1.0/go.mod h1:xkSsbof2nBLbhDlRMhhhyNLN/zl3eTqcnHD5viDpcZ0=
+golang.org/x/tools v0.1.1/go.mod h1:o0xws9oXOQQZyjljx8fwUC0k7L1pTE6eaCbjGeHmOkk=
+golang.org/x/tools v0.1.2/go.mod h1:o0xws9oXOQQZyjljx8fwUC0k7L1pTE6eaCbjGeHmOkk=
+golang.org/x/tools v0.1.3/go.mod h1:o0xws9oXOQQZyjljx8fwUC0k7L1pTE6eaCbjGeHmOkk=
+golang.org/x/tools v0.1.4/go.mod h1:o0xws9oXOQQZyjljx8fwUC0k7L1pTE6eaCbjGeHmOkk=
+golang.org/x/tools v0.1.5/go.mod h1:o0xws9oXOQQZyjljx8fwUC0k7L1pTE6eaCbjGeHmOkk=
+golang.org/x/tools v0.1.9/go.mod h1:nABZi5QlRsZVlzPpHl034qft6wpY4eDcsTt5AaioBiU=
golang.org/x/tools v0.1.12/go.mod h1:hNGJHUnrk76NpqgfD5Aqm5Crs+Hm0VOH/i9J2+nxYbc=
-golang.org/x/tools v0.18.0 h1:k8NLag8AGHnn+PHbl7g43CtqZAwG60vZkLqgyZgIHgQ=
-golang.org/x/tools v0.18.0/go.mod h1:GL7B4CwcLLeo59yx/9UWWuNOW1n3VZ4f5axWfML7Lcg=
+golang.org/x/tools v0.3.0/go.mod h1:/rWhSS2+zyEVwoJf8YAX6L2f0ntZ7Kn/mGgAWcipA5k=
+golang.org/x/tools v0.6.0/go.mod h1:Xwgl3UAJ/d3gWutnCtw505GrjyAbvKui8lOU390QaIU=
+golang.org/x/tools v0.7.0/go.mod h1:4pg6aUX35JBAogB10C9AtvVL+qowtN4pT3CGSQex14s=
+golang.org/x/tools v0.20.0 h1:hz/CVckiOxybQvFw6h7b/q80NTr9IUQb4s1IIzW7KNY=
+golang.org/x/tools v0.20.0/go.mod h1:WvitBU7JJf6A4jOdg4S1tviW9bhUxkgeCui/0JHctQg=
golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
golang.org/x/xerrors v0.0.0-20200804184101-5ec99f83aff1/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
+golang.org/x/xerrors v0.0.0-20220411194840-2f41105eb62f/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
+golang.org/x/xerrors v0.0.0-20220517211312-f3a8303e98df/go.mod h1:K8+ghG5WaK9qNqU5K3HdILfMLy1f3aNYFI/wnl100a8=
+golang.org/x/xerrors v0.0.0-20220609144429-65e65417b02f/go.mod h1:K8+ghG5WaK9qNqU5K3HdILfMLy1f3aNYFI/wnl100a8=
+golang.org/x/xerrors v0.0.0-20220907171357-04be3eba64a2/go.mod h1:K8+ghG5WaK9qNqU5K3HdILfMLy1f3aNYFI/wnl100a8=
gomodules.xyz/jsonpatch/v2 v2.4.0 h1:Ci3iUJyx9UeRx7CeFN8ARgGbkESwJK+KB9lLcWxY/Zw=
gomodules.xyz/jsonpatch/v2 v2.4.0/go.mod h1:AH3dM2RI6uoBZxn3LVrfvJ3E0/9dG4cSrbuBJT4moAY=
+gonum.org/v1/gonum v0.0.0-20180816165407-929014505bf4/go.mod h1:Y+Yx5eoAFn32cQvJDxZx5Dpnq+c3wtXuadVZAcxbbBo=
+gonum.org/v1/gonum v0.8.2/go.mod h1:oe/vMfY3deqTw+1EZJhuvEW2iwGF1bW9wwu7XCu0+v0=
+gonum.org/v1/gonum v0.9.3/go.mod h1:TZumC3NeyVQskjXqmyWt4S3bINhy7B4eYwW69EbyX+0=
+gonum.org/v1/gonum v0.11.0/go.mod h1:fSG4YDCxxUZQJ7rKsQrj0gMOg00Il0Z96/qMA4bVQhA=
+gonum.org/v1/netlib v0.0.0-20190313105609-8cb42192e0e0/go.mod h1:wa6Ws7BG/ESfp6dHfk7C6KdzKA7wR7u/rKwOGE66zvw=
+gonum.org/v1/plot v0.0.0-20190515093506-e2840ee46a6b/go.mod h1:Wt8AAjI+ypCyYX3nZBvf6cAIx93T+c/OS2HFAYskSZc=
+gonum.org/v1/plot v0.9.0/go.mod h1:3Pcqqmp6RHvJI72kgb8fThyUnav364FOsdDo2aGW5lY=
+gonum.org/v1/plot v0.10.1/go.mod h1:VZW5OlhkL1mysU9vaqNHnsy86inf6Ot+jB3r+BczCEo=
google.golang.org/api v0.4.0/go.mod h1:8k5glujaEP+g9n7WNsDg8QP6cUVNI86fCNMcbazEtwE=
google.golang.org/api v0.7.0/go.mod h1:WtwebWUNSVBH/HAw79HIFXZNqEvBhG+Ra+ax0hx3E3M=
google.golang.org/api v0.8.0/go.mod h1:o4eAsZoiT+ibD93RtjEohWalFOjRDx6CVaqeizhEnKg=
@@ -633,14 +1604,58 @@ google.golang.org/api v0.24.0/go.mod h1:lIXQywCXRcnZPGlsd8NbLnOjtAoL6em04bJ9+z0M
google.golang.org/api v0.28.0/go.mod h1:lIXQywCXRcnZPGlsd8NbLnOjtAoL6em04bJ9+z0MncE=
google.golang.org/api v0.29.0/go.mod h1:Lcubydp8VUV7KeIHD9z2Bys/sm/vGKnG1UHuDBSrHWM=
google.golang.org/api v0.30.0/go.mod h1:QGmEvQ87FHZNiUVJkT14jQNYJ4ZJjdRF23ZXz5138Fc=
+google.golang.org/api v0.35.0/go.mod h1:/XrVsuzM0rZmrsbjJutiuftIzeuTQcEeaYcSk/mQ1dg=
+google.golang.org/api v0.36.0/go.mod h1:+z5ficQTmoYpPn8LCUNVpK5I7hwkpjbcgqA7I34qYtE=
+google.golang.org/api v0.40.0/go.mod h1:fYKFpnQN0DsDSKRVRcQSDQNtqWPfM9i+zNPxepjRCQ8=
+google.golang.org/api v0.41.0/go.mod h1:RkxM5lITDfTzmyKFPt+wGrCJbVfniCr2ool8kTBzRTU=
+google.golang.org/api v0.43.0/go.mod h1:nQsDGjRXMo4lvh5hP0TKqF244gqhGcr/YSIykhUk/94=
+google.golang.org/api v0.47.0/go.mod h1:Wbvgpq1HddcWVtzsVLyfLp8lDg6AA241LmgIL59tHXo=
+google.golang.org/api v0.48.0/go.mod h1:71Pr1vy+TAZRPkPs/xlCf5SsU8WjuAWv1Pfjbtukyy4=
+google.golang.org/api v0.50.0/go.mod h1:4bNT5pAuq5ji4SRZm+5QIkjny9JAyVD/3gaSihNefaw=
+google.golang.org/api v0.51.0/go.mod h1:t4HdrdoNgyN5cbEfm7Lum0lcLDLiise1F8qDKX00sOU=
+google.golang.org/api v0.54.0/go.mod h1:7C4bFFOvVDGXjfDTAsgGwDgAxRDeQ4X8NvUedIt6z3k=
+google.golang.org/api v0.55.0/go.mod h1:38yMfeP1kfjsl8isn0tliTjIb1rJXcQi4UXlbqivdVE=
+google.golang.org/api v0.56.0/go.mod h1:38yMfeP1kfjsl8isn0tliTjIb1rJXcQi4UXlbqivdVE=
+google.golang.org/api v0.57.0/go.mod h1:dVPlbZyBo2/OjBpmvNdpn2GRm6rPy75jyU7bmhdrMgI=
+google.golang.org/api v0.61.0/go.mod h1:xQRti5UdCmoCEqFxcz93fTl338AVqDgyaDRuOZ3hg9I=
+google.golang.org/api v0.63.0/go.mod h1:gs4ij2ffTRXwuzzgJl/56BdwJaA194ijkfn++9tDuPo=
+google.golang.org/api v0.67.0/go.mod h1:ShHKP8E60yPsKNw/w8w+VYaj9H6buA5UqDp8dhbQZ6g=
+google.golang.org/api v0.70.0/go.mod h1:Bs4ZM2HGifEvXwd50TtW70ovgJffJYw2oRCOFU/SkfA=
+google.golang.org/api v0.71.0/go.mod h1:4PyU6e6JogV1f9eA4voyrTY2batOLdgZ5qZ5HOCc4j8=
+google.golang.org/api v0.74.0/go.mod h1:ZpfMZOVRMywNyvJFeqL9HRWBgAuRfSjJFpe9QtRRyDs=
+google.golang.org/api v0.75.0/go.mod h1:pU9QmyHLnzlpar1Mjt4IbapUCy8J+6HD6GeELN69ljA=
+google.golang.org/api v0.77.0/go.mod h1:pU9QmyHLnzlpar1Mjt4IbapUCy8J+6HD6GeELN69ljA=
+google.golang.org/api v0.78.0/go.mod h1:1Sg78yoMLOhlQTeF+ARBoytAcH1NNyyl390YMy6rKmw=
+google.golang.org/api v0.80.0/go.mod h1:xY3nI94gbvBrE0J6NHXhxOmW97HG7Khjkku6AFB3Hyg=
+google.golang.org/api v0.84.0/go.mod h1:NTsGnUFJMYROtiquksZHBWtHfeMC7iYthki7Eq3pa8o=
+google.golang.org/api v0.85.0/go.mod h1:AqZf8Ep9uZ2pyTvgL+x0D3Zt0eoT9b5E8fmzfu6FO2g=
+google.golang.org/api v0.90.0/go.mod h1:+Sem1dnrKlrXMR/X0bPnMWyluQe4RsNoYfmNLhOIkzw=
+google.golang.org/api v0.93.0/go.mod h1:+Sem1dnrKlrXMR/X0bPnMWyluQe4RsNoYfmNLhOIkzw=
+google.golang.org/api v0.95.0/go.mod h1:eADj+UBuxkh5zlrSntJghuNeg8HwQ1w5lTKkuqaETEI=
+google.golang.org/api v0.96.0/go.mod h1:w7wJQLTM+wvQpNf5JyEcBoxK0RH7EDrh/L4qfsuJ13s=
+google.golang.org/api v0.97.0/go.mod h1:w7wJQLTM+wvQpNf5JyEcBoxK0RH7EDrh/L4qfsuJ13s=
+google.golang.org/api v0.98.0/go.mod h1:w7wJQLTM+wvQpNf5JyEcBoxK0RH7EDrh/L4qfsuJ13s=
+google.golang.org/api v0.99.0/go.mod h1:1YOf74vkVndF7pG6hIHuINsM7eWwpVTAfNMNiL91A08=
+google.golang.org/api v0.100.0/go.mod h1:ZE3Z2+ZOr87Rx7dqFsdRQkRBk36kDtp/h+QpHbB7a70=
+google.golang.org/api v0.102.0/go.mod h1:3VFl6/fzoA+qNuS1N1/VfXY4LjoXN/wzeIp7TweWwGo=
+google.golang.org/api v0.103.0/go.mod h1:hGtW6nK1AC+d9si/UBhw8Xli+QMOf6xyNAyJw4qU9w0=
+google.golang.org/api v0.106.0/go.mod h1:2Ts0XTHNVWxypznxWOYUeI4g3WdP9Pk2Qk58+a/O9MY=
+google.golang.org/api v0.107.0/go.mod h1:2Ts0XTHNVWxypznxWOYUeI4g3WdP9Pk2Qk58+a/O9MY=
+google.golang.org/api v0.108.0/go.mod h1:2Ts0XTHNVWxypznxWOYUeI4g3WdP9Pk2Qk58+a/O9MY=
+google.golang.org/api v0.110.0/go.mod h1:7FC4Vvx1Mooxh8C5HWjzZHcavuS2f6pmJpZx60ca7iI=
+google.golang.org/api v0.111.0/go.mod h1:qtFHvU9mhgTJegR31csQ+rwxyUTHOKFqCKWp1J0fdw0=
+google.golang.org/api v0.114.0/go.mod h1:ifYI2ZsFK6/uGddGfAD5BMxlnkBqCmqHSDUVi45N5Yg=
+google.golang.org/api v0.118.0/go.mod h1:76TtD3vkgmZ66zZzp72bUUklpmQmKlhh6sYtIjYK+5E=
+google.golang.org/api v0.122.0/go.mod h1:gcitW0lvnyWjSp9nKxAbdHKIZ6vF4aajGueeslZOyms=
+google.golang.org/api v0.124.0/go.mod h1:xu2HQurE5gi/3t1aFCvhPD781p0a3p11sdunTJ2BlP4=
+google.golang.org/api v0.126.0/go.mod h1:mBwVAtz+87bEN6CbA1GtZPDOqY2R5ONPqJeIlvyo4Aw=
google.golang.org/appengine v1.1.0/go.mod h1:EbEs0AVv82hx2wNQdGPgUI5lhzA/G0D9YwlJXL52JkM=
google.golang.org/appengine v1.4.0/go.mod h1:xpcJRLb0r/rnEns0DIKYYv+WjYCduHsrkT7/EB5XEv4=
google.golang.org/appengine v1.5.0/go.mod h1:xpcJRLb0r/rnEns0DIKYYv+WjYCduHsrkT7/EB5XEv4=
google.golang.org/appengine v1.6.1/go.mod h1:i06prIuMbXzDqacNJfV5OdTW448YApPu5ww/cMBSeb0=
google.golang.org/appengine v1.6.5/go.mod h1:8WjMMxjGQR8xUklV/ARdw2HLXBOI7O7uCIDZVag1xfc=
google.golang.org/appengine v1.6.6/go.mod h1:8WjMMxjGQR8xUklV/ARdw2HLXBOI7O7uCIDZVag1xfc=
-google.golang.org/appengine v1.6.8 h1:IhEN5q69dyKagZPYMSdIjS2HqprW324FRQZJcGqPAsM=
-google.golang.org/appengine v1.6.8/go.mod h1:1jJ3jBArFh5pcgW8gCtRJnepW8FzD1V44FJffLiz/Ds=
+google.golang.org/appengine v1.6.7/go.mod h1:8WjMMxjGQR8xUklV/ARdw2HLXBOI7O7uCIDZVag1xfc=
google.golang.org/genproto v0.0.0-20180817151627-c66870c02cf8/go.mod h1:JiN7NxoALGmiZfu7CAH4rXhgtRTLTxftemlI0sWmxmc=
google.golang.org/genproto v0.0.0-20190307195333-5fe7a883aa19/go.mod h1:VzzqZJRnGkLBvHegQrXjBqPurQTc5/KpmUdxsrq26oE=
google.golang.org/genproto v0.0.0-20190418145605-e7d98fc518a7/go.mod h1:VzzqZJRnGkLBvHegQrXjBqPurQTc5/KpmUdxsrq26oE=
@@ -664,14 +1679,129 @@ google.golang.org/genproto v0.0.0-20200312145019-da6875a35672/go.mod h1:55QSHmfG
google.golang.org/genproto v0.0.0-20200331122359-1ee6d9798940/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c=
google.golang.org/genproto v0.0.0-20200430143042-b979b6f78d84/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c=
google.golang.org/genproto v0.0.0-20200511104702-f5ebc3bea380/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c=
+google.golang.org/genproto v0.0.0-20200513103714-09dca8ec2884/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c=
google.golang.org/genproto v0.0.0-20200515170657-fc4c6c6a6587/go.mod h1:YsZOwe1myG/8QRHRsmBRE1LrgQY60beZKjly0O1fX9U=
google.golang.org/genproto v0.0.0-20200526211855-cb27e3aa2013/go.mod h1:NbSheEEYHJ7i3ixzK3sjbqSGDJWnxyFXZblF3eUsNvo=
google.golang.org/genproto v0.0.0-20200618031413-b414f8b61790/go.mod h1:jDfRM7FcilCzHH/e9qn6dsT145K34l5v+OpcnNgKAAA=
google.golang.org/genproto v0.0.0-20200729003335-053ba62fc06f/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
google.golang.org/genproto v0.0.0-20200804131852-c06518451d9c/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
google.golang.org/genproto v0.0.0-20200825200019-8632dd797987/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
-google.golang.org/genproto/googleapis/rpc v0.0.0-20240227224415-6ceb2ff114de h1:cZGRis4/ot9uVm639a+rHCUaG0JJHEsdyzSQTMX+suY=
-google.golang.org/genproto/googleapis/rpc v0.0.0-20240227224415-6ceb2ff114de/go.mod h1:H4O17MA/PE9BsGx3w+a+W2VOLLD1Qf7oJneAoU6WktY=
+google.golang.org/genproto v0.0.0-20200904004341-0bd0a958aa1d/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
+google.golang.org/genproto v0.0.0-20201109203340-2640f1f9cdfb/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
+google.golang.org/genproto v0.0.0-20201201144952-b05cb90ed32e/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
+google.golang.org/genproto v0.0.0-20201210142538-e3217bee35cc/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
+google.golang.org/genproto v0.0.0-20201214200347-8c77b98c765d/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
+google.golang.org/genproto v0.0.0-20210108203827-ffc7fda8c3d7/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
+google.golang.org/genproto v0.0.0-20210222152913-aa3ee6e6a81c/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
+google.golang.org/genproto v0.0.0-20210226172003-ab064af71705/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
+google.golang.org/genproto v0.0.0-20210303154014-9728d6b83eeb/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
+google.golang.org/genproto v0.0.0-20210310155132-4ce2db91004e/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
+google.golang.org/genproto v0.0.0-20210319143718-93e7006c17a6/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
+google.golang.org/genproto v0.0.0-20210329143202-679c6ae281ee/go.mod h1:9lPAdzaEmUacj36I+k7YKbEc5CXzPIeORRgDAUOu28A=
+google.golang.org/genproto v0.0.0-20210402141018-6c239bbf2bb1/go.mod h1:9lPAdzaEmUacj36I+k7YKbEc5CXzPIeORRgDAUOu28A=
+google.golang.org/genproto v0.0.0-20210513213006-bf773b8c8384/go.mod h1:P3QM42oQyzQSnHPnZ/vqoCdDmzH28fzWByN9asMeM8A=
+google.golang.org/genproto v0.0.0-20210602131652-f16073e35f0c/go.mod h1:UODoCrxHCcBojKKwX1terBiRUaqAsFqJiF615XL43r0=
+google.golang.org/genproto v0.0.0-20210604141403-392c879c8b08/go.mod h1:UODoCrxHCcBojKKwX1terBiRUaqAsFqJiF615XL43r0=
+google.golang.org/genproto v0.0.0-20210608205507-b6d2f5bf0d7d/go.mod h1:UODoCrxHCcBojKKwX1terBiRUaqAsFqJiF615XL43r0=
+google.golang.org/genproto v0.0.0-20210624195500-8bfb893ecb84/go.mod h1:SzzZ/N+nwJDaO1kznhnlzqS8ocJICar6hYhVyhi++24=
+google.golang.org/genproto v0.0.0-20210713002101-d411969a0d9a/go.mod h1:AxrInvYm1dci+enl5hChSFPOmmUF1+uAa/UsgNRWd7k=
+google.golang.org/genproto v0.0.0-20210716133855-ce7ef5c701ea/go.mod h1:AxrInvYm1dci+enl5hChSFPOmmUF1+uAa/UsgNRWd7k=
+google.golang.org/genproto v0.0.0-20210728212813-7823e685a01f/go.mod h1:ob2IJxKrgPT52GcgX759i1sleT07tiKowYBGbczaW48=
+google.golang.org/genproto v0.0.0-20210805201207-89edb61ffb67/go.mod h1:ob2IJxKrgPT52GcgX759i1sleT07tiKowYBGbczaW48=
+google.golang.org/genproto v0.0.0-20210813162853-db860fec028c/go.mod h1:cFeNkxwySK631ADgubI+/XFU/xp8FD5KIVV4rj8UC5w=
+google.golang.org/genproto v0.0.0-20210821163610-241b8fcbd6c8/go.mod h1:eFjDcFEctNawg4eG61bRv87N7iHBWyVhJu7u1kqDUXY=
+google.golang.org/genproto v0.0.0-20210828152312-66f60bf46e71/go.mod h1:eFjDcFEctNawg4eG61bRv87N7iHBWyVhJu7u1kqDUXY=
+google.golang.org/genproto v0.0.0-20210831024726-fe130286e0e2/go.mod h1:eFjDcFEctNawg4eG61bRv87N7iHBWyVhJu7u1kqDUXY=
+google.golang.org/genproto v0.0.0-20210903162649-d08c68adba83/go.mod h1:eFjDcFEctNawg4eG61bRv87N7iHBWyVhJu7u1kqDUXY=
+google.golang.org/genproto v0.0.0-20210909211513-a8c4777a87af/go.mod h1:eFjDcFEctNawg4eG61bRv87N7iHBWyVhJu7u1kqDUXY=
+google.golang.org/genproto v0.0.0-20210924002016-3dee208752a0/go.mod h1:5CzLGKJ67TSI2B9POpiiyGha0AjJvZIUgRMt1dSmuhc=
+google.golang.org/genproto v0.0.0-20211118181313-81c1377c94b1/go.mod h1:5CzLGKJ67TSI2B9POpiiyGha0AjJvZIUgRMt1dSmuhc=
+google.golang.org/genproto v0.0.0-20211206160659-862468c7d6e0/go.mod h1:5CzLGKJ67TSI2B9POpiiyGha0AjJvZIUgRMt1dSmuhc=
+google.golang.org/genproto v0.0.0-20211208223120-3a66f561d7aa/go.mod h1:5CzLGKJ67TSI2B9POpiiyGha0AjJvZIUgRMt1dSmuhc=
+google.golang.org/genproto v0.0.0-20211221195035-429b39de9b1c/go.mod h1:5CzLGKJ67TSI2B9POpiiyGha0AjJvZIUgRMt1dSmuhc=
+google.golang.org/genproto v0.0.0-20220126215142-9970aeb2e350/go.mod h1:5CzLGKJ67TSI2B9POpiiyGha0AjJvZIUgRMt1dSmuhc=
+google.golang.org/genproto v0.0.0-20220207164111-0872dc986b00/go.mod h1:5CzLGKJ67TSI2B9POpiiyGha0AjJvZIUgRMt1dSmuhc=
+google.golang.org/genproto v0.0.0-20220218161850-94dd64e39d7c/go.mod h1:kGP+zUP2Ddo0ayMi4YuN7C3WZyJvGLZRh8Z5wnAqvEI=
+google.golang.org/genproto v0.0.0-20220222213610-43724f9ea8cf/go.mod h1:kGP+zUP2Ddo0ayMi4YuN7C3WZyJvGLZRh8Z5wnAqvEI=
+google.golang.org/genproto v0.0.0-20220304144024-325a89244dc8/go.mod h1:kGP+zUP2Ddo0ayMi4YuN7C3WZyJvGLZRh8Z5wnAqvEI=
+google.golang.org/genproto v0.0.0-20220310185008-1973136f34c6/go.mod h1:kGP+zUP2Ddo0ayMi4YuN7C3WZyJvGLZRh8Z5wnAqvEI=
+google.golang.org/genproto v0.0.0-20220324131243-acbaeb5b85eb/go.mod h1:hAL49I2IFola2sVEjAn7MEwsja0xp51I0tlGAf9hz4E=
+google.golang.org/genproto v0.0.0-20220329172620-7be39ac1afc7/go.mod h1:8w6bsBMX6yCPbAVTeqQHvzxW0EIFigd5lZyahWgyfDo=
+google.golang.org/genproto v0.0.0-20220407144326-9054f6ed7bac/go.mod h1:8w6bsBMX6yCPbAVTeqQHvzxW0EIFigd5lZyahWgyfDo=
+google.golang.org/genproto v0.0.0-20220413183235-5e96e2839df9/go.mod h1:8w6bsBMX6yCPbAVTeqQHvzxW0EIFigd5lZyahWgyfDo=
+google.golang.org/genproto v0.0.0-20220414192740-2d67ff6cf2b4/go.mod h1:8w6bsBMX6yCPbAVTeqQHvzxW0EIFigd5lZyahWgyfDo=
+google.golang.org/genproto v0.0.0-20220421151946-72621c1f0bd3/go.mod h1:8w6bsBMX6yCPbAVTeqQHvzxW0EIFigd5lZyahWgyfDo=
+google.golang.org/genproto v0.0.0-20220429170224-98d788798c3e/go.mod h1:8w6bsBMX6yCPbAVTeqQHvzxW0EIFigd5lZyahWgyfDo=
+google.golang.org/genproto v0.0.0-20220502173005-c8bf987b8c21/go.mod h1:RAyBrSAP7Fh3Nc84ghnVLDPuV51xc9agzmm4Ph6i0Q4=
+google.golang.org/genproto v0.0.0-20220505152158-f39f71e6c8f3/go.mod h1:RAyBrSAP7Fh3Nc84ghnVLDPuV51xc9agzmm4Ph6i0Q4=
+google.golang.org/genproto v0.0.0-20220518221133-4f43b3371335/go.mod h1:RAyBrSAP7Fh3Nc84ghnVLDPuV51xc9agzmm4Ph6i0Q4=
+google.golang.org/genproto v0.0.0-20220523171625-347a074981d8/go.mod h1:RAyBrSAP7Fh3Nc84ghnVLDPuV51xc9agzmm4Ph6i0Q4=
+google.golang.org/genproto v0.0.0-20220608133413-ed9918b62aac/go.mod h1:KEWEmljWE5zPzLBa/oHl6DaEt9LmfH6WtH1OHIvleBA=
+google.golang.org/genproto v0.0.0-20220616135557-88e70c0c3a90/go.mod h1:KEWEmljWE5zPzLBa/oHl6DaEt9LmfH6WtH1OHIvleBA=
+google.golang.org/genproto v0.0.0-20220617124728-180714bec0ad/go.mod h1:KEWEmljWE5zPzLBa/oHl6DaEt9LmfH6WtH1OHIvleBA=
+google.golang.org/genproto v0.0.0-20220624142145-8cd45d7dbd1f/go.mod h1:KEWEmljWE5zPzLBa/oHl6DaEt9LmfH6WtH1OHIvleBA=
+google.golang.org/genproto v0.0.0-20220628213854-d9e0b6570c03/go.mod h1:KEWEmljWE5zPzLBa/oHl6DaEt9LmfH6WtH1OHIvleBA=
+google.golang.org/genproto v0.0.0-20220722212130-b98a9ff5e252/go.mod h1:GkXuJDJ6aQ7lnJcRF+SJVgFdQhypqgl3LB1C9vabdRE=
+google.golang.org/genproto v0.0.0-20220801145646-83ce21fca29f/go.mod h1:iHe1svFLAZg9VWz891+QbRMwUv9O/1Ww+/mngYeThbc=
+google.golang.org/genproto v0.0.0-20220815135757-37a418bb8959/go.mod h1:dbqgFATTzChvnt+ujMdZwITVAJHFtfyN1qUhDqEiIlk=
+google.golang.org/genproto v0.0.0-20220817144833-d7fd3f11b9b1/go.mod h1:dbqgFATTzChvnt+ujMdZwITVAJHFtfyN1qUhDqEiIlk=
+google.golang.org/genproto v0.0.0-20220822174746-9e6da59bd2fc/go.mod h1:dbqgFATTzChvnt+ujMdZwITVAJHFtfyN1qUhDqEiIlk=
+google.golang.org/genproto v0.0.0-20220829144015-23454907ede3/go.mod h1:dbqgFATTzChvnt+ujMdZwITVAJHFtfyN1qUhDqEiIlk=
+google.golang.org/genproto v0.0.0-20220829175752-36a9c930ecbf/go.mod h1:dbqgFATTzChvnt+ujMdZwITVAJHFtfyN1qUhDqEiIlk=
+google.golang.org/genproto v0.0.0-20220913154956-18f8339a66a5/go.mod h1:0Nb8Qy+Sk5eDzHnzlStwW3itdNaWoZA5XeSG+R3JHSo=
+google.golang.org/genproto v0.0.0-20220914142337-ca0e39ece12f/go.mod h1:0Nb8Qy+Sk5eDzHnzlStwW3itdNaWoZA5XeSG+R3JHSo=
+google.golang.org/genproto v0.0.0-20220915135415-7fd63a7952de/go.mod h1:0Nb8Qy+Sk5eDzHnzlStwW3itdNaWoZA5XeSG+R3JHSo=
+google.golang.org/genproto v0.0.0-20220916172020-2692e8806bfa/go.mod h1:0Nb8Qy+Sk5eDzHnzlStwW3itdNaWoZA5XeSG+R3JHSo=
+google.golang.org/genproto v0.0.0-20220919141832-68c03719ef51/go.mod h1:0Nb8Qy+Sk5eDzHnzlStwW3itdNaWoZA5XeSG+R3JHSo=
+google.golang.org/genproto v0.0.0-20220920201722-2b89144ce006/go.mod h1:ht8XFiar2npT/g4vkk7O0WYS1sHOHbdujxbEp7CJWbw=
+google.golang.org/genproto v0.0.0-20220926165614-551eb538f295/go.mod h1:woMGP53BroOrRY3xTxlbr8Y3eB/nzAvvFM83q7kG2OI=
+google.golang.org/genproto v0.0.0-20220926220553-6981cbe3cfce/go.mod h1:woMGP53BroOrRY3xTxlbr8Y3eB/nzAvvFM83q7kG2OI=
+google.golang.org/genproto v0.0.0-20221010155953-15ba04fc1c0e/go.mod h1:3526vdqwhZAwq4wsRUaVG555sVgsNmIjRtO7t/JH29U=
+google.golang.org/genproto v0.0.0-20221014173430-6e2ab493f96b/go.mod h1:1vXfmgAz9N9Jx0QA82PqRVauvCz1SGSz739p0f183jM=
+google.golang.org/genproto v0.0.0-20221014213838-99cd37c6964a/go.mod h1:1vXfmgAz9N9Jx0QA82PqRVauvCz1SGSz739p0f183jM=
+google.golang.org/genproto v0.0.0-20221024153911-1573dae28c9c/go.mod h1:9qHF0xnpdSfF6knlcsnpzUu5y+rpwgbvsyGAZPBMg4s=
+google.golang.org/genproto v0.0.0-20221024183307-1bc688fe9f3e/go.mod h1:9qHF0xnpdSfF6knlcsnpzUu5y+rpwgbvsyGAZPBMg4s=
+google.golang.org/genproto v0.0.0-20221027153422-115e99e71e1c/go.mod h1:CGI5F/G+E5bKwmfYo09AXuVN4dD894kIKUFmVbP2/Fo=
+google.golang.org/genproto v0.0.0-20221109142239-94d6d90a7d66/go.mod h1:rZS5c/ZVYMaOGBfO68GWtjOw/eLaZM1X6iVtgjZ+EWg=
+google.golang.org/genproto v0.0.0-20221114212237-e4508ebdbee1/go.mod h1:rZS5c/ZVYMaOGBfO68GWtjOw/eLaZM1X6iVtgjZ+EWg=
+google.golang.org/genproto v0.0.0-20221117204609-8f9c96812029/go.mod h1:rZS5c/ZVYMaOGBfO68GWtjOw/eLaZM1X6iVtgjZ+EWg=
+google.golang.org/genproto v0.0.0-20221118155620-16455021b5e6/go.mod h1:rZS5c/ZVYMaOGBfO68GWtjOw/eLaZM1X6iVtgjZ+EWg=
+google.golang.org/genproto v0.0.0-20221201164419-0e50fba7f41c/go.mod h1:rZS5c/ZVYMaOGBfO68GWtjOw/eLaZM1X6iVtgjZ+EWg=
+google.golang.org/genproto v0.0.0-20221201204527-e3fa12d562f3/go.mod h1:rZS5c/ZVYMaOGBfO68GWtjOw/eLaZM1X6iVtgjZ+EWg=
+google.golang.org/genproto v0.0.0-20221202195650-67e5cbc046fd/go.mod h1:cTsE614GARnxrLsqKREzmNYJACSWWpAWdNMwnD7c2BE=
+google.golang.org/genproto v0.0.0-20221227171554-f9683d7f8bef/go.mod h1:RGgjbofJ8xD9Sq1VVhDM1Vok1vRONV+rg+CjzG4SZKM=
+google.golang.org/genproto v0.0.0-20230110181048-76db0878b65f/go.mod h1:RGgjbofJ8xD9Sq1VVhDM1Vok1vRONV+rg+CjzG4SZKM=
+google.golang.org/genproto v0.0.0-20230112194545-e10362b5ecf9/go.mod h1:RGgjbofJ8xD9Sq1VVhDM1Vok1vRONV+rg+CjzG4SZKM=
+google.golang.org/genproto v0.0.0-20230113154510-dbe35b8444a5/go.mod h1:RGgjbofJ8xD9Sq1VVhDM1Vok1vRONV+rg+CjzG4SZKM=
+google.golang.org/genproto v0.0.0-20230123190316-2c411cf9d197/go.mod h1:RGgjbofJ8xD9Sq1VVhDM1Vok1vRONV+rg+CjzG4SZKM=
+google.golang.org/genproto v0.0.0-20230124163310-31e0e69b6fc2/go.mod h1:RGgjbofJ8xD9Sq1VVhDM1Vok1vRONV+rg+CjzG4SZKM=
+google.golang.org/genproto v0.0.0-20230125152338-dcaf20b6aeaa/go.mod h1:RGgjbofJ8xD9Sq1VVhDM1Vok1vRONV+rg+CjzG4SZKM=
+google.golang.org/genproto v0.0.0-20230127162408-596548ed4efa/go.mod h1:RGgjbofJ8xD9Sq1VVhDM1Vok1vRONV+rg+CjzG4SZKM=
+google.golang.org/genproto v0.0.0-20230209215440-0dfe4f8abfcc/go.mod h1:RGgjbofJ8xD9Sq1VVhDM1Vok1vRONV+rg+CjzG4SZKM=
+google.golang.org/genproto v0.0.0-20230216225411-c8e22ba71e44/go.mod h1:8B0gmkoRebU8ukX6HP+4wrVQUY1+6PkQ44BSyIlflHA=
+google.golang.org/genproto v0.0.0-20230222225845-10f96fb3dbec/go.mod h1:3Dl5ZL0q0isWJt+FVcfpQyirqemEuLAK/iFvg1UP1Hw=
+google.golang.org/genproto v0.0.0-20230223222841-637eb2293923/go.mod h1:3Dl5ZL0q0isWJt+FVcfpQyirqemEuLAK/iFvg1UP1Hw=
+google.golang.org/genproto v0.0.0-20230303212802-e74f57abe488/go.mod h1:TvhZT5f700eVlTNwND1xoEZQeWTB2RY/65kplwl/bFA=
+google.golang.org/genproto v0.0.0-20230306155012-7f2fa6fef1f4/go.mod h1:NWraEVixdDnqcqQ30jipen1STv2r/n24Wb7twVTGR4s=
+google.golang.org/genproto v0.0.0-20230320184635-7606e756e683/go.mod h1:NWraEVixdDnqcqQ30jipen1STv2r/n24Wb7twVTGR4s=
+google.golang.org/genproto v0.0.0-20230323212658-478b75c54725/go.mod h1:UUQDJDOlWu4KYeJZffbWgBkS1YFobzKbLVfK69pe0Ak=
+google.golang.org/genproto v0.0.0-20230330154414-c0448cd141ea/go.mod h1:UUQDJDOlWu4KYeJZffbWgBkS1YFobzKbLVfK69pe0Ak=
+google.golang.org/genproto v0.0.0-20230331144136-dcfb400f0633/go.mod h1:UUQDJDOlWu4KYeJZffbWgBkS1YFobzKbLVfK69pe0Ak=
+google.golang.org/genproto v0.0.0-20230403163135-c38d8f061ccd/go.mod h1:UUQDJDOlWu4KYeJZffbWgBkS1YFobzKbLVfK69pe0Ak=
+google.golang.org/genproto v0.0.0-20230410155749-daa745c078e1/go.mod h1:nKE/iIaLqn2bQwXBg8f1g2Ylh6r5MN5CmZvuzZCgsCU=
+google.golang.org/genproto v0.0.0-20230525234025-438c736192d0/go.mod h1:9ExIQyXL5hZrHzQceCwuSYwZZ5QZBazOcprJ5rgs3lY=
+google.golang.org/genproto v0.0.0-20230530153820-e85fd2cbaebc/go.mod h1:xZnkP7mREFX5MORlOPEzLMr+90PPZQ2QWzrVTWfAq64=
+google.golang.org/genproto/googleapis/api v0.0.0-20230525234020-1aefcd67740a/go.mod h1:ts19tUU+Z0ZShN1y3aPyq2+O3d5FUNNgT6FtOzmrNn8=
+google.golang.org/genproto/googleapis/api v0.0.0-20230525234035-dd9d682886f9/go.mod h1:vHYtlOoi6TsQ3Uk2yxR7NI5z8uoV+3pZtR4jmHIkRig=
+google.golang.org/genproto/googleapis/api v0.0.0-20230526203410-71b5a4ffd15e/go.mod h1:vHYtlOoi6TsQ3Uk2yxR7NI5z8uoV+3pZtR4jmHIkRig=
+google.golang.org/genproto/googleapis/api v0.0.0-20230530153820-e85fd2cbaebc/go.mod h1:vHYtlOoi6TsQ3Uk2yxR7NI5z8uoV+3pZtR4jmHIkRig=
+google.golang.org/genproto/googleapis/bytestream v0.0.0-20230530153820-e85fd2cbaebc/go.mod h1:ylj+BE99M198VPbBh6A8d9n3w8fChvyLK3wwBOjXBFA=
+google.golang.org/genproto/googleapis/rpc v0.0.0-20230525234015-3fc162c6f38a/go.mod h1:xURIpW9ES5+/GZhnV6beoEtxQrnkRGIfP5VQG2tCBLc=
+google.golang.org/genproto/googleapis/rpc v0.0.0-20230525234030-28d5490b6b19/go.mod h1:66JfowdXAEgad5O9NnYcsNPLCPZJD++2L9X0PCMODrA=
+google.golang.org/genproto/googleapis/rpc v0.0.0-20230526203410-71b5a4ffd15e/go.mod h1:66JfowdXAEgad5O9NnYcsNPLCPZJD++2L9X0PCMODrA=
+google.golang.org/genproto/googleapis/rpc v0.0.0-20230530153820-e85fd2cbaebc/go.mod h1:66JfowdXAEgad5O9NnYcsNPLCPZJD++2L9X0PCMODrA=
+google.golang.org/genproto/googleapis/rpc v0.0.0-20240429193739-8cf5692501f6 h1:DujSIu+2tC9Ht0aPNA7jgj23Iq8Ewi5sgkQ++wdvonE=
+google.golang.org/genproto/googleapis/rpc v0.0.0-20240429193739-8cf5692501f6/go.mod h1:WtryC6hu0hhx87FDGxWCDptyssuo68sk10vYjF+T9fY=
google.golang.org/grpc v1.19.0/go.mod h1:mqu4LbDTu4XGKhr4mRzUsmM4RtVoemTSY81AxZiDr8c=
google.golang.org/grpc v1.20.1/go.mod h1:10oTOabMzJvdu6/UiuZezV6QK5dSlG84ov/aaiqXj38=
google.golang.org/grpc v1.21.1/go.mod h1:oYelfM1adQP15Ek0mdvEgi9Df8B9CZIaU1084ijfRaM=
@@ -684,8 +1814,38 @@ google.golang.org/grpc v1.28.0/go.mod h1:rpkK4SK4GF4Ach/+MFLZUBavHOvF2JJB5uozKKa
google.golang.org/grpc v1.29.1/go.mod h1:itym6AZVZYACWQqET3MqgPpjcuV5QH3BxFS3IjizoKk=
google.golang.org/grpc v1.30.0/go.mod h1:N36X2cJ7JwdamYAgDz+s+rVMFjt3numwzf/HckM8pak=
google.golang.org/grpc v1.31.0/go.mod h1:N36X2cJ7JwdamYAgDz+s+rVMFjt3numwzf/HckM8pak=
+google.golang.org/grpc v1.31.1/go.mod h1:N36X2cJ7JwdamYAgDz+s+rVMFjt3numwzf/HckM8pak=
+google.golang.org/grpc v1.33.1/go.mod h1:fr5YgcSWrqhRRxogOsw7RzIpsmvOZ6IcH4kBYTpR3n0=
+google.golang.org/grpc v1.33.2/go.mod h1:JMHMWHQWaTccqQQlmk3MJZS+GWXOdAesneDmEnv2fbc=
+google.golang.org/grpc v1.34.0/go.mod h1:WotjhfgOW/POjDeRt8vscBtXq+2VjORFy659qA51WJ8=
+google.golang.org/grpc v1.35.0/go.mod h1:qjiiYl8FncCW8feJPdyg3v6XW24KsRHe+dy9BAGRRjU=
+google.golang.org/grpc v1.36.0/go.mod h1:qjiiYl8FncCW8feJPdyg3v6XW24KsRHe+dy9BAGRRjU=
+google.golang.org/grpc v1.36.1/go.mod h1:qjiiYl8FncCW8feJPdyg3v6XW24KsRHe+dy9BAGRRjU=
+google.golang.org/grpc v1.37.0/go.mod h1:NREThFqKR1f3iQ6oBuvc5LadQuXVGo9rkm5ZGrQdJfM=
+google.golang.org/grpc v1.37.1/go.mod h1:NREThFqKR1f3iQ6oBuvc5LadQuXVGo9rkm5ZGrQdJfM=
+google.golang.org/grpc v1.38.0/go.mod h1:NREThFqKR1f3iQ6oBuvc5LadQuXVGo9rkm5ZGrQdJfM=
+google.golang.org/grpc v1.39.0/go.mod h1:PImNr+rS9TWYb2O4/emRugxiyHZ5JyHW5F+RPnDzfrE=
+google.golang.org/grpc v1.39.1/go.mod h1:PImNr+rS9TWYb2O4/emRugxiyHZ5JyHW5F+RPnDzfrE=
+google.golang.org/grpc v1.40.0/go.mod h1:ogyxbiOoUXAkP+4+xa6PZSE9DZgIHtSpzjDTB9KAK34=
+google.golang.org/grpc v1.40.1/go.mod h1:ogyxbiOoUXAkP+4+xa6PZSE9DZgIHtSpzjDTB9KAK34=
+google.golang.org/grpc v1.42.0/go.mod h1:k+4IHHFw41K8+bbowsex27ge2rCb65oeWqe4jJ590SU=
+google.golang.org/grpc v1.44.0/go.mod h1:k+4IHHFw41K8+bbowsex27ge2rCb65oeWqe4jJ590SU=
+google.golang.org/grpc v1.45.0/go.mod h1:lN7owxKUQEqMfSyQikvvk5tf/6zMPsrK+ONuO11+0rQ=
+google.golang.org/grpc v1.46.0/go.mod h1:vN9eftEi1UMyUsIF80+uQXhHjbXYbm0uXoFCACuMGWk=
+google.golang.org/grpc v1.46.2/go.mod h1:vN9eftEi1UMyUsIF80+uQXhHjbXYbm0uXoFCACuMGWk=
+google.golang.org/grpc v1.47.0/go.mod h1:vN9eftEi1UMyUsIF80+uQXhHjbXYbm0uXoFCACuMGWk=
+google.golang.org/grpc v1.48.0/go.mod h1:vN9eftEi1UMyUsIF80+uQXhHjbXYbm0uXoFCACuMGWk=
+google.golang.org/grpc v1.49.0/go.mod h1:ZgQEeidpAuNRZ8iRrlBKXZQP1ghovWIVhdJRyCDK+GI=
+google.golang.org/grpc v1.50.0/go.mod h1:ZgQEeidpAuNRZ8iRrlBKXZQP1ghovWIVhdJRyCDK+GI=
+google.golang.org/grpc v1.50.1/go.mod h1:ZgQEeidpAuNRZ8iRrlBKXZQP1ghovWIVhdJRyCDK+GI=
+google.golang.org/grpc v1.51.0/go.mod h1:wgNDFcnuBGmxLKI/qn4T+m5BtEBYXJPvibbUPsAIPww=
+google.golang.org/grpc v1.52.0/go.mod h1:pu6fVzoFb+NBYNAvQL08ic+lvB2IojljRYuun5vorUY=
+google.golang.org/grpc v1.53.0/go.mod h1:OnIrk0ipVdj4N5d9IUoFUx72/VlD7+jUsHwZgwSMQpw=
+google.golang.org/grpc v1.54.0/go.mod h1:PUSEXI6iWghWaB6lXM4knEgpJNu2qUcKfDtNci3EC2g=
+google.golang.org/grpc v1.55.0/go.mod h1:iYEXKGkEBhg1PjZQvoYEVPTDkHo1/bjTnfwTeGONTY8=
google.golang.org/grpc v1.63.2 h1:MUeiw1B2maTVZthpU5xvASfTh3LDbxHd6IJ6QQVU+xM=
google.golang.org/grpc v1.63.2/go.mod h1:WAX/8DgncnokcFUldAxq7GeB5DXHDbMF+lLvDomNkRA=
+google.golang.org/grpc/cmd/protoc-gen-go-grpc v1.1.0/go.mod h1:6Kw0yEErY5E/yWrBtf03jp27GLLJujG4z/JK95pnjjw=
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab h1:tg8hvIl5RmFBuXlcJMuL0h4Psh1gx5Q5xEMwzBZIzWA=
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab/go.mod h1:liVNnGuZDITxuksuZ+BBvdy7FcJfeNk+efF9qgqNUmc=
google.golang.org/protobuf v0.0.0-20200109180630-ec00e32a8dfd/go.mod h1:DFci5gLYBciE7Vtevhsrf46CRTquxDuWsQurQQe4oz8=
@@ -700,8 +1860,16 @@ google.golang.org/protobuf v1.24.0/go.mod h1:r/3tXBNzIEhYS9I1OUVjXDlt8tc493IdKGj
google.golang.org/protobuf v1.25.0/go.mod h1:9JNX74DMeImyA3h4bdi1ymwjUzf21/xIlbajtzgsN7c=
google.golang.org/protobuf v1.26.0-rc.1/go.mod h1:jlhhOSvTdKEhbULTjvd4ARK9grFBp09yW+WbY/TyQbw=
google.golang.org/protobuf v1.26.0/go.mod h1:9q0QmTI4eRPtz6boOQmLYwt+qCgq0jsYwAQnmE0givc=
-google.golang.org/protobuf v1.33.0 h1:uNO2rsAINq/JlFpSdYEKIZ0uKD/R9cpdv0T+yoGwGmI=
+google.golang.org/protobuf v1.27.1/go.mod h1:9q0QmTI4eRPtz6boOQmLYwt+qCgq0jsYwAQnmE0givc=
+google.golang.org/protobuf v1.28.0/go.mod h1:HV8QOd/L58Z+nl8r43ehVNZIU/HEI6OcFqwMG9pJV4I=
+google.golang.org/protobuf v1.28.1/go.mod h1:HV8QOd/L58Z+nl8r43ehVNZIU/HEI6OcFqwMG9pJV4I=
+google.golang.org/protobuf v1.29.1/go.mod h1:HV8QOd/L58Z+nl8r43ehVNZIU/HEI6OcFqwMG9pJV4I=
+google.golang.org/protobuf v1.30.0/go.mod h1:HV8QOd/L58Z+nl8r43ehVNZIU/HEI6OcFqwMG9pJV4I=
+google.golang.org/protobuf v1.31.0/go.mod h1:HV8QOd/L58Z+nl8r43ehVNZIU/HEI6OcFqwMG9pJV4I=
+google.golang.org/protobuf v1.32.0/go.mod h1:c6P6GXX6sHbq/GpV6MGZEdwhWPcYBgnhAHhKbcUYpos=
google.golang.org/protobuf v1.33.0/go.mod h1:c6P6GXX6sHbq/GpV6MGZEdwhWPcYBgnhAHhKbcUYpos=
+google.golang.org/protobuf v1.34.0 h1:Qo/qEd2RZPCf2nKuorzksSknv0d3ERwp1vFG38gSmH4=
+google.golang.org/protobuf v1.34.0/go.mod h1:c6P6GXX6sHbq/GpV6MGZEdwhWPcYBgnhAHhKbcUYpos=
gopkg.in/alecthomas/kingpin.v2 v2.2.6/go.mod h1:FMv+mEhP44yOT+4EoQTLFTRgOQ1FBLkstjWtayDeSgw=
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
@@ -724,6 +1892,7 @@ gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7 h1:uRGJdciOHaEIrze2W8Q3AKkep
gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7/go.mod h1:dt/ZhP58zS4L8KSrWDmTeBkI65Dw0HsyUHuEVlX15mw=
gopkg.in/yaml.v2 v2.2.1/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
gopkg.in/yaml.v2 v2.2.2/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+gopkg.in/yaml.v2 v2.2.3/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
gopkg.in/yaml.v2 v2.2.4/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
gopkg.in/yaml.v2 v2.2.5/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
gopkg.in/yaml.v2 v2.2.8/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
@@ -740,36 +1909,69 @@ honnef.co/go/tools v0.0.0-20190523083050-ea95bdfd59fc/go.mod h1:rf3lG4BRIbNafJWh
honnef.co/go/tools v0.0.1-2019.2.3/go.mod h1:a3bituU0lyd329TUQxRnasdCoJDkEUEAqEt0JzvZhAg=
honnef.co/go/tools v0.0.1-2020.1.3/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k=
honnef.co/go/tools v0.0.1-2020.1.4/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k=
+honnef.co/go/tools v0.1.3/go.mod h1:NgwopIslSNH47DimFoV78dnkksY2EFtX0ajyb3K/las=
k8s.io/api v0.30.0 h1:siWhRq7cNjy2iHssOB9SCGNCl2spiF1dO3dABqZ8niA=
k8s.io/api v0.30.0/go.mod h1:OPlaYhoHs8EQ1ql0R/TsUgaRPhpKNxIMrKQfWUp8QSE=
-k8s.io/apiextensions-apiserver v0.29.3 h1:9HF+EtZaVpFjStakF4yVufnXGPRppWFEQ87qnO91YeI=
-k8s.io/apiextensions-apiserver v0.29.3/go.mod h1:po0XiY5scnpJfFizNGo6puNU6Fq6D70UJY2Cb2KwAVc=
+k8s.io/apiextensions-apiserver v0.30.0 h1:jcZFKMqnICJfRxTgnC4E+Hpcq8UEhT8B2lhBcQ+6uAs=
+k8s.io/apiextensions-apiserver v0.30.0/go.mod h1:N9ogQFGcrbWqAY9p2mUAL5mGxsLqwgtUce127VtRX5Y=
k8s.io/apimachinery v0.30.0 h1:qxVPsyDM5XS96NIh9Oj6LavoVFYff/Pon9cZeDIkHHA=
k8s.io/apimachinery v0.30.0/go.mod h1:iexa2somDaxdnj7bha06bhb43Zpa6eWH8N8dbqVjTUc=
-k8s.io/apiserver v0.29.3 h1:xR7ELlJ/BZSr2n4CnD3lfA4gzFivh0wwfNfz9L0WZcE=
-k8s.io/apiserver v0.29.3/go.mod h1:hrvXlwfRulbMbBgmWRQlFru2b/JySDpmzvQwwk4GUOs=
-k8s.io/cli-runtime v0.29.3 h1:r68rephmmytoywkw2MyJ+CxjpasJDQY7AGc3XY2iv1k=
-k8s.io/cli-runtime v0.29.3/go.mod h1:aqVUsk86/RhaGJwDhHXH0jcdqBrgdF3bZWk4Z9D4mkM=
+k8s.io/apiserver v0.30.0 h1:QCec+U72tMQ+9tR6A0sMBB5Vh6ImCEkoKkTDRABWq6M=
+k8s.io/apiserver v0.30.0/go.mod h1:smOIBq8t0MbKZi7O7SyIpjPsiKJ8qa+llcFCluKyqiY=
+k8s.io/cli-runtime v0.30.0 h1:0vn6/XhOvn1RJ2KJOC6IRR2CGqrpT6QQF4+8pYpWQ48=
+k8s.io/cli-runtime v0.30.0/go.mod h1:vATpDMATVTMA79sZ0YUCzlMelf6rUjoBzlp+RnoM+cg=
k8s.io/client-go v0.30.0 h1:sB1AGGlhY/o7KCyCEQ0bPWzYDL0pwOZO4vAtTSh/gJQ=
k8s.io/client-go v0.30.0/go.mod h1:g7li5O5256qe6TYdAMyX/otJqMhIiGgTapdLchhmOaY=
-k8s.io/code-generator v0.29.3 h1:m7E25/t9R9NvejspO2zBdyu+/Gl0Z5m7dCRc680KS14=
-k8s.io/code-generator v0.29.3/go.mod h1:x47ofBhN4gxYFcxeKA1PYXeaPreAGaDN85Y/lNUsPoM=
+k8s.io/code-generator v0.30.0 h1:3VUVqHvWFSVSm9kqL/G6kD4ZwNdHF6J/jPyo3Jgjy3k=
+k8s.io/code-generator v0.30.0/go.mod h1:mBMZhfRR4IunJUh2+7LVmdcWwpouCH5+LNPkZ3t/v7Q=
k8s.io/component-base v0.30.0 h1:cj6bp38g0ainlfYtaOQuRELh5KSYjhKxM+io7AUIk4o=
k8s.io/component-base v0.30.0/go.mod h1:V9x/0ePFNaKeKYA3bOvIbrNoluTSG+fSJKjLdjOoeXQ=
-k8s.io/gengo v0.0.0-20240226174109-00c4be8627da h1:uH7pylUCo++9PSvrUA34sbk4Y6PHw/bgEFa80pejI+I=
-k8s.io/gengo v0.0.0-20240226174109-00c4be8627da/go.mod h1:FiNAH4ZV3gBg2Kwh89tzAEV2be7d5xI0vBa/VySYy3E=
-k8s.io/gengo/v2 v2.0.0-20240228010128-51d4e06bde70 h1:NGrVE502P0s0/1hudf8zjgwki1X/TByhmAoILTarmzo=
-k8s.io/gengo/v2 v2.0.0-20240228010128-51d4e06bde70/go.mod h1:VH3AT8AaQOqiGjMF9p0/IM1Dj+82ZwjfxUP1IxaHE+8=
-k8s.io/klog/v2 v2.2.0/go.mod h1:Od+F08eJP+W3HUb4pSrPpgp9DGU4GzlpG/TmITuYh/Y=
+k8s.io/gengo/v2 v2.0.0-20240404160639-a0386bf69313 h1:bKcdZJOPICVmIIuaM9+MXmapE94dn5AYv5ODs1jA43o=
+k8s.io/gengo/v2 v2.0.0-20240404160639-a0386bf69313/go.mod h1:VH3AT8AaQOqiGjMF9p0/IM1Dj+82ZwjfxUP1IxaHE+8=
k8s.io/klog/v2 v2.120.1 h1:QXU6cPEOIslTGvZaXvFWiP9VKyeet3sawzTOvdXb4Vw=
k8s.io/klog/v2 v2.120.1/go.mod h1:3Jpz1GvMt720eyJH1ckRHK1EDfpxISzJ7I9OYgaDtPE=
-k8s.io/kube-openapi v0.0.0-20240228011516-70dd3763d340 h1:BZqlfIlq5YbRMFko6/PM7FjZpUb45WallggurYhKGag=
-k8s.io/kube-openapi v0.0.0-20240228011516-70dd3763d340/go.mod h1:yD4MZYeKMBwQKVht279WycxKyM84kkAx2DPrTXaeb98=
-k8s.io/utils v0.0.0-20240102154912-e7106e64919e h1:eQ/4ljkx21sObifjzXwlPKpdGLrCfRziVtos3ofG/sQ=
-k8s.io/utils v0.0.0-20240102154912-e7106e64919e/go.mod h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0=
+k8s.io/kube-openapi v0.0.0-20240430033511-f0e62f92d13f h1:0LQagt0gDpKqvIkAMPaRGcXawNMouPECM1+F9BVxEaM=
+k8s.io/kube-openapi v0.0.0-20240430033511-f0e62f92d13f/go.mod h1:S9tOR0FxgyusSNR+MboCuiDpVWkAifZvaYI1Q2ubgro=
+k8s.io/utils v0.0.0-20240502163921-fe8a2dddb1d0 h1:jgGTlFYnhF1PM1Ax/lAlxUPE+KfCIXHaathvJg1C3ak=
+k8s.io/utils v0.0.0-20240502163921-fe8a2dddb1d0/go.mod h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0=
+lukechampine.com/uint128 v1.1.1/go.mod h1:c4eWIwlEGaxC/+H1VguhU4PHXNWDCDMUlWdIWl2j1gk=
+lukechampine.com/uint128 v1.2.0/go.mod h1:c4eWIwlEGaxC/+H1VguhU4PHXNWDCDMUlWdIWl2j1gk=
+modernc.org/cc/v3 v3.36.0/go.mod h1:NFUHyPn4ekoC/JHeZFfZurN6ixxawE1BnVonP/oahEI=
+modernc.org/cc/v3 v3.36.2/go.mod h1:NFUHyPn4ekoC/JHeZFfZurN6ixxawE1BnVonP/oahEI=
+modernc.org/cc/v3 v3.36.3/go.mod h1:NFUHyPn4ekoC/JHeZFfZurN6ixxawE1BnVonP/oahEI=
+modernc.org/ccgo/v3 v3.0.0-20220428102840-41399a37e894/go.mod h1:eI31LL8EwEBKPpNpA4bU1/i+sKOwOrQy8D87zWUcRZc=
+modernc.org/ccgo/v3 v3.0.0-20220430103911-bc99d88307be/go.mod h1:bwdAnOoaIt8Ax9YdWGjxWsdkPcZyRPHqrOvJxaKAKGw=
+modernc.org/ccgo/v3 v3.16.4/go.mod h1:tGtX0gE9Jn7hdZFeU88slbTh1UtCYKusWOoCJuvkWsQ=
+modernc.org/ccgo/v3 v3.16.6/go.mod h1:tGtX0gE9Jn7hdZFeU88slbTh1UtCYKusWOoCJuvkWsQ=
+modernc.org/ccgo/v3 v3.16.8/go.mod h1:zNjwkizS+fIFDrDjIAgBSCLkWbJuHF+ar3QRn+Z9aws=
+modernc.org/ccgo/v3 v3.16.9/go.mod h1:zNMzC9A9xeNUepy6KuZBbugn3c0Mc9TeiJO4lgvkJDo=
+modernc.org/ccorpus v1.11.6/go.mod h1:2gEUTrWqdpH2pXsmTM1ZkjeSrUWDpjMu2T6m29L/ErQ=
+modernc.org/httpfs v1.0.6/go.mod h1:7dosgurJGp0sPaRanU53W4xZYKh14wfzX420oZADeHM=
+modernc.org/libc v0.0.0-20220428101251-2d5f3daf273b/go.mod h1:p7Mg4+koNjc8jkqwcoFBJx7tXkpj00G77X7A72jXPXA=
+modernc.org/libc v1.16.0/go.mod h1:N4LD6DBE9cf+Dzf9buBlzVJndKr/iJHG97vGLHYnb5A=
+modernc.org/libc v1.16.1/go.mod h1:JjJE0eu4yeK7tab2n4S1w8tlWd9MxXLRzheaRnAKymU=
+modernc.org/libc v1.16.17/go.mod h1:hYIV5VZczAmGZAnG15Vdngn5HSF5cSkbvfz2B7GRuVU=
+modernc.org/libc v1.16.19/go.mod h1:p7Mg4+koNjc8jkqwcoFBJx7tXkpj00G77X7A72jXPXA=
+modernc.org/libc v1.17.0/go.mod h1:XsgLldpP4aWlPlsjqKRdHPqCxCjISdHfM/yeWC5GyW0=
+modernc.org/libc v1.17.1/go.mod h1:FZ23b+8LjxZs7XtFMbSzL/EhPxNbfZbErxEHc7cbD9s=
+modernc.org/mathutil v1.2.2/go.mod h1:mZW8CKdRPY1v87qxC/wUdX5O1qDzXMP5TH3wjfpga6E=
+modernc.org/mathutil v1.4.1/go.mod h1:mZW8CKdRPY1v87qxC/wUdX5O1qDzXMP5TH3wjfpga6E=
+modernc.org/mathutil v1.5.0/go.mod h1:mZW8CKdRPY1v87qxC/wUdX5O1qDzXMP5TH3wjfpga6E=
+modernc.org/memory v1.1.1/go.mod h1:/0wo5ibyrQiaoUoH7f9D8dnglAmILJ5/cxZlRECf+Nw=
+modernc.org/memory v1.2.0/go.mod h1:/0wo5ibyrQiaoUoH7f9D8dnglAmILJ5/cxZlRECf+Nw=
+modernc.org/memory v1.2.1/go.mod h1:PkUhL0Mugw21sHPeskwZW4D6VscE/GQJOnIpCnW6pSU=
+modernc.org/opt v0.1.1/go.mod h1:WdSiB5evDcignE70guQKxYUl14mgWtbClRi5wmkkTX0=
+modernc.org/opt v0.1.3/go.mod h1:WdSiB5evDcignE70guQKxYUl14mgWtbClRi5wmkkTX0=
+modernc.org/sqlite v1.18.1/go.mod h1:6ho+Gow7oX5V+OiOQ6Tr4xeqbx13UZ6t+Fw9IRUG4d4=
+modernc.org/strutil v1.1.1/go.mod h1:DE+MQQ/hjKBZS2zNInV5hhcipt5rLPWkmpbGeW5mmdw=
+modernc.org/strutil v1.1.3/go.mod h1:MEHNA7PdEnEwLvspRMtWTNnp2nnyvMfkimT1NKNAGbw=
+modernc.org/tcl v1.13.1/go.mod h1:XOLfOwzhkljL4itZkK6T72ckMgvj0BDsnKNdZVUOecw=
+modernc.org/token v1.0.0/go.mod h1:UGzOrNV1mAFSEB63lOFHIpNRUVMvYTc6yu1SMY/XTDM=
+modernc.org/z v1.5.1/go.mod h1:eWFB510QWW5Th9YGZT81s+LwvaAs3Q2yr4sP0rmLkv8=
pault.ag/go/sniff v0.0.0-20200207005214-cf7e4d167732 h1:SAElp8THCfmBdM+4lmWX5gebiSSkEr7PAYDVF91qpfg=
pault.ag/go/sniff v0.0.0-20200207005214-cf7e4d167732/go.mod h1:lpvCfhqEHNJSSpG5R5A2EgsVzG8RTt4RfPoQuRAcDmg=
rsc.io/binaryregexp v0.2.0/go.mod h1:qTv7/COck+e2FymRvadv62gMdZztPaShugOCi3I+8D8=
+rsc.io/pdf v0.1.1/go.mod h1:n8OzWcQ6Sp37PL01nO98y4iUCRdTGarVfzxY20ICaU4=
rsc.io/quote/v3 v3.1.0/go.mod h1:yEA65RcK8LyAZtP9Kv3t0HmxON59tX3rD+tICJqUlj0=
rsc.io/sampler v1.3.0/go.mod h1:T1hPZKmBbMNahiBKFy5HrXp6adAjACjK9JXDnKaTXpA=
sigs.k8s.io/controller-runtime v0.17.3 h1:65QmN7r3FWgTxDMz9fvGnO1kbf2nu+acg9p2R9oYYYk=
@@ -784,6 +1986,5 @@ sigs.k8s.io/mdtoc v1.1.0 h1:q3YtqYzmC2e0hgLXRIOm7/QLuPux1CX3ZHCwlbABxZo=
sigs.k8s.io/mdtoc v1.1.0/go.mod h1:QZLVEdHH2iNIR4uHAZyvFRtjloHgVItk8lo/mzCtq3w=
sigs.k8s.io/structured-merge-diff/v4 v4.4.1 h1:150L+0vs/8DA78h1u02ooW1/fFq/Lwr+sGiqlzvrtq4=
sigs.k8s.io/structured-merge-diff/v4 v4.4.1/go.mod h1:N8hJocpFajUSSeSJ9bOZ77VzejKZaXsTtZo4/u7Io08=
-sigs.k8s.io/yaml v1.2.0/go.mod h1:yfXDCHCao9+ENCvLSE62v9VSji2MKu5jeNfTrofGhJc=
sigs.k8s.io/yaml v1.4.0 h1:Mk1wCc2gy/F0THH0TAp1QYyJNzRm2KCLy3o5ASXVI5E=
sigs.k8s.io/yaml v1.4.0/go.mod h1:Ejl7/uTz7PSA4eKMyQCUTnhZYNmLIl+5c2lQPGR2BPY=
diff --git a/go.work b/go.work
index 463239b63..c963e3c0e 100644
--- a/go.work
+++ b/go.work
@@ -1,4 +1,4 @@
-go 1.21
+go 1.22.0
use (
.
diff --git a/go.work.sum b/go.work.sum
index 4ce702139..51c6a3e66 100644
--- a/go.work.sum
+++ b/go.work.sum
@@ -1,739 +1,936 @@
-cloud.google.com/go v0.44.3/go.mod h1:60680Gw3Yr4ikxnPRS/oxxkBccT6SA1yMk63TGekxKY=
-cloud.google.com/go v0.72.0/go.mod h1:M+5Vjvlc2wnp6tjzE102Dw08nGShTscUx2nZMufOKPI=
-cloud.google.com/go v0.74.0/go.mod h1:VV1xSbzvo+9QJOxLDaJfTjx5e+MePCpCWwvftOeQmWk=
-cloud.google.com/go v0.75.0/go.mod h1:VGuuCn7PG0dwsd5XPVm2Mm3wlh3EL55/79EKB6hlPTY=
-cloud.google.com/go v0.97.0/go.mod h1:GF7l59pYBVlXQIBLx3a761cZ41F9bBH3JUlihCt2Udc=
-cloud.google.com/go v0.110.2/go.mod h1:k04UEeEtb6ZBRTv3dZz4CeJC3jKGxyhl0sAiVVquxiw=
+cloud.google.com/go v0.110.2 h1:sdFPBr6xG9/wkBbfhmUz/JmZC7X6LavQgcrVINrKiVA=
cloud.google.com/go v0.110.4/go.mod h1:+EYjdK8e5RME/VY/qLCAtuyALQ9q67dvuum8i+H5xsI=
cloud.google.com/go v0.110.8/go.mod h1:Iz8AkXJf1qmxC3Oxoep8R1T36w8B92yU29PcBhHO5fk=
cloud.google.com/go v0.110.10/go.mod h1:v1OoFqYxiBkUrruItNM3eT4lLByNjxmJSV/xDKJNnic=
cloud.google.com/go v0.112.0/go.mod h1:3jEEVwZ/MHU4djK5t5RHuKOA/GbLddgTdVubX1qnPD4=
+cloud.google.com/go/accessapproval v1.6.0 h1:x0cEHro/JFPd7eS4BlEWNTMecIj2HdXjOVB5BtvwER0=
cloud.google.com/go/accessapproval v1.7.1/go.mod h1:JYczztsHRMK7NTXb6Xw+dwbs/WnOJxbo/2mTI+Kgg68=
cloud.google.com/go/accessapproval v1.7.4/go.mod h1:/aTEh45LzplQgFYdQdwPMR9YdX0UlhBmvB84uAmQKUc=
cloud.google.com/go/accessapproval v1.7.5/go.mod h1:g88i1ok5dvQ9XJsxpUInWWvUBrIZhyPDPbk4T01OoJ0=
+cloud.google.com/go/accesscontextmanager v1.7.0 h1:MG60JgnEoawHJrbWw0jGdv6HLNSf6gQvYRiXpuzqgEA=
cloud.google.com/go/accesscontextmanager v1.8.1/go.mod h1:JFJHfvuaTC+++1iL1coPiG1eu5D24db2wXCDWDjIrxo=
cloud.google.com/go/accesscontextmanager v1.8.4/go.mod h1:ParU+WbMpD34s5JFEnGAnPBYAgUHozaTmDJU7aCU9+M=
cloud.google.com/go/accesscontextmanager v1.8.5/go.mod h1:TInEhcZ7V9jptGNqN3EzZ5XMhT6ijWxTGjzyETwmL0Q=
+cloud.google.com/go/aiplatform v1.37.0 h1:zTw+suCVchgZyO+k847wjzdVjWmrAuehxdvcZvJwfGg=
cloud.google.com/go/aiplatform v1.45.0/go.mod h1:Iu2Q7sC7QGhXUeOhAj/oCK9a+ULz1O4AotZiqjQ8MYA=
cloud.google.com/go/aiplatform v1.50.0/go.mod h1:IRc2b8XAMTa9ZmfJV1BCCQbieWWvDnP1A8znyz5N7y4=
cloud.google.com/go/aiplatform v1.52.0/go.mod h1:pwZMGvqe0JRkI1GWSZCtnAfrR4K1bv65IHILGA//VEU=
cloud.google.com/go/aiplatform v1.58.0/go.mod h1:pwZMGvqe0JRkI1GWSZCtnAfrR4K1bv65IHILGA//VEU=
cloud.google.com/go/aiplatform v1.60.0/go.mod h1:eTlGuHOahHprZw3Hio5VKmtThIOak5/qy6pzdsqcQnM=
+cloud.google.com/go/analytics v0.19.0 h1:LqAo3tAh2FU9+w/r7vc3hBjU23Kv7GhO/PDIW7kIYgM=
cloud.google.com/go/analytics v0.21.2/go.mod h1:U8dcUtmDmjrmUTnnnRnI4m6zKn/yaA5N9RlEkYFHpQo=
cloud.google.com/go/analytics v0.21.3/go.mod h1:U8dcUtmDmjrmUTnnnRnI4m6zKn/yaA5N9RlEkYFHpQo=
cloud.google.com/go/analytics v0.21.6/go.mod h1:eiROFQKosh4hMaNhF85Oc9WO97Cpa7RggD40e/RBy8w=
cloud.google.com/go/analytics v0.22.0/go.mod h1:eiROFQKosh4hMaNhF85Oc9WO97Cpa7RggD40e/RBy8w=
cloud.google.com/go/analytics v0.23.0/go.mod h1:YPd7Bvik3WS95KBok2gPXDqQPHy08TsCQG6CdUCb+u0=
+cloud.google.com/go/apigateway v1.5.0 h1:ZI9mVO7x3E9RK/BURm2p1aw9YTBSCQe3klmyP1WxWEg=
cloud.google.com/go/apigateway v1.6.1/go.mod h1:ufAS3wpbRjqfZrzpvLC2oh0MFlpRJm2E/ts25yyqmXA=
cloud.google.com/go/apigateway v1.6.4/go.mod h1:0EpJlVGH5HwAN4VF4Iec8TAzGN1aQgbxAWGJsnPCGGY=
cloud.google.com/go/apigateway v1.6.5/go.mod h1:6wCwvYRckRQogyDDltpANi3zsCDl6kWi0b4Je+w2UiI=
+cloud.google.com/go/apigeeconnect v1.5.0 h1:sWOmgDyAsi1AZ48XRHcATC0tsi9SkPT7DA/+VCfkaeA=
cloud.google.com/go/apigeeconnect v1.6.1/go.mod h1:C4awq7x0JpLtrlQCr8AzVIzAaYgngRqWf9S5Uhg+wWs=
cloud.google.com/go/apigeeconnect v1.6.4/go.mod h1:CapQCWZ8TCjnU0d7PobxhpOdVz/OVJ2Hr/Zcuu1xFx0=
cloud.google.com/go/apigeeconnect v1.6.5/go.mod h1:MEKm3AiT7s11PqTfKE3KZluZA9O91FNysvd3E6SJ6Ow=
+cloud.google.com/go/apigeeregistry v0.6.0 h1:E43RdhhCxdlV+I161gUY2rI4eOaMzHTA5kNkvRsFXvc=
cloud.google.com/go/apigeeregistry v0.7.1/go.mod h1:1XgyjZye4Mqtw7T9TsY4NW10U7BojBvG4RMD+vRDrIw=
cloud.google.com/go/apigeeregistry v0.8.2/go.mod h1:h4v11TDGdeXJDJvImtgK2AFVvMIgGWjSb0HRnBSjcX8=
cloud.google.com/go/apigeeregistry v0.8.3/go.mod h1:aInOWnqF4yMQx8kTjDqHNXjZGh/mxeNlAf52YqtASUs=
+cloud.google.com/go/apikeys v0.6.0 h1:B9CdHFZTFjVti89tmyXXrO+7vSNo2jvZuHG8zD5trdQ=
+cloud.google.com/go/appengine v1.7.1 h1:aBGDKmRIaRRoWJ2tAoN0oVSHoWLhtO9aj/NvUyP4aYs=
cloud.google.com/go/appengine v1.8.1/go.mod h1:6NJXGLVhZCN9aQ/AEDvmfzKEfoYBlfB80/BHiKVputY=
cloud.google.com/go/appengine v1.8.4/go.mod h1:TZ24v+wXBujtkK77CXCpjZbnuTvsFNT41MUaZ28D6vg=
cloud.google.com/go/appengine v1.8.5/go.mod h1:uHBgNoGLTS5di7BvU25NFDuKa82v0qQLjyMJLuPQrVo=
+cloud.google.com/go/area120 v0.7.1 h1:ugckkFh4XkHJMPhTIx0CyvdoBxmOpMe8rNs4Ok8GAag=
cloud.google.com/go/area120 v0.8.1/go.mod h1:BVfZpGpB7KFVNxPiQBuHkX6Ed0rS51xIgmGyjrAfzsg=
cloud.google.com/go/area120 v0.8.4/go.mod h1:jfawXjxf29wyBXr48+W+GyX/f8fflxp642D/bb9v68M=
cloud.google.com/go/area120 v0.8.5/go.mod h1:BcoFCbDLZjsfe4EkCnEq1LKvHSK0Ew/zk5UFu6GMyA0=
+cloud.google.com/go/artifactregistry v1.13.0 h1:o1Q80vqEB6Qp8WLEH3b8FBLNUCrGQ4k5RFj0sn/sgO8=
cloud.google.com/go/artifactregistry v1.14.1/go.mod h1:nxVdG19jTaSTu7yA7+VbWL346r3rIdkZ142BSQqhn5E=
cloud.google.com/go/artifactregistry v1.14.6/go.mod h1:np9LSFotNWHcjnOgh8UVK0RFPCTUGbO0ve3384xyHfE=
cloud.google.com/go/artifactregistry v1.14.7/go.mod h1:0AUKhzWQzfmeTvT4SjfI4zjot72EMfrkvL9g9aRjnnM=
+cloud.google.com/go/asset v1.13.0 h1:YAsssO08BqZ6mncbb6FPlj9h6ACS7bJQUOlzciSfbNk=
cloud.google.com/go/asset v1.14.1/go.mod h1:4bEJ3dnHCqWCDbWJ/6Vn7GVI9LerSi7Rfdi03hd+WTQ=
cloud.google.com/go/asset v1.15.3/go.mod h1:yYLfUD4wL4X589A9tYrv4rFrba0QlDeag0CMcM5ggXU=
cloud.google.com/go/asset v1.17.0/go.mod h1:yYLfUD4wL4X589A9tYrv4rFrba0QlDeag0CMcM5ggXU=
cloud.google.com/go/asset v1.17.2/go.mod h1:SVbzde67ehddSoKf5uebOD1sYw8Ab/jD/9EIeWg99q4=
+cloud.google.com/go/assuredworkloads v1.10.0 h1:VLGnVFta+N4WM+ASHbhc14ZOItOabDLH1MSoDv+Xuag=
cloud.google.com/go/assuredworkloads v1.11.1/go.mod h1:+F04I52Pgn5nmPG36CWFtxmav6+7Q+c5QyJoL18Lry0=
cloud.google.com/go/assuredworkloads v1.11.4/go.mod h1:4pwwGNwy1RP0m+y12ef3Q/8PaiWrIDQ6nD2E8kvWI9U=
cloud.google.com/go/assuredworkloads v1.11.5/go.mod h1:FKJ3g3ZvkL2D7qtqIGnDufFkHxwIpNM9vtmhvt+6wqk=
+cloud.google.com/go/automl v1.12.0 h1:50VugllC+U4IGl3tDNcZaWvApHBTrn/TvyHDJ0wM+Uw=
cloud.google.com/go/automl v1.13.1/go.mod h1:1aowgAHWYZU27MybSCFiukPO7xnyawv7pt3zK4bheQE=
cloud.google.com/go/automl v1.13.4/go.mod h1:ULqwX/OLZ4hBVfKQaMtxMSTlPx0GqGbWN8uA/1EqCP8=
cloud.google.com/go/automl v1.13.5/go.mod h1:MDw3vLem3yh+SvmSgeYUmUKqyls6NzSumDm9OJ3xJ1Y=
-cloud.google.com/go/baremetalsolution v0.5.0/go.mod h1:dXGxEkmR9BMwxhzBhV0AioD0ULBmuLZI8CdwalUxuss=
+cloud.google.com/go/baremetalsolution v0.5.0 h1:2AipdYXL0VxMboelTTw8c1UJ7gYu35LZYUbuRv9Q28s=
cloud.google.com/go/baremetalsolution v1.2.0/go.mod h1:68wi9AwPYkEWIUT4SvSGS9UJwKzNpshjHsH4lzk8iOw=
cloud.google.com/go/baremetalsolution v1.2.3/go.mod h1:/UAQ5xG3faDdy180rCUv47e0jvpp3BFxT+Cl0PFjw5g=
cloud.google.com/go/baremetalsolution v1.2.4/go.mod h1:BHCmxgpevw9IEryE99HbYEfxXkAEA3hkMJbYYsHtIuY=
-cloud.google.com/go/batch v0.7.0/go.mod h1:vLZN95s6teRUqRQ4s3RLDsH8PvboqBK+rn1oevL159g=
+cloud.google.com/go/batch v0.7.0 h1:YbMt0E6BtqeD5FvSv1d56jbVsWEzlGm55lYte+M6Mzs=
cloud.google.com/go/batch v1.4.1/go.mod h1:KdBmDD61K0ovcxoRHGrN6GmOBWeAOyCgKD0Mugx4Fkk=
cloud.google.com/go/batch v1.6.3/go.mod h1:J64gD4vsNSA2O5TtDB5AAux3nJ9iV8U3ilg3JDBYejU=
cloud.google.com/go/batch v1.7.0/go.mod h1:J64gD4vsNSA2O5TtDB5AAux3nJ9iV8U3ilg3JDBYejU=
cloud.google.com/go/batch v1.8.0/go.mod h1:k8V7f6VE2Suc0zUM4WtoibNrA6D3dqBpB+++e3vSGYc=
+cloud.google.com/go/beyondcorp v0.5.0 h1:UkY2BTZkEUAVrgqnSdOJ4p3y9ZRBPEe1LkjgC8Bj/Pc=
cloud.google.com/go/beyondcorp v0.6.1/go.mod h1:YhxDWw946SCbmcWo3fAhw3V4XZMSpQ/VYfcKGAEU8/4=
cloud.google.com/go/beyondcorp v1.0.0/go.mod h1:YhxDWw946SCbmcWo3fAhw3V4XZMSpQ/VYfcKGAEU8/4=
cloud.google.com/go/beyondcorp v1.0.3/go.mod h1:HcBvnEd7eYr+HGDd5ZbuVmBYX019C6CEXBonXbCVwJo=
cloud.google.com/go/beyondcorp v1.0.4/go.mod h1:Gx8/Rk2MxrvWfn4WIhHIG1NV7IBfg14pTKv1+EArVcc=
+cloud.google.com/go/bigquery v1.50.0 h1:RscMV6LbnAmhAzD893Lv9nXXy2WCaJmbxYPWDLbGqNQ=
cloud.google.com/go/bigquery v1.52.0/go.mod h1:3b/iXjRQGU4nKa87cXeg6/gogLjO8C6PmuM8i5Bi/u4=
cloud.google.com/go/bigquery v1.55.0/go.mod h1:9Y5I3PN9kQWuid6183JFhOGOW3GcirA5LpsKCUn+2ec=
cloud.google.com/go/bigquery v1.57.1/go.mod h1:iYzC0tGVWt1jqSzBHqCr3lrRn0u13E8e+AqowBsDgug=
cloud.google.com/go/bigquery v1.58.0/go.mod h1:0eh4mWNY0KrBTjUzLjoYImapGORq9gEPT7MWjCy9lik=
cloud.google.com/go/bigquery v1.59.1/go.mod h1:VP1UJYgevyTwsV7desjzNzDND5p6hZB+Z8gZJN1GQUc=
+cloud.google.com/go/billing v1.13.0 h1:JYj28UYF5w6VBAh0gQYlgHJ/OD1oA+JgW29YZQU+UHM=
cloud.google.com/go/billing v1.16.0/go.mod h1:y8vx09JSSJG02k5QxbycNRrN7FGZB6F3CAcgum7jvGA=
cloud.google.com/go/billing v1.17.0/go.mod h1:Z9+vZXEq+HwH7bhJkyI4OQcR6TSbeMrjlpEjO2vzY64=
cloud.google.com/go/billing v1.17.4/go.mod h1:5DOYQStCxquGprqfuid/7haD7th74kyMBHkjO/OvDtk=
cloud.google.com/go/billing v1.18.0/go.mod h1:5DOYQStCxquGprqfuid/7haD7th74kyMBHkjO/OvDtk=
cloud.google.com/go/billing v1.18.2/go.mod h1:PPIwVsOOQ7xzbADCwNe8nvK776QpfrOAUkvKjCUcpSE=
+cloud.google.com/go/binaryauthorization v1.5.0 h1:d3pMDBCCNivxt5a4eaV7FwL7cSH0H7RrEnFrTb1QKWs=
cloud.google.com/go/binaryauthorization v1.6.1/go.mod h1:TKt4pa8xhowwffiBmbrbcxijJRZED4zrqnwZ1lKH51U=
cloud.google.com/go/binaryauthorization v1.7.0/go.mod h1:Zn+S6QqTMn6odcMU1zDZCJxPjU2tZPV1oDl45lWY154=
cloud.google.com/go/binaryauthorization v1.7.3/go.mod h1:VQ/nUGRKhrStlGr+8GMS8f6/vznYLkdK5vaKfdCIpvU=
cloud.google.com/go/binaryauthorization v1.8.0/go.mod h1:VQ/nUGRKhrStlGr+8GMS8f6/vznYLkdK5vaKfdCIpvU=
cloud.google.com/go/binaryauthorization v1.8.1/go.mod h1:1HVRyBerREA/nhI7yLang4Zn7vfNVA3okoAR9qYQJAQ=
+cloud.google.com/go/certificatemanager v1.6.0 h1:5C5UWeSt8Jkgp7OWn2rCkLmYurar/vIWIoSQ2+LaTOc=
cloud.google.com/go/certificatemanager v1.7.1/go.mod h1:iW8J3nG6SaRYImIa+wXQ0g8IgoofDFRp5UMzaNk1UqI=
cloud.google.com/go/certificatemanager v1.7.4/go.mod h1:FHAylPe/6IIKuaRmHbjbdLhGhVQ+CWHSD5Jq0k4+cCE=
cloud.google.com/go/certificatemanager v1.7.5/go.mod h1:uX+v7kWqy0Y3NG/ZhNvffh0kuqkKZIXdvlZRO7z0VtM=
+cloud.google.com/go/channel v1.12.0 h1:GpcQY5UJKeOekYgsX3QXbzzAc/kRGtBq43fTmyKe6Uw=
cloud.google.com/go/channel v1.16.0/go.mod h1:eN/q1PFSl5gyu0dYdmxNXscY/4Fi7ABmeHCJNf/oHmc=
cloud.google.com/go/channel v1.17.0/go.mod h1:RpbhJsGi/lXWAUM1eF4IbQGbsfVlg2o8Iiy2/YLfVT0=
cloud.google.com/go/channel v1.17.3/go.mod h1:QcEBuZLGGrUMm7kNj9IbU1ZfmJq2apotsV83hbxX7eE=
cloud.google.com/go/channel v1.17.4/go.mod h1:QcEBuZLGGrUMm7kNj9IbU1ZfmJq2apotsV83hbxX7eE=
cloud.google.com/go/channel v1.17.5/go.mod h1:FlpaOSINDAXgEext0KMaBq/vwpLMkkPAw9b2mApQeHc=
+cloud.google.com/go/cloudbuild v1.9.0 h1:GHQCjV4WlPPVU/j3Rlpc8vNIDwThhd1U9qSY/NPZdko=
cloud.google.com/go/cloudbuild v1.10.1/go.mod h1:lyJg7v97SUIPq4RC2sGsz/9tNczhyv2AjML/ci4ulzU=
cloud.google.com/go/cloudbuild v1.14.0/go.mod h1:lyJg7v97SUIPq4RC2sGsz/9tNczhyv2AjML/ci4ulzU=
cloud.google.com/go/cloudbuild v1.14.3/go.mod h1:eIXYWmRt3UtggLnFGx4JvXcMj4kShhVzGndL1LwleEM=
cloud.google.com/go/cloudbuild v1.15.0/go.mod h1:eIXYWmRt3UtggLnFGx4JvXcMj4kShhVzGndL1LwleEM=
cloud.google.com/go/cloudbuild v1.15.1/go.mod h1:gIofXZSu+XD2Uy+qkOrGKEx45zd7s28u/k8f99qKals=
+cloud.google.com/go/clouddms v1.5.0 h1:E7v4TpDGUyEm1C/4KIrpVSOCTm0P6vWdHT0I4mostRA=
cloud.google.com/go/clouddms v1.6.1/go.mod h1:Ygo1vL52Ov4TBZQquhz5fiw2CQ58gvu+PlS6PVXCpZI=
cloud.google.com/go/clouddms v1.7.0/go.mod h1:MW1dC6SOtI/tPNCciTsXtsGNEM0i0OccykPvv3hiYeM=
cloud.google.com/go/clouddms v1.7.3/go.mod h1:fkN2HQQNUYInAU3NQ3vRLkV2iWs8lIdmBKOx4nrL6Hc=
cloud.google.com/go/clouddms v1.7.4/go.mod h1:RdrVqoFG9RWI5AvZ81SxJ/xvxPdtcRhFotwdE79DieY=
+cloud.google.com/go/cloudtasks v1.10.0 h1:uK5k6abf4yligFgYFnG0ni8msai/dSv6mDmiBulU0hU=
cloud.google.com/go/cloudtasks v1.11.1/go.mod h1:a9udmnou9KO2iulGscKR0qBYjreuX8oHwpmFsKspEvM=
cloud.google.com/go/cloudtasks v1.12.1/go.mod h1:a9udmnou9KO2iulGscKR0qBYjreuX8oHwpmFsKspEvM=
cloud.google.com/go/cloudtasks v1.12.4/go.mod h1:BEPu0Gtt2dU6FxZHNqqNdGqIG86qyWKBPGnsb7udGY0=
cloud.google.com/go/cloudtasks v1.12.6/go.mod h1:b7c7fe4+TJsFZfDyzO51F7cjq7HLUlRi/KZQLQjDsaY=
-cloud.google.com/go/compute v1.19.3/go.mod h1:qxvISKp/gYnXkSAD1ppcSOveRAmzxicEv/JlizULFrI=
-cloud.google.com/go/compute v1.20.1/go.mod h1:4tCnrn48xsqlwSAiLf1HXMQk8CONslYbdiEZc9FEIbM=
cloud.google.com/go/compute v1.21.0/go.mod h1:4tCnrn48xsqlwSAiLf1HXMQk8CONslYbdiEZc9FEIbM=
cloud.google.com/go/compute v1.23.0/go.mod h1:4tCnrn48xsqlwSAiLf1HXMQk8CONslYbdiEZc9FEIbM=
cloud.google.com/go/compute v1.23.1/go.mod h1:CqB3xpmPKKt3OJpW2ndFIXnA9A4xAy/F3Xp1ixncW78=
cloud.google.com/go/compute v1.23.3/go.mod h1:VCgBUoMnIVIR0CscqQiPJLAG25E3ZRZMzcFZeQ+h8CI=
+cloud.google.com/go/compute v1.24.0 h1:phWcR2eWzRJaL/kOiJwfFsPs4BaKq1j6vnpZrc1YlVg=
cloud.google.com/go/compute v1.24.0/go.mod h1:kw1/T+h/+tK2LJK0wiPPx1intgdAM3j/g3hFDlscY40=
-cloud.google.com/go/compute/metadata v0.2.3/go.mod h1:VAV5nSsACxMJvgaAuX6Pk2AawlZn8kiOGuCv6gTkwuA=
+cloud.google.com/go/compute/metadata v0.3.0 h1:Tz+eQXMEqDIKRsmY3cHTL6FVaynIjX2QxYC4trgAKZc=
+cloud.google.com/go/compute/metadata v0.3.0/go.mod h1:zFmK7XCadkQkj6TtorcaGlCW1hT1fIilQDwofLpJ20k=
+cloud.google.com/go/contactcenterinsights v1.6.0 h1:jXIpfcH/VYSE1SYcPzO0n1VVb+sAamiLOgCw45JbOQk=
cloud.google.com/go/contactcenterinsights v1.9.1/go.mod h1:bsg/R7zGLYMVxFFzfh9ooLTruLRCG9fnzhH9KznHhbM=
cloud.google.com/go/contactcenterinsights v1.10.0/go.mod h1:bsg/R7zGLYMVxFFzfh9ooLTruLRCG9fnzhH9KznHhbM=
cloud.google.com/go/contactcenterinsights v1.11.3/go.mod h1:HHX5wrz5LHVAwfI2smIotQG9x8Qd6gYilaHcLLLmNis=
cloud.google.com/go/contactcenterinsights v1.12.1/go.mod h1:HHX5wrz5LHVAwfI2smIotQG9x8Qd6gYilaHcLLLmNis=
cloud.google.com/go/contactcenterinsights v1.13.0/go.mod h1:ieq5d5EtHsu8vhe2y3amtZ+BE+AQwX5qAy7cpo0POsI=
+cloud.google.com/go/container v1.15.0 h1:NKlY/wCDapfVZlbVVaeuu2UZZED5Dy1z4Zx1KhEzm8c=
cloud.google.com/go/container v1.22.1/go.mod h1:lTNExE2R7f+DLbAN+rJiKTisauFCaoDq6NURZ83eVH4=
cloud.google.com/go/container v1.26.0/go.mod h1:YJCmRet6+6jnYYRS000T6k0D0xUXQgBSaJ7VwI8FBj4=
cloud.google.com/go/container v1.27.1/go.mod h1:b1A1gJeTBXVLQ6GGw9/9M4FG94BEGsqJ5+t4d/3N7O4=
cloud.google.com/go/container v1.29.0/go.mod h1:b1A1gJeTBXVLQ6GGw9/9M4FG94BEGsqJ5+t4d/3N7O4=
cloud.google.com/go/container v1.31.0/go.mod h1:7yABn5s3Iv3lmw7oMmyGbeV6tQj86njcTijkkGuvdZA=
+cloud.google.com/go/containeranalysis v0.9.0 h1:EQ4FFxNaEAg8PqQCO7bVQfWz9NVwZCUKaM1b3ycfx3U=
cloud.google.com/go/containeranalysis v0.10.1/go.mod h1:Ya2jiILITMY68ZLPaogjmOMNkwsDrWBSTyBubGXO7j0=
cloud.google.com/go/containeranalysis v0.11.0/go.mod h1:4n2e99ZwpGxpNcz+YsFT1dfOHPQFGcAC8FN2M2/ne/U=
cloud.google.com/go/containeranalysis v0.11.3/go.mod h1:kMeST7yWFQMGjiG9K7Eov+fPNQcGhb8mXj/UcTiWw9U=
cloud.google.com/go/containeranalysis v0.11.4/go.mod h1:cVZT7rXYBS9NG1rhQbWL9pWbXCKHWJPYraE8/FTSYPE=
+cloud.google.com/go/datacatalog v1.13.0 h1:4H5IJiyUE0X6ShQBqgFFZvGGcrwGVndTwUSLP4c52gw=
cloud.google.com/go/datacatalog v1.14.1/go.mod h1:d2CevwTG4yedZilwe+v3E3ZBDRMobQfSG/a6cCCN5R4=
cloud.google.com/go/datacatalog v1.17.1/go.mod h1:nCSYFHgtxh2MiEktWIz71s/X+7ds/UT9kp0PC7waCzE=
cloud.google.com/go/datacatalog v1.18.3/go.mod h1:5FR6ZIF8RZrtml0VUao22FxhdjkoG+a0866rEnObryM=
cloud.google.com/go/datacatalog v1.19.2/go.mod h1:2YbODwmhpLM4lOFe3PuEhHK9EyTzQJ5AXgIy7EDKTEE=
cloud.google.com/go/datacatalog v1.19.3/go.mod h1:ra8V3UAsciBpJKQ+z9Whkxzxv7jmQg1hfODr3N3YPJ4=
+cloud.google.com/go/dataflow v0.8.0 h1:eYyD9o/8Nm6EttsKZaEGD84xC17bNgSKCu0ZxwqUbpg=
cloud.google.com/go/dataflow v0.9.1/go.mod h1:Wp7s32QjYuQDWqJPFFlnBKhkAtiFpMTdg00qGbnIHVw=
cloud.google.com/go/dataflow v0.9.4/go.mod h1:4G8vAkHYCSzU8b/kmsoR2lWyHJD85oMJPHMtan40K8w=
cloud.google.com/go/dataflow v0.9.5/go.mod h1:udl6oi8pfUHnL0z6UN9Lf9chGqzDMVqcYTcZ1aPnCZQ=
+cloud.google.com/go/dataform v0.7.0 h1:Dyk+fufup1FR6cbHjFpMuP4SfPiF3LI3JtoIIALoq48=
cloud.google.com/go/dataform v0.8.1/go.mod h1:3BhPSiw8xmppbgzeBbmDvmSWlwouuJkXsXsb8UBih9M=
cloud.google.com/go/dataform v0.9.1/go.mod h1:pWTg+zGQ7i16pyn0bS1ruqIE91SdL2FDMvEYu/8oQxs=
cloud.google.com/go/dataform v0.9.2/go.mod h1:S8cQUwPNWXo7m/g3DhWHsLBoufRNn9EgFrMgne2j7cI=
+cloud.google.com/go/datafusion v1.6.0 h1:sZjRnS3TWkGsu1LjYPFD/fHeMLZNXDK6PDHi2s2s/bk=
cloud.google.com/go/datafusion v1.7.1/go.mod h1:KpoTBbFmoToDExJUso/fcCiguGDk7MEzOWXUsJo0wsI=
cloud.google.com/go/datafusion v1.7.4/go.mod h1:BBs78WTOLYkT4GVZIXQCZT3GFpkpDN4aBY4NDX/jVlM=
cloud.google.com/go/datafusion v1.7.5/go.mod h1:bYH53Oa5UiqahfbNK9YuYKteeD4RbQSNMx7JF7peGHc=
+cloud.google.com/go/datalabeling v0.7.0 h1:ch4qA2yvddGRUrlfwrNJCr79qLqhS9QBwofPHfFlDIk=
cloud.google.com/go/datalabeling v0.8.1/go.mod h1:XS62LBSVPbYR54GfYQsPXZjTW8UxCK2fkDciSrpRFdY=
cloud.google.com/go/datalabeling v0.8.4/go.mod h1:Z1z3E6LHtffBGrNUkKwbwbDxTiXEApLzIgmymj8A3S8=
cloud.google.com/go/datalabeling v0.8.5/go.mod h1:IABB2lxQnkdUbMnQaOl2prCOfms20mcPxDBm36lps+s=
+cloud.google.com/go/dataplex v1.6.0 h1:RvoZ5T7gySwm1CHzAw7yY1QwwqaGswunmqEssPxU/AM=
cloud.google.com/go/dataplex v1.8.1/go.mod h1:7TyrDT6BCdI8/38Uvp0/ZxBslOslP2X2MPDucliyvSE=
cloud.google.com/go/dataplex v1.9.1/go.mod h1:7TyrDT6BCdI8/38Uvp0/ZxBslOslP2X2MPDucliyvSE=
cloud.google.com/go/dataplex v1.11.1/go.mod h1:mHJYQQ2VEJHsyoC0OdNyy988DvEbPhqFs5OOLffLX0c=
cloud.google.com/go/dataplex v1.14.0/go.mod h1:mHJYQQ2VEJHsyoC0OdNyy988DvEbPhqFs5OOLffLX0c=
cloud.google.com/go/dataplex v1.14.2/go.mod h1:0oGOSFlEKef1cQeAHXy4GZPB/Ife0fz/PxBf+ZymA2U=
-cloud.google.com/go/dataproc v1.12.0/go.mod h1:zrF3aX0uV3ikkMz6z4uBbIKyhRITnxvr4i3IjKsKrw4=
+cloud.google.com/go/dataproc v1.12.0 h1:W47qHL3W4BPkAIbk4SWmIERwsWBaNnWm0P2sdx3YgGU=
cloud.google.com/go/dataproc/v2 v2.2.0/go.mod h1:lZR7AQtwZPvmINx5J87DSOOpTfof9LVZju6/Qo4lmcY=
cloud.google.com/go/dataproc/v2 v2.2.3/go.mod h1:G5R6GBc9r36SXv/RtZIVfB8SipI+xVn0bX5SxUzVYbY=
cloud.google.com/go/dataproc/v2 v2.3.0/go.mod h1:G5R6GBc9r36SXv/RtZIVfB8SipI+xVn0bX5SxUzVYbY=
cloud.google.com/go/dataproc/v2 v2.4.0/go.mod h1:3B1Ht2aRB8VZIteGxQS/iNSJGzt9+CA0WGnDVMEm7Z4=
+cloud.google.com/go/dataqna v0.7.0 h1:yFzi/YU4YAdjyo7pXkBE2FeHbgz5OQQBVDdbErEHmVQ=
cloud.google.com/go/dataqna v0.8.1/go.mod h1:zxZM0Bl6liMePWsHA8RMGAfmTG34vJMapbHAxQ5+WA8=
cloud.google.com/go/dataqna v0.8.4/go.mod h1:mySRKjKg5Lz784P6sCov3p1QD+RZQONRMRjzGNcFd0c=
cloud.google.com/go/dataqna v0.8.5/go.mod h1:vgihg1mz6n7pb5q2YJF7KlXve6tCglInd6XO0JGOlWM=
+cloud.google.com/go/datastore v1.11.0 h1:iF6I/HaLs3Ado8uRKMvZRvF/ZLkWaWE9i8AiHzbC774=
cloud.google.com/go/datastore v1.12.1/go.mod h1:KjdB88W897MRITkvWWJrg2OUtrR5XVj1EoLgSp6/N70=
cloud.google.com/go/datastore v1.14.0/go.mod h1:GAeStMBIt9bPS7jMJA85kgkpsMkvseWWXiaHya9Jes8=
cloud.google.com/go/datastore v1.15.0/go.mod h1:GAeStMBIt9bPS7jMJA85kgkpsMkvseWWXiaHya9Jes8=
+cloud.google.com/go/datastream v1.7.0 h1:BBCBTnWMDwwEzQQmipUXxATa7Cm7CA/gKjKcR2w35T0=
cloud.google.com/go/datastream v1.9.1/go.mod h1:hqnmr8kdUBmrnk65k5wNRoHSCYksvpdZIcZIEl8h43Q=
cloud.google.com/go/datastream v1.10.0/go.mod h1:hqnmr8kdUBmrnk65k5wNRoHSCYksvpdZIcZIEl8h43Q=
cloud.google.com/go/datastream v1.10.3/go.mod h1:YR0USzgjhqA/Id0Ycu1VvZe8hEWwrkjuXrGbzeDOSEA=
cloud.google.com/go/datastream v1.10.4/go.mod h1:7kRxPdxZxhPg3MFeCSulmAJnil8NJGGvSNdn4p1sRZo=
+cloud.google.com/go/deploy v1.8.0 h1:otshdKEbmsi1ELYeCKNYppwV0UH5xD05drSdBm7ouTk=
cloud.google.com/go/deploy v1.11.0/go.mod h1:tKuSUV5pXbn67KiubiUNUejqLs4f5cxxiCNCeyl0F2g=
cloud.google.com/go/deploy v1.13.0/go.mod h1:tKuSUV5pXbn67KiubiUNUejqLs4f5cxxiCNCeyl0F2g=
cloud.google.com/go/deploy v1.14.2/go.mod h1:e5XOUI5D+YGldyLNZ21wbp9S8otJbBE4i88PtO9x/2g=
cloud.google.com/go/deploy v1.17.0/go.mod h1:XBr42U5jIr64t92gcpOXxNrqL2PStQCXHuKK5GRUuYo=
cloud.google.com/go/deploy v1.17.1/go.mod h1:SXQyfsXrk0fBmgBHRzBjQbZhMfKZ3hMQBw5ym7MN/50=
+cloud.google.com/go/dialogflow v1.32.0 h1:uVlKKzp6G/VtSW0E7IH1Y5o0H48/UOCmqksG2riYCwQ=
cloud.google.com/go/dialogflow v1.38.0/go.mod h1:L7jnH+JL2mtmdChzAIcXQHXMvQkE3U4hTaNltEuxXn4=
cloud.google.com/go/dialogflow v1.43.0/go.mod h1:pDUJdi4elL0MFmt1REMvFkdsUTYSHq+rTCS8wg0S3+M=
cloud.google.com/go/dialogflow v1.44.3/go.mod h1:mHly4vU7cPXVweuB5R0zsYKPMzy240aQdAu06SqBbAQ=
cloud.google.com/go/dialogflow v1.48.1/go.mod h1:C1sjs2/g9cEwjCltkKeYp3FFpz8BOzNondEaAlCpt+A=
cloud.google.com/go/dialogflow v1.49.0/go.mod h1:dhVrXKETtdPlpPhE7+2/k4Z8FRNUp6kMV3EW3oz/fe0=
+cloud.google.com/go/dlp v1.9.0 h1:1JoJqezlgu6NWCroBxr4rOZnwNFILXr4cB9dMaSKO4A=
cloud.google.com/go/dlp v1.10.1/go.mod h1:IM8BWz1iJd8njcNcG0+Kyd9OPnqnRNkDV8j42VT5KOI=
cloud.google.com/go/dlp v1.11.1/go.mod h1:/PA2EnioBeXTL/0hInwgj0rfsQb3lpE3R8XUJxqUNKI=
cloud.google.com/go/dlp v1.11.2/go.mod h1:9Czi+8Y/FegpWzgSfkRlyz+jwW6Te9Rv26P3UfU/h/w=
+cloud.google.com/go/documentai v1.18.0 h1:KM3Xh0QQyyEdC8Gs2vhZfU+rt6OCPF0dwVwxKgLmWfI=
cloud.google.com/go/documentai v1.20.0/go.mod h1:yJkInoMcK0qNAEdRnqY/D5asy73tnPe88I1YTZT+a8E=
cloud.google.com/go/documentai v1.22.1/go.mod h1:LKs22aDHbJv7ufXuPypzRO7rG3ALLJxzdCXDPutw4Qc=
cloud.google.com/go/documentai v1.23.5/go.mod h1:ghzBsyVTiVdkfKaUCum/9bGBEyBjDO4GfooEcYKhN+g=
cloud.google.com/go/documentai v1.23.7/go.mod h1:ghzBsyVTiVdkfKaUCum/9bGBEyBjDO4GfooEcYKhN+g=
cloud.google.com/go/documentai v1.25.0/go.mod h1:ftLnzw5VcXkLItp6pw1mFic91tMRyfv6hHEY5br4KzY=
+cloud.google.com/go/domains v0.8.0 h1:2ti/o9tlWL4N+wIuWUNH+LbfgpwxPr8J1sv9RHA4bYQ=
cloud.google.com/go/domains v0.9.1/go.mod h1:aOp1c0MbejQQ2Pjf1iJvnVyT+z6R6s8pX66KaCSDYfE=
cloud.google.com/go/domains v0.9.4/go.mod h1:27jmJGShuXYdUNjyDG0SodTfT5RwLi7xmH334Gvi3fY=
cloud.google.com/go/domains v0.9.5/go.mod h1:dBzlxgepazdFhvG7u23XMhmMKBjrkoUNaw0A8AQB55Y=
+cloud.google.com/go/edgecontainer v1.0.0 h1:O0YVE5v+O0Q/ODXYsQHmHb+sYM8KNjGZw2pjX2Ws41c=
cloud.google.com/go/edgecontainer v1.1.1/go.mod h1:O5bYcS//7MELQZs3+7mabRqoWQhXCzenBu0R8bz2rwk=
cloud.google.com/go/edgecontainer v1.1.4/go.mod h1:AvFdVuZuVGdgaE5YvlL1faAoa1ndRR/5XhXZvPBHbsE=
cloud.google.com/go/edgecontainer v1.1.5/go.mod h1:rgcjrba3DEDEQAidT4yuzaKWTbkTI5zAMu3yy6ZWS0M=
-cloud.google.com/go/errorreporting v0.3.0/go.mod h1:xsP2yaAp+OAW4OIm60An2bbLpqIhKXdWR/tawvl7QzU=
+cloud.google.com/go/errorreporting v0.3.0 h1:kj1XEWMu8P0qlLhm3FwcaFsUvXChV/OraZwA70trRR0=
+cloud.google.com/go/essentialcontacts v1.5.0 h1:gIzEhCoOT7bi+6QZqZIzX1Erj4SswMPIteNvYVlu+pM=
cloud.google.com/go/essentialcontacts v1.6.2/go.mod h1:T2tB6tX+TRak7i88Fb2N9Ok3PvY3UNbUsMag9/BARh4=
cloud.google.com/go/essentialcontacts v1.6.5/go.mod h1:jjYbPzw0x+yglXC890l6ECJWdYeZ5dlYACTFL0U/VuM=
cloud.google.com/go/essentialcontacts v1.6.6/go.mod h1:XbqHJGaiH0v2UvtuucfOzFXN+rpL/aU5BCZLn4DYl1Q=
+cloud.google.com/go/eventarc v1.11.0 h1:fsJmNeqvqtk74FsaVDU6cH79lyZNCYP8Rrv7EhaB/PU=
cloud.google.com/go/eventarc v1.12.1/go.mod h1:mAFCW6lukH5+IZjkvrEss+jmt2kOdYlN8aMx3sRJiAI=
cloud.google.com/go/eventarc v1.13.0/go.mod h1:mAFCW6lukH5+IZjkvrEss+jmt2kOdYlN8aMx3sRJiAI=
cloud.google.com/go/eventarc v1.13.3/go.mod h1:RWH10IAZIRcj1s/vClXkBgMHwh59ts7hSWcqD3kaclg=
cloud.google.com/go/eventarc v1.13.4/go.mod h1:zV5sFVoAa9orc/52Q+OuYUG9xL2IIZTbbuTHC6JSY8s=
+cloud.google.com/go/filestore v1.6.0 h1:ckTEXN5towyTMu4q0uQ1Mde/JwTHur0gXs8oaIZnKfw=
cloud.google.com/go/filestore v1.7.1/go.mod h1:y10jsorq40JJnjR/lQ8AfFbbcGlw3g+Dp8oN7i7FjV4=
cloud.google.com/go/filestore v1.7.4/go.mod h1:S5JCxIbFjeBhWMTfIYH2Jx24J6BqjwpkkPl+nBA5DlI=
cloud.google.com/go/filestore v1.8.0/go.mod h1:S5JCxIbFjeBhWMTfIYH2Jx24J6BqjwpkkPl+nBA5DlI=
cloud.google.com/go/filestore v1.8.1/go.mod h1:MbN9KcaM47DRTIuLfQhJEsjaocVebNtNQhSLhKCF5GM=
+cloud.google.com/go/firestore v1.9.0 h1:IBlRyxgGySXu5VuW0RgGFlTtLukSnNkpDiEOMkQkmpA=
cloud.google.com/go/firestore v1.11.0/go.mod h1:b38dKhgzlmNNGTNZZwe7ZRFEuRab1Hay3/DBsIGKKy4=
cloud.google.com/go/firestore v1.13.0/go.mod h1:QojqqOh8IntInDUSTAh0c8ZsPYAr68Ma8c5DWOy8xb8=
cloud.google.com/go/firestore v1.14.0/go.mod h1:96MVaHLsEhbvkBEdZgfN+AS/GIkco1LRpH9Xp9YZfzQ=
+cloud.google.com/go/functions v1.13.0 h1:pPDqtsXG2g9HeOQLoquLbmvmb82Y4Ezdo1GXuotFoWg=
cloud.google.com/go/functions v1.15.1/go.mod h1:P5yNWUTkyU+LvW/S9O6V+V423VZooALQlqoXdoPz5AE=
cloud.google.com/go/functions v1.15.4/go.mod h1:CAsTc3VlRMVvx+XqXxKqVevguqJpnVip4DdonFsX28I=
cloud.google.com/go/functions v1.16.0/go.mod h1:nbNpfAG7SG7Duw/o1iZ6ohvL7mc6MapWQVpqtM29n8k=
-cloud.google.com/go/gkebackup v0.4.0/go.mod h1:byAyBGUwYGEEww7xsbnUTBHIYcOPy/PgUWUtOeRm9Vg=
+cloud.google.com/go/gaming v1.9.0 h1:7vEhFnZmd931Mo7sZ6pJy7uQPDxF7m7v8xtBheG08tc=
+cloud.google.com/go/gkebackup v0.4.0 h1:za3QZvw6ujR0uyqkhomKKKNoXDyqYGPJies3voUK8DA=
cloud.google.com/go/gkebackup v1.3.1/go.mod h1:vUDOu++N0U5qs4IhG1pcOnD1Mac79xWy6GoBFlWCWBU=
cloud.google.com/go/gkebackup v1.3.4/go.mod h1:gLVlbM8h/nHIs09ns1qx3q3eaXcGSELgNu1DWXYz1HI=
cloud.google.com/go/gkebackup v1.3.5/go.mod h1:KJ77KkNN7Wm1LdMopOelV6OodM01pMuK2/5Zt1t4Tvc=
+cloud.google.com/go/gkeconnect v0.7.0 h1:gXYKciHS/Lgq0GJ5Kc9SzPA35NGc3yqu6SkjonpEr2Q=
cloud.google.com/go/gkeconnect v0.8.1/go.mod h1:KWiK1g9sDLZqhxB2xEuPV8V9NYzrqTUmQR9shJHpOZw=
cloud.google.com/go/gkeconnect v0.8.4/go.mod h1:84hZz4UMlDCKl8ifVW8layK4WHlMAFeq8vbzjU0yJkw=
cloud.google.com/go/gkeconnect v0.8.5/go.mod h1:LC/rS7+CuJ5fgIbXv8tCD/mdfnlAadTaUufgOkmijuk=
+cloud.google.com/go/gkehub v0.12.0 h1:TqCSPsEBQ6oZSJgEYZ3XT8x2gUadbvfwI32YB0kuHCs=
cloud.google.com/go/gkehub v0.14.1/go.mod h1:VEXKIJZ2avzrbd7u+zeMtW00Y8ddk/4V9511C9CQGTY=
cloud.google.com/go/gkehub v0.14.4/go.mod h1:Xispfu2MqnnFt8rV/2/3o73SK1snL8s9dYJ9G2oQMfc=
cloud.google.com/go/gkehub v0.14.5/go.mod h1:6bzqxM+a+vEH/h8W8ec4OJl4r36laxTs3A/fMNHJ0wA=
+cloud.google.com/go/gkemulticloud v0.5.0 h1:8I84Q4vl02rJRsFiinBxl7WCozfdLlUVBQuSrqr9Wtk=
cloud.google.com/go/gkemulticloud v0.6.1/go.mod h1:kbZ3HKyTsiwqKX7Yw56+wUGwwNZViRnxWK2DVknXWfw=
cloud.google.com/go/gkemulticloud v1.0.0/go.mod h1:kbZ3HKyTsiwqKX7Yw56+wUGwwNZViRnxWK2DVknXWfw=
cloud.google.com/go/gkemulticloud v1.0.3/go.mod h1:7NpJBN94U6DY1xHIbsDqB2+TFZUfjLUKLjUX8NGLor0=
cloud.google.com/go/gkemulticloud v1.1.0/go.mod h1:7NpJBN94U6DY1xHIbsDqB2+TFZUfjLUKLjUX8NGLor0=
cloud.google.com/go/gkemulticloud v1.1.1/go.mod h1:C+a4vcHlWeEIf45IB5FFR5XGjTeYhF83+AYIpTy4i2Q=
+cloud.google.com/go/grafeas v0.2.0 h1:CYjC+xzdPvbV65gi6Dr4YowKcmLo045pm18L0DhdELM=
+cloud.google.com/go/gsuiteaddons v1.5.0 h1:1mvhXqJzV0Vg5Fa95QwckljODJJfDFXV4pn+iL50zzA=
cloud.google.com/go/gsuiteaddons v1.6.1/go.mod h1:CodrdOqRZcLp5WOwejHWYBjZvfY0kOphkAKpF/3qdZY=
cloud.google.com/go/gsuiteaddons v1.6.4/go.mod h1:rxtstw7Fx22uLOXBpsvb9DUbC+fiXs7rF4U29KHM/pE=
cloud.google.com/go/gsuiteaddons v1.6.5/go.mod h1:Lo4P2IvO8uZ9W+RaC6s1JVxo42vgy+TX5a6hfBZ0ubs=
-cloud.google.com/go/iam v0.13.0/go.mod h1:ljOg+rcNfzZ5d6f1nAUJ8ZIxOaZUVoS14bKCtaLZ/D0=
+cloud.google.com/go/iam v0.13.0 h1:+CmB+K0J/33d0zSQ9SlFWUeCCEn5XJA0ZMZ3pHE9u8k=
cloud.google.com/go/iam v1.1.1/go.mod h1:A5avdyVL2tCppe4unb0951eI9jreack+RJ0/d+KUZOU=
cloud.google.com/go/iam v1.1.2/go.mod h1:A5avdyVL2tCppe4unb0951eI9jreack+RJ0/d+KUZOU=
cloud.google.com/go/iam v1.1.5/go.mod h1:rB6P/Ic3mykPbFio+vo7403drjlgvoWfYpJhMXEbzv8=
cloud.google.com/go/iam v1.1.6/go.mod h1:O0zxdPeGBoFdWW3HWmBxJsk0pfvNM/p/qa82rWOGTwI=
+cloud.google.com/go/iap v1.7.1 h1:PxVHFuMxmSZyfntKXHXhd8bo82WJ+LcATenq7HLdVnU=
cloud.google.com/go/iap v1.8.1/go.mod h1:sJCbeqg3mvWLqjZNsI6dfAtbbV1DL2Rl7e1mTyXYREQ=
cloud.google.com/go/iap v1.9.0/go.mod h1:01OFxd1R+NFrg78S+hoPV5PxEzv22HXaNqUUlmNHFuY=
cloud.google.com/go/iap v1.9.3/go.mod h1:DTdutSZBqkkOm2HEOTBzhZxh2mwwxshfD/h3yofAiCw=
cloud.google.com/go/iap v1.9.4/go.mod h1:vO4mSq0xNf/Pu6E5paORLASBwEmphXEjgCFg7aeNu1w=
+cloud.google.com/go/ids v1.3.0 h1:fodnCDtOXuMmS8LTC2y3h8t24U8F3eKWfhi+3LY6Qf0=
cloud.google.com/go/ids v1.4.1/go.mod h1:np41ed8YMU8zOgv53MMMoCntLTn2lF+SUzlM+O3u/jw=
cloud.google.com/go/ids v1.4.4/go.mod h1:z+WUc2eEl6S/1aZWzwtVNWoSZslgzPxAboS0lZX0HjI=
cloud.google.com/go/ids v1.4.5/go.mod h1:p0ZnyzjMWxww6d2DvMGnFwCsSxDJM666Iir1bK1UuBo=
+cloud.google.com/go/iot v1.6.0 h1:39W5BFSarRNZfVG0eXI5LYux+OVQT8GkgpHCnrZL2vM=
cloud.google.com/go/iot v1.7.1/go.mod h1:46Mgw7ev1k9KqK1ao0ayW9h0lI+3hxeanz+L1zmbbbk=
cloud.google.com/go/iot v1.7.4/go.mod h1:3TWqDVvsddYBG++nHSZmluoCAVGr1hAcabbWZNKEZLk=
cloud.google.com/go/iot v1.7.5/go.mod h1:nq3/sqTz3HGaWJi1xNiX7F41ThOzpud67vwk0YsSsqs=
+cloud.google.com/go/kms v1.10.1 h1:7hm1bRqGCA1GBRQUrp831TwJ9TWhP+tvLuP497CQS2g=
cloud.google.com/go/kms v1.12.1/go.mod h1:c9J991h5DTl+kg7gi3MYomh12YEENGrf48ee/N/2CDM=
cloud.google.com/go/kms v1.15.2/go.mod h1:3hopT4+7ooWRCjc2DxgnpESFxhIraaI2IpAVUEhbT/w=
cloud.google.com/go/kms v1.15.5/go.mod h1:cU2H5jnp6G2TDpUGZyqTCoy1n16fbubHZjmVXSMtwDI=
cloud.google.com/go/kms v1.15.7/go.mod h1:ub54lbsa6tDkUwnu4W7Yt1aAIFLnspgh0kPGToDukeI=
+cloud.google.com/go/language v1.9.0 h1:7Ulo2mDk9huBoBi8zCE3ONOoBrL6UXfAI71CLQ9GEIM=
cloud.google.com/go/language v1.10.1/go.mod h1:CPp94nsdVNiQEt1CNjF5WkTcisLiHPyIbMhvR8H2AW0=
cloud.google.com/go/language v1.11.0/go.mod h1:uDx+pFDdAKTY8ehpWbiXyQdz8tDSYLJbQcXsCkjYyvQ=
cloud.google.com/go/language v1.12.2/go.mod h1:9idWapzr/JKXBBQ4lWqVX/hcadxB194ry20m/bTrhWc=
cloud.google.com/go/language v1.12.3/go.mod h1:evFX9wECX6mksEva8RbRnr/4wi/vKGYnAJrTRXU8+f8=
+cloud.google.com/go/lifesciences v0.8.0 h1:uWrMjWTsGjLZpCTWEAzYvyXj+7fhiZST45u9AgasasI=
cloud.google.com/go/lifesciences v0.9.1/go.mod h1:hACAOd1fFbCGLr/+weUKRAJas82Y4vrL3O5326N//Wc=
cloud.google.com/go/lifesciences v0.9.4/go.mod h1:bhm64duKhMi7s9jR9WYJYvjAFJwRqNj+Nia7hF0Z7JA=
cloud.google.com/go/lifesciences v0.9.5/go.mod h1:OdBm0n7C0Osh5yZB7j9BXyrMnTRGBJIZonUMxo5CzPw=
-cloud.google.com/go/logging v1.7.0/go.mod h1:3xjP2CjkM3ZkO73aj4ASA5wRPGGCRrPIAeNqVNkzY8M=
+cloud.google.com/go/logging v1.7.0 h1:CJYxlNNNNAMkHp9em/YEXcfJg+rPDg7YfwoRpMU+t5I=
cloud.google.com/go/logging v1.8.1/go.mod h1:TJjR+SimHwuC8MZ9cjByQulAMgni+RkXeI3wwctHJEI=
cloud.google.com/go/logging v1.9.0/go.mod h1:1Io0vnZv4onoUnsVUQY3HZ3Igb1nBchky0A0y7BBBhE=
+cloud.google.com/go/longrunning v0.4.1 h1:v+yFJOfKC3yZdY6ZUI933pIYdhyhV8S3NpWrXWmg7jM=
cloud.google.com/go/longrunning v0.5.0/go.mod h1:0JNuqRShmscVAhIACGtskSAWtqtOoPkwP0YF1oVEchc=
cloud.google.com/go/longrunning v0.5.1/go.mod h1:spvimkwdz6SPWKEt/XBij79E9fiTkHSQl/fRUUQJYJc=
cloud.google.com/go/longrunning v0.5.2/go.mod h1:nqo6DQbNV2pXhGDbDMoN2bWz68MjZUzqv2YttZiveCs=
cloud.google.com/go/longrunning v0.5.4/go.mod h1:zqNVncI0BOP8ST6XQD1+VcvuShMmq7+xFSzOL++V0dI=
cloud.google.com/go/longrunning v0.5.5/go.mod h1:WV2LAxD8/rg5Z1cNW6FJ/ZpX4E4VnDnoTk0yawPBB7s=
+cloud.google.com/go/managedidentities v1.5.0 h1:ZRQ4k21/jAhrHBVKl/AY7SjgzeJwG1iZa+mJ82P+VNg=
cloud.google.com/go/managedidentities v1.6.1/go.mod h1:h/irGhTN2SkZ64F43tfGPMbHnypMbu4RB3yl8YcuEak=
cloud.google.com/go/managedidentities v1.6.4/go.mod h1:WgyaECfHmF00t/1Uk8Oun3CQ2PGUtjc3e9Alh79wyiM=
cloud.google.com/go/managedidentities v1.6.5/go.mod h1:fkFI2PwwyRQbjLxlm5bQ8SjtObFMW3ChBGNqaMcgZjI=
-cloud.google.com/go/maps v0.7.0/go.mod h1:3GnvVl3cqeSvgMcpRlQidXsPYuDGQ8naBis7MVzpXsY=
+cloud.google.com/go/maps v0.7.0 h1:mv9YaczD4oZBZkM5XJl6fXQ984IkJNHPwkc8MUsdkBo=
cloud.google.com/go/maps v1.4.0/go.mod h1:6mWTUv+WhnOwAgjVsSW2QPPECmW+s3PcRyOa9vgG/5s=
cloud.google.com/go/maps v1.6.1/go.mod h1:4+buOHhYXFBp58Zj/K+Lc1rCmJssxxF4pJ5CJnhdz18=
cloud.google.com/go/maps v1.6.3/go.mod h1:VGAn809ADswi1ASofL5lveOHPnE6Rk/SFTTBx1yuOLw=
cloud.google.com/go/maps v1.6.4/go.mod h1:rhjqRy8NWmDJ53saCfsXQ0LKwBHfi6OSh5wkq6BaMhI=
+cloud.google.com/go/mediatranslation v0.7.0 h1:anPxH+/WWt8Yc3EdoEJhPMBRF7EhIdz426A+tuoA0OU=
cloud.google.com/go/mediatranslation v0.8.1/go.mod h1:L/7hBdEYbYHQJhX2sldtTO5SZZ1C1vkapubj0T2aGig=
cloud.google.com/go/mediatranslation v0.8.4/go.mod h1:9WstgtNVAdN53m6TQa5GjIjLqKQPXe74hwSCxUP6nj4=
cloud.google.com/go/mediatranslation v0.8.5/go.mod h1:y7kTHYIPCIfgyLbKncgqouXJtLsU+26hZhHEEy80fSs=
+cloud.google.com/go/memcache v1.9.0 h1:8/VEmWCpnETCrBwS3z4MhT+tIdKgR1Z4Tr2tvYH32rg=
cloud.google.com/go/memcache v1.10.1/go.mod h1:47YRQIarv4I3QS5+hoETgKO40InqzLP6kpNLvyXuyaA=
cloud.google.com/go/memcache v1.10.4/go.mod h1:v/d8PuC8d1gD6Yn5+I3INzLR01IDn0N4Ym56RgikSI0=
cloud.google.com/go/memcache v1.10.5/go.mod h1:/FcblbNd0FdMsx4natdj+2GWzTq+cjZvMa1I+9QsuMA=
+cloud.google.com/go/metastore v1.10.0 h1:QCFhZVe2289KDBQ7WxaHV2rAmPrmRAdLC6gbjUd3HPo=
cloud.google.com/go/metastore v1.11.1/go.mod h1:uZuSo80U3Wd4zi6C22ZZliOUJ3XeM/MlYi/z5OAOWRA=
cloud.google.com/go/metastore v1.12.0/go.mod h1:uZuSo80U3Wd4zi6C22ZZliOUJ3XeM/MlYi/z5OAOWRA=
cloud.google.com/go/metastore v1.13.3/go.mod h1:K+wdjXdtkdk7AQg4+sXS8bRrQa9gcOr+foOMF2tqINE=
cloud.google.com/go/metastore v1.13.4/go.mod h1:FMv9bvPInEfX9Ac1cVcRXp8EBBQnBcqH6gz3KvJ9BAE=
+cloud.google.com/go/monitoring v1.13.0 h1:2qsrgXGVoRXpP7otZ14eE1I568zAa92sJSDPyOJvwjM=
cloud.google.com/go/monitoring v1.15.1/go.mod h1:lADlSAlFdbqQuwwpaImhsJXu1QSdd3ojypXrFSMr2rM=
cloud.google.com/go/monitoring v1.16.0/go.mod h1:Ptp15HgAyM1fNICAojDMoNc/wUmn67mLHQfyqbw+poY=
cloud.google.com/go/monitoring v1.16.3/go.mod h1:KwSsX5+8PnXv5NJnICZzW2R8pWTis8ypC4zmdRD63Tw=
cloud.google.com/go/monitoring v1.17.0/go.mod h1:KwSsX5+8PnXv5NJnICZzW2R8pWTis8ypC4zmdRD63Tw=
cloud.google.com/go/monitoring v1.18.0/go.mod h1:c92vVBCeq/OB4Ioyo+NbN2U7tlg5ZH41PZcdvfc+Lcg=
+cloud.google.com/go/networkconnectivity v1.11.0 h1:ZD6b4Pk1jEtp/cx9nx0ZYcL3BKqDa+KixNDZ6Bjs1B8=
cloud.google.com/go/networkconnectivity v1.12.1/go.mod h1:PelxSWYM7Sh9/guf8CFhi6vIqf19Ir/sbfZRUwXh92E=
cloud.google.com/go/networkconnectivity v1.13.0/go.mod h1:SAnGPes88pl7QRLUen2HmcBSE9AowVAcdug8c0RSBFk=
cloud.google.com/go/networkconnectivity v1.14.3/go.mod h1:4aoeFdrJpYEXNvrnfyD5kIzs8YtHg945Og4koAjHQek=
cloud.google.com/go/networkconnectivity v1.14.4/go.mod h1:PU12q++/IMnDJAB+3r+tJtuCXCfwfN+C6Niyj6ji1Po=
+cloud.google.com/go/networkmanagement v1.6.0 h1:8KWEUNGcpSX9WwZXq7FtciuNGPdPdPN/ruDm769yAEM=
cloud.google.com/go/networkmanagement v1.8.0/go.mod h1:Ho/BUGmtyEqrttTgWEe7m+8vDdK74ibQc+Be0q7Fof0=
cloud.google.com/go/networkmanagement v1.9.0/go.mod h1:UTUaEU9YwbCAhhz3jEOHr+2/K/MrBk2XxOLS89LQzFw=
cloud.google.com/go/networkmanagement v1.9.3/go.mod h1:y7WMO1bRLaP5h3Obm4tey+NquUvB93Co1oh4wpL+XcU=
cloud.google.com/go/networkmanagement v1.9.4/go.mod h1:daWJAl0KTFytFL7ar33I6R/oNBH8eEOX/rBNHrC/8TA=
+cloud.google.com/go/networksecurity v0.8.0 h1:sOc42Ig1K2LiKlzG71GUVloeSJ0J3mffEBYmvu+P0eo=
cloud.google.com/go/networksecurity v0.9.1/go.mod h1:MCMdxOKQ30wsBI1eI659f9kEp4wuuAueoC9AJKSPWZQ=
cloud.google.com/go/networksecurity v0.9.4/go.mod h1:E9CeMZ2zDsNBkr8axKSYm8XyTqNhiCHf1JO/Vb8mD1w=
cloud.google.com/go/networksecurity v0.9.5/go.mod h1:KNkjH/RsylSGyyZ8wXpue8xpCEK+bTtvof8SBfIhMG8=
+cloud.google.com/go/notebooks v1.8.0 h1:Kg2K3K7CbSXYJHZ1aGQpf1xi5x2GUvQWf2sFVuiZh8M=
cloud.google.com/go/notebooks v1.9.1/go.mod h1:zqG9/gk05JrzgBt4ghLzEepPHNwE5jgPcHZRKhlC1A8=
cloud.google.com/go/notebooks v1.10.0/go.mod h1:SOPYMZnttHxqot0SGSFSkRrwE29eqnKPBJFqgWmiK2k=
cloud.google.com/go/notebooks v1.11.2/go.mod h1:z0tlHI/lREXC8BS2mIsUeR3agM1AkgLiS+Isov3SS70=
cloud.google.com/go/notebooks v1.11.3/go.mod h1:0wQyI2dQC3AZyQqWnRsp+yA+kY4gC7ZIVP4Qg3AQcgo=
+cloud.google.com/go/optimization v1.3.1 h1:dj8O4VOJRB4CUwZXdmwNViH1OtI0WtWL867/lnYH248=
cloud.google.com/go/optimization v1.4.1/go.mod h1:j64vZQP7h9bO49m2rVaTVoNM0vEBEN5eKPUPbZyXOrk=
cloud.google.com/go/optimization v1.5.0/go.mod h1:evo1OvTxeBRBu6ydPlrIRizKY/LJKo/drDMMRKqGEUU=
cloud.google.com/go/optimization v1.6.2/go.mod h1:mWNZ7B9/EyMCcwNl1frUGEuY6CPijSkz88Fz2vwKPOY=
cloud.google.com/go/optimization v1.6.3/go.mod h1:8ve3svp3W6NFcAEFr4SfJxrldzhUl4VMUJmhrqVKtYA=
+cloud.google.com/go/orchestration v1.6.0 h1:Vw+CEXo8M/FZ1rb4EjcLv0gJqqw89b7+g+C/EmniTb8=
cloud.google.com/go/orchestration v1.8.1/go.mod h1:4sluRF3wgbYVRqz7zJ1/EUNc90TTprliq9477fGobD8=
cloud.google.com/go/orchestration v1.8.4/go.mod h1:d0lywZSVYtIoSZXb0iFjv9SaL13PGyVOKDxqGxEf/qI=
cloud.google.com/go/orchestration v1.8.5/go.mod h1:C1J7HesE96Ba8/hZ71ISTV2UAat0bwN+pi85ky38Yq8=
+cloud.google.com/go/orgpolicy v1.10.0 h1:XDriMWug7sd0kYT1QKofRpRHzjad0bK8Q8uA9q+XrU4=
cloud.google.com/go/orgpolicy v1.11.1/go.mod h1:8+E3jQcpZJQliP+zaFfayC2Pg5bmhuLK755wKhIIUCE=
cloud.google.com/go/orgpolicy v1.11.4/go.mod h1:0+aNV/nrfoTQ4Mytv+Aw+stBDBjNf4d8fYRA9herfJI=
cloud.google.com/go/orgpolicy v1.12.0/go.mod h1:0+aNV/nrfoTQ4Mytv+Aw+stBDBjNf4d8fYRA9herfJI=
cloud.google.com/go/orgpolicy v1.12.1/go.mod h1:aibX78RDl5pcK3jA8ysDQCFkVxLj3aOQqrbBaUL2V5I=
+cloud.google.com/go/osconfig v1.11.0 h1:PkSQx4OHit5xz2bNyr11KGcaFccL5oqglFPdTboyqwQ=
cloud.google.com/go/osconfig v1.12.1/go.mod h1:4CjBxND0gswz2gfYRCUoUzCm9zCABp91EeTtWXyz0tE=
cloud.google.com/go/osconfig v1.12.4/go.mod h1:B1qEwJ/jzqSRslvdOCI8Kdnp0gSng0xW4LOnIebQomA=
cloud.google.com/go/osconfig v1.12.5/go.mod h1:D9QFdxzfjgw3h/+ZaAb5NypM8bhOMqBzgmbhzWViiW8=
+cloud.google.com/go/oslogin v1.9.0 h1:whP7vhpmc+ufZa90eVpkfbgzJRK/Xomjz+XCD4aGwWw=
cloud.google.com/go/oslogin v1.10.1/go.mod h1:x692z7yAue5nE7CsSnoG0aaMbNoRJRXO4sn73R+ZqAs=
cloud.google.com/go/oslogin v1.12.2/go.mod h1:CQ3V8Jvw4Qo4WRhNPF0o+HAM4DiLuE27Ul9CX9g2QdY=
cloud.google.com/go/oslogin v1.13.0/go.mod h1:xPJqLwpTZ90LSE5IL1/svko+6c5avZLluiyylMb/sRA=
cloud.google.com/go/oslogin v1.13.1/go.mod h1:vS8Sr/jR7QvPWpCjNqy6LYZr5Zs1e8ZGW/KPn9gmhws=
+cloud.google.com/go/phishingprotection v0.7.0 h1:l6tDkT7qAEV49MNEJkEJTB6vOO/onbSOcNtAT09HPuA=
cloud.google.com/go/phishingprotection v0.8.1/go.mod h1:AxonW7GovcA8qdEk13NfHq9hNx5KPtfxXNeUxTDxB6I=
cloud.google.com/go/phishingprotection v0.8.4/go.mod h1:6b3kNPAc2AQ6jZfFHioZKg9MQNybDg4ixFd4RPZZ2nE=
cloud.google.com/go/phishingprotection v0.8.5/go.mod h1:g1smd68F7mF1hgQPuYn3z8HDbNre8L6Z0b7XMYFmX7I=
+cloud.google.com/go/policytroubleshooter v1.6.0 h1:yKAGC4p9O61ttZUswaq9GAn1SZnEzTd0vUYXD7ZBT7Y=
cloud.google.com/go/policytroubleshooter v1.7.1/go.mod h1:0NaT5v3Ag1M7U5r0GfDCpUFkWd9YqpubBWsQlhanRv0=
cloud.google.com/go/policytroubleshooter v1.9.0/go.mod h1:+E2Lga7TycpeSTj2FsH4oXxTnrbHJGRlKhVZBLGgU64=
cloud.google.com/go/policytroubleshooter v1.10.2/go.mod h1:m4uF3f6LseVEnMV6nknlN2vYGRb+75ylQwJdnOXfnv0=
cloud.google.com/go/policytroubleshooter v1.10.3/go.mod h1:+ZqG3agHT7WPb4EBIRqUv4OyIwRTZvsVDHZ8GlZaoxk=
+cloud.google.com/go/privatecatalog v0.8.0 h1:EPEJ1DpEGXLDnmc7mnCAqFmkwUJbIsaLAiLHVOkkwtc=
cloud.google.com/go/privatecatalog v0.9.1/go.mod h1:0XlDXW2unJXdf9zFz968Hp35gl/bhF4twwpXZAW50JA=
cloud.google.com/go/privatecatalog v0.9.4/go.mod h1:SOjm93f+5hp/U3PqMZAHTtBtluqLygrDrVO8X8tYtG0=
cloud.google.com/go/privatecatalog v0.9.5/go.mod h1:fVWeBOVe7uj2n3kWRGlUQqR/pOd450J9yZoOECcQqJk=
+cloud.google.com/go/pubsub v1.30.0 h1:vCge8m7aUKBJYOgrZp7EsNDf6QMd2CAlXZqWTn3yq6s=
cloud.google.com/go/pubsub v1.32.0/go.mod h1:f+w71I33OMyxf9VpMVcZbnG5KSUkCOUHYpFd5U1GdRc=
cloud.google.com/go/pubsub v1.33.0/go.mod h1:f+w71I33OMyxf9VpMVcZbnG5KSUkCOUHYpFd5U1GdRc=
cloud.google.com/go/pubsub v1.34.0/go.mod h1:alj4l4rBg+N3YTFDDC+/YyFTs6JAjam2QfYsddcAW4c=
cloud.google.com/go/pubsub v1.36.1/go.mod h1:iYjCa9EzWOoBiTdd4ps7QoMtMln5NwaZQpK1hbRfBDE=
+cloud.google.com/go/pubsublite v1.7.0 h1:cb9fsrtpINtETHiJ3ECeaVzrfIVhcGjhhJEjybHXHao=
cloud.google.com/go/pubsublite v1.8.1/go.mod h1:fOLdU4f5xldK4RGJrBMm+J7zMWNj/k4PxwEZXy39QS0=
+cloud.google.com/go/recaptchaenterprise v1.3.1 h1:u6EznTGzIdsyOsvm+Xkw0aSuKFXQlyjGE9a4exk6iNQ=
+cloud.google.com/go/recaptchaenterprise/v2 v2.7.0 h1:6iOCujSNJ0YS7oNymI64hXsjGq60T4FK1zdLugxbzvU=
cloud.google.com/go/recaptchaenterprise/v2 v2.7.2/go.mod h1:kR0KjsJS7Jt1YSyWFkseQ756D45kaYNTlDPPaRAvDBU=
cloud.google.com/go/recaptchaenterprise/v2 v2.8.3/go.mod h1:Dak54rw6lC2gBY8FBznpOCAR58wKf+R+ZSJRoeJok4w=
cloud.google.com/go/recaptchaenterprise/v2 v2.9.0/go.mod h1:Dak54rw6lC2gBY8FBznpOCAR58wKf+R+ZSJRoeJok4w=
cloud.google.com/go/recaptchaenterprise/v2 v2.9.2/go.mod h1:trwwGkfhCmp05Ll5MSJPXY7yvnO0p4v3orGANAFHAuU=
+cloud.google.com/go/recommendationengine v0.7.0 h1:VibRFCwWXrFebEWKHfZAt2kta6pS7Tlimsnms0fjv7k=
cloud.google.com/go/recommendationengine v0.8.1/go.mod h1:MrZihWwtFYWDzE6Hz5nKcNz3gLizXVIDI/o3G1DLcrE=
cloud.google.com/go/recommendationengine v0.8.4/go.mod h1:GEteCf1PATl5v5ZsQ60sTClUE0phbWmo3rQ1Js8louU=
cloud.google.com/go/recommendationengine v0.8.5/go.mod h1:A38rIXHGFvoPvmy6pZLozr0g59NRNREz4cx7F58HAsQ=
+cloud.google.com/go/recommender v1.9.0 h1:ZnFRY5R6zOVk2IDS1Jbv5Bw+DExCI5rFumsTnMXiu/A=
cloud.google.com/go/recommender v1.10.1/go.mod h1:XFvrE4Suqn5Cq0Lf+mCP6oBHD/yRMA8XxP5sb7Q7gpA=
cloud.google.com/go/recommender v1.11.0/go.mod h1:kPiRQhPyTJ9kyXPCG6u/dlPLbYfFlkwHNRwdzPVAoII=
cloud.google.com/go/recommender v1.11.3/go.mod h1:+FJosKKJSId1MBFeJ/TTyoGQZiEelQQIZMKYYD8ruK4=
cloud.google.com/go/recommender v1.12.0/go.mod h1:+FJosKKJSId1MBFeJ/TTyoGQZiEelQQIZMKYYD8ruK4=
cloud.google.com/go/recommender v1.12.1/go.mod h1:gf95SInWNND5aPas3yjwl0I572dtudMhMIG4ni8nr+0=
+cloud.google.com/go/redis v1.11.0 h1:JoAd3SkeDt3rLFAAxEvw6wV4t+8y4ZzfZcZmddqphQ8=
cloud.google.com/go/redis v1.13.1/go.mod h1:VP7DGLpE91M6bcsDdMuyCm2hIpB6Vp2hI090Mfd1tcg=
cloud.google.com/go/redis v1.14.1/go.mod h1:MbmBxN8bEnQI4doZPC1BzADU4HGocHBk2de3SbgOkqs=
cloud.google.com/go/redis v1.14.2/go.mod h1:g0Lu7RRRz46ENdFKQ2EcQZBAJ2PtJHJLuiiRuEXwyQw=
+cloud.google.com/go/resourcemanager v1.7.0 h1:NRM0p+RJkaQF9Ee9JMnUV9BQ2QBIOq/v8M+Pbv/wmCs=
cloud.google.com/go/resourcemanager v1.9.1/go.mod h1:dVCuosgrh1tINZ/RwBufr8lULmWGOkPS8gL5gqyjdT8=
cloud.google.com/go/resourcemanager v1.9.4/go.mod h1:N1dhP9RFvo3lUfwtfLWVxfUWq8+KUQ+XLlHLH3BoFJ0=
cloud.google.com/go/resourcemanager v1.9.5/go.mod h1:hep6KjelHA+ToEjOfO3garMKi/CLYwTqeAw7YiEI9x8=
+cloud.google.com/go/resourcesettings v1.5.0 h1:8Dua37kQt27CCWHm4h/Q1XqCF6ByD7Ouu49xg95qJzI=
cloud.google.com/go/resourcesettings v1.6.1/go.mod h1:M7mk9PIZrC5Fgsu1kZJci6mpgN8o0IUzVx3eJU3y4Jw=
cloud.google.com/go/resourcesettings v1.6.4/go.mod h1:pYTTkWdv2lmQcjsthbZLNBP4QW140cs7wqA3DuqErVI=
cloud.google.com/go/resourcesettings v1.6.5/go.mod h1:WBOIWZraXZOGAgoR4ukNj0o0HiSMO62H9RpFi9WjP9I=
+cloud.google.com/go/retail v1.12.0 h1:1Dda2OpFNzIb4qWgFZjYlpP7sxX3aLeypKG6A3H4Yys=
cloud.google.com/go/retail v1.14.1/go.mod h1:y3Wv3Vr2k54dLNIrCzenyKG8g8dhvhncT2NcNjb/6gE=
cloud.google.com/go/retail v1.14.4/go.mod h1:l/N7cMtY78yRnJqp5JW8emy7MB1nz8E4t2yfOmklYfg=
cloud.google.com/go/retail v1.16.0/go.mod h1:LW7tllVveZo4ReWt68VnldZFWJRzsh9np+01J9dYWzE=
-cloud.google.com/go/run v0.9.0/go.mod h1:Wwu+/vvg8Y+JUApMwEDfVfhetv30hCG4ZwDR/IXl2Qg=
+cloud.google.com/go/run v0.9.0 h1:ydJQo+k+MShYnBfhaRHSZYeD/SQKZzZLAROyfpeD9zw=
cloud.google.com/go/run v1.2.0/go.mod h1:36V1IlDzQ0XxbQjUx6IYbw8H3TJnWvhii963WW3B/bo=
cloud.google.com/go/run v1.3.3/go.mod h1:WSM5pGyJ7cfYyYbONVQBN4buz42zFqwG67Q3ch07iK4=
cloud.google.com/go/run v1.3.4/go.mod h1:FGieuZvQ3tj1e9GnzXqrMABSuir38AJg5xhiYq+SF3o=
+cloud.google.com/go/scheduler v1.9.0 h1:NpQAHtx3sulByTLe2dMwWmah8PWgeoieFPpJpArwFV0=
cloud.google.com/go/scheduler v1.10.1/go.mod h1:R63Ldltd47Bs4gnhQkmNDse5w8gBRrhObZ54PxgR2Oo=
cloud.google.com/go/scheduler v1.10.4/go.mod h1:MTuXcrJC9tqOHhixdbHDFSIuh7xZF2IysiINDuiq6NI=
cloud.google.com/go/scheduler v1.10.5/go.mod h1:MTuXcrJC9tqOHhixdbHDFSIuh7xZF2IysiINDuiq6NI=
cloud.google.com/go/scheduler v1.10.6/go.mod h1:pe2pNCtJ+R01E06XCDOJs1XvAMbv28ZsQEbqknxGOuE=
+cloud.google.com/go/secretmanager v1.10.0 h1:pu03bha7ukxF8otyPKTFdDz+rr9sE3YauS5PliDXK60=
cloud.google.com/go/secretmanager v1.11.1/go.mod h1:znq9JlXgTNdBeQk9TBW/FnR/W4uChEKGeqQWAJ8SXFw=
cloud.google.com/go/secretmanager v1.11.4/go.mod h1:wreJlbS9Zdq21lMzWmJ0XhWW2ZxgPeahsqeV/vZoJ3w=
cloud.google.com/go/secretmanager v1.11.5/go.mod h1:eAGv+DaCHkeVyQi0BeXgAHOU0RdrMeZIASKc+S7VqH4=
+cloud.google.com/go/security v1.13.0 h1:PYvDxopRQBfYAXKAuDpFCKBvDOWPWzp9k/H5nB3ud3o=
cloud.google.com/go/security v1.15.1/go.mod h1:MvTnnbsWnehoizHi09zoiZob0iCHVcL4AUBj76h9fXA=
cloud.google.com/go/security v1.15.4/go.mod h1:oN7C2uIZKhxCLiAAijKUCuHLZbIt/ghYEo8MqwD/Ty4=
cloud.google.com/go/security v1.15.5/go.mod h1:KS6X2eG3ynWjqcIX976fuToN5juVkF6Ra6c7MPnldtc=
+cloud.google.com/go/securitycenter v1.19.0 h1:AF3c2s3awNTMoBtMX3oCUoOMmGlYxGOeuXSYHNBkf14=
cloud.google.com/go/securitycenter v1.23.0/go.mod h1:8pwQ4n+Y9WCWM278R8W3nF65QtY172h4S8aXyI9/hsQ=
cloud.google.com/go/securitycenter v1.24.2/go.mod h1:l1XejOngggzqwr4Fa2Cn+iWZGf+aBLTXtB/vXjy5vXM=
cloud.google.com/go/securitycenter v1.24.3/go.mod h1:l1XejOngggzqwr4Fa2Cn+iWZGf+aBLTXtB/vXjy5vXM=
cloud.google.com/go/securitycenter v1.24.4/go.mod h1:PSccin+o1EMYKcFQzz9HMMnZ2r9+7jbc+LvPjXhpwcU=
+cloud.google.com/go/servicecontrol v1.11.1 h1:d0uV7Qegtfaa7Z2ClDzr9HJmnbJW7jn0WhZ7wOX6hLE=
+cloud.google.com/go/servicedirectory v1.9.0 h1:SJwk0XX2e26o25ObYUORXx6torSFiYgsGkWSkZgkoSU=
cloud.google.com/go/servicedirectory v1.10.1/go.mod h1:Xv0YVH8s4pVOwfM/1eMTl0XJ6bzIOSLDt8f8eLaGOxQ=
cloud.google.com/go/servicedirectory v1.11.0/go.mod h1:Xv0YVH8s4pVOwfM/1eMTl0XJ6bzIOSLDt8f8eLaGOxQ=
cloud.google.com/go/servicedirectory v1.11.3/go.mod h1:LV+cHkomRLr67YoQy3Xq2tUXBGOs5z5bPofdq7qtiAw=
cloud.google.com/go/servicedirectory v1.11.4/go.mod h1:Bz2T9t+/Ehg6x+Y7Ycq5xiShYLD96NfEsWNHyitj1qM=
+cloud.google.com/go/servicemanagement v1.8.0 h1:fopAQI/IAzlxnVeiKn/8WiV6zKndjFkvi+gzu+NjywY=
+cloud.google.com/go/serviceusage v1.6.0 h1:rXyq+0+RSIm3HFypctp7WoXxIA563rn206CfMWdqXX4=
+cloud.google.com/go/shell v1.6.0 h1:wT0Uw7ib7+AgZST9eCDygwTJn4+bHMDtZo5fh7kGWDU=
cloud.google.com/go/shell v1.7.1/go.mod h1:u1RaM+huXFaTojTbW4g9P5emOrrmLE69KrxqQahKn4g=
cloud.google.com/go/shell v1.7.4/go.mod h1:yLeXB8eKLxw0dpEmXQ/FjriYrBijNsONpwnWsdPqlKM=
cloud.google.com/go/shell v1.7.5/go.mod h1:hL2++7F47/IfpfTO53KYf1EC+F56k3ThfNEXd4zcuiE=
+cloud.google.com/go/spanner v1.45.0 h1:7VdjZ8zj4sHbDw55atp5dfY6kn1j9sam9DRNpPQhqR4=
cloud.google.com/go/spanner v1.47.0/go.mod h1:IXsJwVW2j4UKs0eYDqodab6HgGuA1bViSqW4uH9lfUI=
cloud.google.com/go/spanner v1.49.0/go.mod h1:eGj9mQGK8+hkgSVbHNQ06pQ4oS+cyc4tXXd6Dif1KoM=
cloud.google.com/go/spanner v1.51.0/go.mod h1:c5KNo5LQ1X5tJwma9rSQZsXNBDNvj4/n8BVc3LNahq0=
cloud.google.com/go/spanner v1.55.0/go.mod h1:HXEznMUVhC+PC+HDyo9YFG2Ajj5BQDkcbqB9Z2Ffxi0=
cloud.google.com/go/spanner v1.56.0/go.mod h1:DndqtUKQAt3VLuV2Le+9Y3WTnq5cNKrnLb/Piqcj+h0=
cloud.google.com/go/spanner v1.57.0/go.mod h1:aXQ5QDdhPRIqVhYmnkAdwPYvj/DRN0FguclhEWw+jOo=
+cloud.google.com/go/speech v1.15.0 h1:JEVoWGNnTF128kNty7T4aG4eqv2z86yiMJPT9Zjp+iw=
cloud.google.com/go/speech v1.17.1/go.mod h1:8rVNzU43tQvxDaGvqOhpDqgkJTFowBpDvCJ14kGlJYo=
cloud.google.com/go/speech v1.19.0/go.mod h1:8rVNzU43tQvxDaGvqOhpDqgkJTFowBpDvCJ14kGlJYo=
cloud.google.com/go/speech v1.20.1/go.mod h1:wwolycgONvfz2EDU8rKuHRW3+wc9ILPsAWoikBEWavY=
cloud.google.com/go/speech v1.21.0/go.mod h1:wwolycgONvfz2EDU8rKuHRW3+wc9ILPsAWoikBEWavY=
cloud.google.com/go/speech v1.21.1/go.mod h1:E5GHZXYQlkqWQwY5xRSLHw2ci5NMQNG52FfMU1aZrIA=
-cloud.google.com/go/storage v1.14.0/go.mod h1:GrKmX003DSIwi9o29oFT7YDnHYwZoctc3fOKtUw0Xmo=
+cloud.google.com/go/storage v1.29.0 h1:6weCgzRvMg7lzuUurI4697AqIRPU1SvzHhynwpW31jI=
cloud.google.com/go/storage v1.30.1/go.mod h1:NfxhC0UJE1aXSx7CIIbCf7y9HKT7BiccwkR7+P7gN8E=
cloud.google.com/go/storage v1.36.0/go.mod h1:M6M/3V/D3KpzMTJyPOR/HU6n2Si5QdaXYEsng2xgOs8=
+cloud.google.com/go/storagetransfer v1.8.0 h1:5T+PM+3ECU3EY2y9Brv0Sf3oka8pKmsCfpQ07+91G9o=
cloud.google.com/go/storagetransfer v1.10.0/go.mod h1:DM4sTlSmGiNczmV6iZyceIh2dbs+7z2Ayg6YAiQlYfA=
cloud.google.com/go/storagetransfer v1.10.3/go.mod h1:Up8LY2p6X68SZ+WToswpQbQHnJpOty/ACcMafuey8gc=
cloud.google.com/go/storagetransfer v1.10.4/go.mod h1:vef30rZKu5HSEf/x1tK3WfWrL0XVoUQN/EPDRGPzjZs=
+cloud.google.com/go/talent v1.5.0 h1:nI9sVZPjMKiO2q3Uu0KhTDVov3Xrlpt63fghP9XjyEM=
cloud.google.com/go/talent v1.6.2/go.mod h1:CbGvmKCG61mkdjcqTcLOkb2ZN1SrQI8MDyma2l7VD24=
cloud.google.com/go/talent v1.6.5/go.mod h1:Mf5cma696HmE+P2BWJ/ZwYqeJXEeU0UqjHFXVLadEDI=
cloud.google.com/go/talent v1.6.6/go.mod h1:y/WQDKrhVz12WagoarpAIyKKMeKGKHWPoReZ0g8tseQ=
+cloud.google.com/go/texttospeech v1.6.0 h1:H4g1ULStsbVtalbZGktyzXzw6jP26RjVGYx9RaYjBzc=
cloud.google.com/go/texttospeech v1.7.1/go.mod h1:m7QfG5IXxeneGqTapXNxv2ItxP/FS0hCZBwXYqucgSk=
cloud.google.com/go/texttospeech v1.7.4/go.mod h1:vgv0002WvR4liGuSd5BJbWy4nDn5Ozco0uJymY5+U74=
cloud.google.com/go/texttospeech v1.7.5/go.mod h1:tzpCuNWPwrNJnEa4Pu5taALuZL4QRRLcb+K9pbhXT6M=
+cloud.google.com/go/tpu v1.5.0 h1:/34T6CbSi+kTv5E19Q9zbU/ix8IviInZpzwz3rsFE+A=
cloud.google.com/go/tpu v1.6.1/go.mod h1:sOdcHVIgDEEOKuqUoi6Fq53MKHJAtOwtz0GuKsWSH3E=
cloud.google.com/go/tpu v1.6.4/go.mod h1:NAm9q3Rq2wIlGnOhpYICNI7+bpBebMJbh0yyp3aNw1Y=
cloud.google.com/go/tpu v1.6.5/go.mod h1:P9DFOEBIBhuEcZhXi+wPoVy/cji+0ICFi4TtTkMHSSs=
+cloud.google.com/go/trace v1.9.0 h1:olxC0QHC59zgJVALtgqfD9tGk0lfeCP5/AGXL3Px/no=
cloud.google.com/go/trace v1.10.1/go.mod h1:gbtL94KE5AJLH3y+WVpfWILmqgc6dXcqgNXdOPAQTYk=
cloud.google.com/go/trace v1.10.4/go.mod h1:Nso99EDIK8Mj5/zmB+iGr9dosS/bzWCJ8wGmE6TXNWY=
cloud.google.com/go/trace v1.10.5/go.mod h1:9hjCV1nGBCtXbAE4YK7OqJ8pmPYSxPA0I67JwRd5s3M=
+cloud.google.com/go/translate v1.7.0 h1:GvLP4oQ4uPdChBmBaUSa/SaZxCdyWELtlAaKzpHsXdA=
cloud.google.com/go/translate v1.8.1/go.mod h1:d1ZH5aaOA0CNhWeXeC8ujd4tdCFw8XoNWRljklu5RHs=
cloud.google.com/go/translate v1.9.0/go.mod h1:d1ZH5aaOA0CNhWeXeC8ujd4tdCFw8XoNWRljklu5RHs=
cloud.google.com/go/translate v1.9.3/go.mod h1:Kbq9RggWsbqZ9W5YpM94Q1Xv4dshw/gr/SHfsl5yCZ0=
cloud.google.com/go/translate v1.10.0/go.mod h1:Kbq9RggWsbqZ9W5YpM94Q1Xv4dshw/gr/SHfsl5yCZ0=
cloud.google.com/go/translate v1.10.1/go.mod h1:adGZcQNom/3ogU65N9UXHOnnSvjPwA/jKQUMnsYXOyk=
+cloud.google.com/go/video v1.15.0 h1:upIbnGI0ZgACm58HPjAeBMleW3sl5cT84AbYQ8PWOgM=
cloud.google.com/go/video v1.17.1/go.mod h1:9qmqPqw/Ib2tLqaeHgtakU+l5TcJxCJbhFXM7UJjVzU=
cloud.google.com/go/video v1.20.0/go.mod h1:U3G3FTnsvAGqglq9LxgqzOiBc/Nt8zis8S+850N2DUM=
cloud.google.com/go/video v1.20.3/go.mod h1:TnH/mNZKVHeNtpamsSPygSR0iHtvrR/cW1/GDjN5+GU=
cloud.google.com/go/video v1.20.4/go.mod h1:LyUVjyW+Bwj7dh3UJnUGZfyqjEto9DnrvTe1f/+QrW0=
+cloud.google.com/go/videointelligence v1.10.0 h1:Uh5BdoET8XXqXX2uXIahGb+wTKbLkGH7s4GXR58RrG8=
cloud.google.com/go/videointelligence v1.11.1/go.mod h1:76xn/8InyQHarjTWsBR058SmlPCwQjgcvoW0aZykOvo=
cloud.google.com/go/videointelligence v1.11.4/go.mod h1:kPBMAYsTPFiQxMLmmjpcZUMklJp3nC9+ipJJtprccD8=
cloud.google.com/go/videointelligence v1.11.5/go.mod h1:/PkeQjpRponmOerPeJxNPuxvi12HlW7Em0lJO14FC3I=
+cloud.google.com/go/vision v1.2.0 h1:/CsSTkbmO9HC8iQpxbK8ATms3OQaX3YQUeTMGCxlaK4=
+cloud.google.com/go/vision/v2 v2.7.0 h1:8C8RXUJoflCI4yVdqhTy9tRyygSHmp60aP363z23HKg=
cloud.google.com/go/vision/v2 v2.7.2/go.mod h1:jKa8oSYBWhYiXarHPvP4USxYANYUEdEsQrloLjrSwJU=
cloud.google.com/go/vision/v2 v2.7.5/go.mod h1:GcviprJLFfK9OLf0z8Gm6lQb6ZFUulvpZws+mm6yPLM=
cloud.google.com/go/vision/v2 v2.8.0/go.mod h1:ocqDiA2j97pvgogdyhoxiQp2ZkDCyr0HWpicywGGRhU=
+cloud.google.com/go/vmmigration v1.6.0 h1:Azs5WKtfOC8pxvkyrDvt7J0/4DYBch0cVbuFfCCFt5k=
cloud.google.com/go/vmmigration v1.7.1/go.mod h1:WD+5z7a/IpZ5bKK//YmT9E047AD+rjycCAvyMxGJbro=
cloud.google.com/go/vmmigration v1.7.4/go.mod h1:yBXCmiLaB99hEl/G9ZooNx2GyzgsjKnw5fWcINRgD70=
cloud.google.com/go/vmmigration v1.7.5/go.mod h1:pkvO6huVnVWzkFioxSghZxIGcsstDvYiVCxQ9ZH3eYI=
+cloud.google.com/go/vmwareengine v0.3.0 h1:b0NBu7S294l0gmtrT0nOJneMYgZapr5x9tVWvgDoVEM=
cloud.google.com/go/vmwareengine v0.4.1/go.mod h1:Px64x+BvjPZwWuc4HdmVhoygcXqEkGHXoa7uyfTgSI0=
cloud.google.com/go/vmwareengine v1.0.0/go.mod h1:Px64x+BvjPZwWuc4HdmVhoygcXqEkGHXoa7uyfTgSI0=
cloud.google.com/go/vmwareengine v1.0.3/go.mod h1:QSpdZ1stlbfKtyt6Iu19M6XRxjmXO+vb5a/R6Fvy2y4=
cloud.google.com/go/vmwareengine v1.1.1/go.mod h1:nMpdsIVkUrSaX8UvmnBhzVzG7PPvNYc5BszcvIVudYs=
+cloud.google.com/go/vpcaccess v1.6.0 h1:FOe6CuiQD3BhHJWt7E8QlbBcaIzVRddupwJlp7eqmn4=
cloud.google.com/go/vpcaccess v1.7.1/go.mod h1:FogoD46/ZU+JUBX9D606X21EnxiszYi2tArQwLY4SXs=
cloud.google.com/go/vpcaccess v1.7.4/go.mod h1:lA0KTvhtEOb/VOdnH/gwPuOzGgM+CWsmGu6bb4IoMKk=
cloud.google.com/go/vpcaccess v1.7.5/go.mod h1:slc5ZRvvjP78c2dnL7m4l4R9GwL3wDLcpIWz6P/ziig=
+cloud.google.com/go/webrisk v1.8.0 h1:IY+L2+UwxcVm2zayMAtBhZleecdIFLiC+QJMzgb0kT0=
cloud.google.com/go/webrisk v1.9.1/go.mod h1:4GCmXKcOa2BZcZPn6DCEvE7HypmEJcJkr4mtM+sqYPc=
cloud.google.com/go/webrisk v1.9.4/go.mod h1:w7m4Ib4C+OseSr2GL66m0zMBywdrVNTDKsdEsfMl7X0=
cloud.google.com/go/webrisk v1.9.5/go.mod h1:aako0Fzep1Q714cPEM5E+mtYX8/jsfegAuS8aivxy3U=
+cloud.google.com/go/websecurityscanner v1.5.0 h1:AHC1xmaNMOZtNqxI9Rmm87IJEyPaRkOxeI0gpAacXGk=
cloud.google.com/go/websecurityscanner v1.6.1/go.mod h1:Njgaw3rttgRHXzwCB8kgCYqv5/rGpFCsBOvPbYgszpg=
cloud.google.com/go/websecurityscanner v1.6.4/go.mod h1:mUiyMQ+dGpPPRkHgknIZeCzSHJ45+fY4F52nZFDHm2o=
cloud.google.com/go/websecurityscanner v1.6.5/go.mod h1:QR+DWaxAz2pWooylsBF854/Ijvuoa3FCyS1zBa1rAVQ=
+cloud.google.com/go/workflows v1.10.0 h1:FfGp9w0cYnaKZJhUOMqCOJCYT/WlvYBfTQhFWV3sRKI=
cloud.google.com/go/workflows v1.11.1/go.mod h1:Z+t10G1wF7h8LgdY/EmRcQY8ptBD/nvofaL6FqlET6g=
cloud.google.com/go/workflows v1.12.0/go.mod h1:PYhSk2b6DhZ508tj8HXKaBh+OFe+xdl0dHF/tJdzPQM=
cloud.google.com/go/workflows v1.12.3/go.mod h1:fmOUeeqEwPzIU81foMjTRQIdwQHADi/vEr1cx9R1m5g=
cloud.google.com/go/workflows v1.12.4/go.mod h1:yQ7HUqOkdJK4duVtMeBCAOPiN1ZF1E9pAMX51vpwB/w=
+dmitri.shuralyov.com/gpu/mtl v0.0.0-20190408044501-666a987793e9 h1:VpgP7xuJadIUuKccphEpTJnWhS2jkQyMt6Y7pJCD7fY=
+gioui.org v0.0.0-20210308172011-57750fc8a0a6 h1:K72hopUosKG3ntOPNG4OzzbuhxGuVf06fa2la1/H/Ho=
+git.sr.ht/~sbinet/gg v0.3.1 h1:LNhjNn8DerC8f9DHLz6lS0YYul/b602DUxDgGkd/Aik=
+github.com/BurntSushi/xgb v0.0.0-20160522181843-27f122750802 h1:1BDTz0u9nC3//pOCMdNH+CiXJVYJh5UQNCOBG7jbELc=
+github.com/JohnCGriffin/overflow v0.0.0-20211019200055-46fa312c352c h1:RGWPOewvKIROun94nF7v2cua9qP+thov/7M50KEoeSU=
github.com/NYTimes/gziphandler v0.0.0-20170623195520-56545f4a5d46/go.mod h1:3wb06e3pkSAbeQ52E9H9iFoQsEEwGN64994WTCIhntQ=
+github.com/NYTimes/gziphandler v1.1.1 h1:ZUDjpQae29j0ryrS0u/B8HZfJBtBQHjqw2rQ2cqUQ3I=
github.com/NYTimes/gziphandler v1.1.1/go.mod h1:n/CVRwUEOgIxrgPvAQhUUr9oeUtvrhMomdKFjzJNB0c=
-github.com/alecthomas/kingpin/v2 v2.4.0/go.mod h1:0gyi0zQnjuFk8xrkNKamJoyUo382HRL7ATRpFZCw6tE=
-github.com/alecthomas/units v0.0.0-20211218093645-b94a6e3cc137/go.mod h1:OMCwj8VM1Kc9e19TLln2VL61YJF0x1XFtfdL4JdbSyE=
-github.com/andybalholm/brotli v1.0.4/go.mod h1:fO7iG3H7G2nSZ7m0zPUDn85XEX2GTukHGRSepvi9Eig=
+github.com/OneOfOne/xxhash v1.2.2 h1:KMrpdQIwFcEqXDklaen+P1axHaj9BSKzvpUUfnHldSE=
+github.com/ajstarks/deck v0.0.0-20200831202436-30c9fc6549a9 h1:7kQgkwGRoLzC9K0oyXdJo7nve/bynv/KwUsxbiTlzAM=
+github.com/ajstarks/deck/generate v0.0.0-20210309230005-c3f852c02e19 h1:iXUgAaqDcIUGbRoy2TdeofRG/j1zpGRSEmNK05T+bi8=
+github.com/ajstarks/svgo v0.0.0-20211024235047-1546f124cd8b h1:slYM766cy2nI3BwyRiyQj/Ud48djTMtMebDqepE95rw=
+github.com/alecthomas/kingpin/v2 v2.4.0 h1:f48lwail6p8zpO1bC4TxtqACaGqHYA22qkHjHpqDjYY=
+github.com/alecthomas/template v0.0.0-20190718012654-fb15b899a751 h1:JYp7IbQjafoB+tBA3gMyHYHrpOtNuDiK/uB5uXxq5wM=
+github.com/alecthomas/units v0.0.0-20211218093645-b94a6e3cc137 h1:s6gZFSlWYmbqAuRjVTiNNhvNRfY2Wxp9nhfyel4rklc=
+github.com/andybalholm/brotli v1.0.4 h1:V7DdXeJtZscaqfNuAdSRuRFzuiKlHSC/Zh3zl9qY3JY=
+github.com/antihax/optional v1.0.0 h1:xK2lYat7ZLaVVcIuj82J8kIro4V6kDe0AUDFboUCwcg=
+github.com/antlr/antlr4/runtime/Go/antlr/v4 v4.0.0-20230305170008-8188dc5388df h1:7RFfzj4SSt6nnvCPbCqijJi1nWCd+TqAT3bYCStRC18=
github.com/antlr/antlr4/runtime/Go/antlr/v4 v4.0.0-20230305170008-8188dc5388df/go.mod h1:pSwJ0fSY5KhvocuWSx4fz3BA8OrA1bQn+K1Eli3BRwM=
-github.com/apache/thrift v0.16.0/go.mod h1:PHK3hniurgQaNMZYaCLEqXKsYK8upmhPbmdP2FXSqgU=
+github.com/apache/arrow/go/v10 v10.0.1 h1:n9dERvixoC/1JjDmBcs9FPaEryoANa2sCgVFo6ez9cI=
+github.com/apache/arrow/go/v11 v11.0.0 h1:hqauxvFQxww+0mEU/2XHG6LT7eZternCZq+A5Yly2uM=
+github.com/apache/thrift v0.16.0 h1:qEy6UW60iVOlUy+b9ZR0d5WzUWYGOo4HfopoyBaNmoY=
+github.com/armon/go-socks5 v0.0.0-20160902184237-e75332964ef5 h1:0CwZNZbxp69SHPdPJAN/hZIm0C4OItdklCFmMRWYpio=
github.com/armon/go-socks5 v0.0.0-20160902184237-e75332964ef5/go.mod h1:wHh0iHkYZB8zMSxRWpUBQtwG5a7fFgvEO+odwuTv2gs=
github.com/asaskevich/govalidator v0.0.0-20190424111038-f61b66f89f4a/go.mod h1:lB+ZfQJz7igIIfQNfa7Ml4HSf2uFQQRzpGGRXenZAgY=
+github.com/asaskevich/govalidator v0.0.0-20230301143203-a9d515a09cc2 h1:DklsrG3dyBCFEj5IhUbnKptjxatkF07cF2ak3yi77so=
github.com/asaskevich/govalidator v0.0.0-20230301143203-a9d515a09cc2/go.mod h1:WaHUgvxTVq04UNunO+XhnAqY/wQc+bxr74GqbsZ/Jqw=
github.com/blang/semver v3.5.1+incompatible h1:cQNTCjp13qL8KC3Nbxr/y2Bqb63oX6wdnnjpJbkM4JQ=
+github.com/boombuler/barcode v1.0.1 h1:NDBbPmhS+EqABEs5Kg3n/5ZNjy73Pz7SIV+KCeqyXcs=
+github.com/bytedance/sonic v1.9.1 h1:6iJ6NqdoxCDr6mbY8h18oSO+cShGSMRGCEo7F2h0x8s=
github.com/bytedance/sonic v1.9.1/go.mod h1:i736AoUSYt75HyZLoJW9ERYxcy6eaN6h4BZXU064P/U=
+github.com/cenkalti/backoff/v4 v4.2.1 h1:y4OZtCnogmCPw98Zjyt5a6+QwPLGkiQsYW5oUqylYbM=
github.com/cenkalti/backoff/v4 v4.2.1/go.mod h1:Y3VNntkOUPxTVeUxJ/G5vcM//AlwfmyYozVcomhLiZE=
-github.com/census-instrumentation/opencensus-proto v0.4.1/go.mod h1:4T9NM4+4Vw91VeyqjLS6ao50K5bOcLKN6Q42XnYaRYw=
+github.com/census-instrumentation/opencensus-proto v0.4.1 h1:iKLQ0xPNFxR/2hzXZMrBo8f1j86j5WHzznCCQxV/b8g=
github.com/cespare/xxhash v1.1.0 h1:a6HrQnmkObjyL+Gs60czilIUGqrzKutQD6XZog3p+ko=
+github.com/checkpoint-restore/go-criu/v5 v5.3.0 h1:wpFFOoomK3389ue2lAb0Boag6XPht5QYpipxmSNL4d8=
github.com/checkpoint-restore/go-criu/v5 v5.3.0/go.mod h1:E/eQpaFtUKGOOSEBZgmKAcn+zUUwWxqcaKZlF54wK8E=
+github.com/chenzhuoyu/base64x v0.0.0-20221115062448-fe3a3abad311 h1:qSGYFH7+jGhDF8vLC+iwCD4WpbV1EBDSzWkJODFLams=
github.com/chenzhuoyu/base64x v0.0.0-20221115062448-fe3a3abad311/go.mod h1:b583jCggY9gE99b6G5LEC39OIiVsWj+R97kbl5odCEk=
+github.com/chromedp/cdproto v0.0.0-20230802225258-3cf4e6d46a89 h1:aPflPkRFkVwbW6dmcVqfgwp1i+UWGFH6VgR1Jim5Ygc=
github.com/chromedp/cdproto v0.0.0-20230802225258-3cf4e6d46a89/go.mod h1:GKljq0VrfU4D5yc+2qA6OVr8pmO/MBbPEWqWQ/oqGEs=
+github.com/chromedp/chromedp v0.9.2 h1:dKtNz4kApb06KuSXoTQIyUC2TrA0fhGDwNZf3bcgfKw=
github.com/chromedp/chromedp v0.9.2/go.mod h1:LkSXJKONWTCHAfQasKFUZI+mxqS4tZqhmtGzzhLsnLs=
+github.com/chromedp/sysutil v1.0.0 h1:+ZxhTpfpZlmchB58ih/LBHX52ky7w2VhQVKQMucy3Ic=
github.com/chromedp/sysutil v1.0.0/go.mod h1:kgWmDdq8fTzXYcKIBqIYvRRTnYb9aNS9moAV0xufSww=
+github.com/chzyer/logex v1.2.1 h1:XHDu3E6q+gdHgsdTPH6ImJMIp436vR6MPtH8gP05QzM=
github.com/chzyer/logex v1.2.1/go.mod h1:JLbx6lG2kDbNRFnfkgvh4eRJRPX1QCoOIWomwysCBrQ=
+github.com/chzyer/readline v1.5.1 h1:upd/6fQk4src78LMRzh5vItIt361/o4uq553V8B5sGI=
github.com/chzyer/readline v1.5.1/go.mod h1:Eh+b79XXUwfKfcPLepksvw2tcLE/Ct21YObkaSkeBlk=
+github.com/chzyer/test v1.0.0 h1:p3BQDXSxOhOG0P9z6/hGnII4LGiEPOYBhs8asl/fC04=
github.com/chzyer/test v1.0.0/go.mod h1:2JlltgoNkt4TW/z9V/IzDdFaMTM2JPIi26O1pF38GC8=
+github.com/cilium/ebpf v0.7.0 h1:1k/q3ATgxSXRdrmPfH8d7YK0GfqVsEKZAX9dQZvs56k=
github.com/cilium/ebpf v0.7.0/go.mod h1:/oI2+1shJiTGAMgl6/RgJr36Eo1jzrRcAWbcXO2usCA=
-github.com/cncf/udpa/go v0.0.0-20200629203442-efcf912fb354/go.mod h1:WmhPx2Nbnhtbo57+VJT5O0JRkEi1Wbu0z5j0R8u5Hbk=
-github.com/cncf/udpa/go v0.0.0-20210930031921-04548b0d99d4/go.mod h1:6pvJx4me5XPnfI9Z40ddWsdw2W/uZgQLFXToKeRcDiI=
-github.com/cncf/udpa/go v0.0.0-20220112060539-c52dc94e7fbe/go.mod h1:6pvJx4me5XPnfI9Z40ddWsdw2W/uZgQLFXToKeRcDiI=
-github.com/cncf/xds/go v0.0.0-20210805033703-aa0b78936158/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs=
-github.com/cncf/xds/go v0.0.0-20210922020428-25de7278fc84/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs=
-github.com/cncf/xds/go v0.0.0-20211011173535-cb28da3451f1/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs=
+github.com/client9/misspell v0.3.4 h1:ta993UF76GwbvJcIo3Y68y/M3WxlpEHPWIGDkJYwzJI=
+github.com/cncf/udpa/go v0.0.0-20220112060539-c52dc94e7fbe h1:QQ3GSy+MqSHxm/d8nCtnAiZdYFd45cYZPs8vOOIYKfk=
github.com/cncf/xds/go v0.0.0-20230607035331-e9ce68804cb4/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs=
github.com/cncf/xds/go v0.0.0-20231109132714-523115ebc101/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs=
+github.com/cncf/xds/go v0.0.0-20231128003011-0fa0005c9caa h1:jQCWAUqqlij9Pgj2i/PB79y4KOPYVyFYdROxgaCwdTQ=
github.com/cncf/xds/go v0.0.0-20231128003011-0fa0005c9caa/go.mod h1:x/1Gn8zydmfq8dk6e9PdstVsDgu9RuyIIJqAaF//0IM=
+github.com/containerd/console v1.0.3 h1:lIr7SlA5PxZyMV30bDW0MGbiOPXwc63yRuCP0ARubLw=
github.com/containerd/console v1.0.3/go.mod h1:7LqA/THxQ86k76b8c/EMSiaJ3h1eZkMkXar0TQ1gf3U=
+github.com/coreos/go-oidc v2.2.1+incompatible h1:mh48q/BqXqgjVHpy2ZY7WnWAbenxRjsz9N1i1YxjHAk=
github.com/coreos/go-oidc v2.2.1+incompatible/go.mod h1:CgnwVTmzoESiwO9qyAFEMiHoZ1nMCKZlZ9V6mm3/LKc=
+github.com/coreos/go-semver v0.3.1 h1:yi21YpKnrx1gt5R+la8n5WgS0kCrsPp33dmEyHReZr4=
github.com/coreos/go-semver v0.3.1/go.mod h1:irMmmIw/7yzSRPWryHsK7EYSg09caPQL03VsM8rvUec=
github.com/coreos/go-systemd v0.0.0-20190321100706-95778dfbb74e h1:Wf6HqHfScWJN9/ZjdUKyjop4mf3Qdd+1TvvltAvM3m8=
+github.com/cpuguy83/go-md2man/v2 v2.0.3 h1:qMCsGGgs+MAzDFyp9LpAe1Lqy/fY/qCovCm0qnXZOBM=
+github.com/docker/go-units v0.4.0 h1:3uh0PgVws3nIA0Q+MwDC8yjEPf9zjRfZZWXZYDct3Tw=
github.com/docker/go-units v0.4.0/go.mod h1:fgPhTUdO+D/Jk86RDLlptpiXQzgHJF7gydDDbaIK4Dk=
+github.com/docopt/docopt-go v0.0.0-20180111231733-ee0de3bc6815 h1:bWDMxwH3px2JBh6AyO7hdCn/PkvCZXii8TGj7sbtEbQ=
+github.com/dustin/go-humanize v1.0.1 h1:GzkhY7T5VNhEkwH0PVJgjz+fX1rhBrR7pRT3mDkpeCY=
github.com/dustin/go-humanize v1.0.1/go.mod h1:Mu1zIs6XwVuF/gI1OepvI0qD18qycQx+mFykh5fBlto=
github.com/emicklei/go-restful v2.9.5+incompatible h1:spTtZBk5DYEvbxMVutUuTyh1Ao2r4iyvLdACqsl/Ljk=
github.com/emicklei/go-restful/v3 v3.8.0/go.mod h1:6n3XBCmQQb25CM2LCACGz8ukIrRry+4bhvbpWn3mrbc=
github.com/emicklei/go-restful/v3 v3.9.0/go.mod h1:6n3XBCmQQb25CM2LCACGz8ukIrRry+4bhvbpWn3mrbc=
-github.com/envoyproxy/go-control-plane v0.9.7/go.mod h1:cwu0lG7PUMfa9snN8LXBig5ynNVH9qI8YYLbd1fK2po=
-github.com/envoyproxy/go-control-plane v0.9.10-0.20210907150352-cf90f659a021/go.mod h1:AFq3mo9L8Lqqiid3OhADV3RfLJnjiw63cSpi+fDTRC0=
+github.com/emicklei/go-restful/v3 v3.11.0/go.mod h1:6n3XBCmQQb25CM2LCACGz8ukIrRry+4bhvbpWn3mrbc=
github.com/envoyproxy/go-control-plane v0.11.1/go.mod h1:uhMcXKCQMEJHiAb0w+YGefQLaTEw+YhGluxZkrTmD0g=
+github.com/envoyproxy/go-control-plane v0.12.0 h1:4X+VP1GHd1Mhj6IB5mMeGbLCleqxjletLK6K0rbxyZI=
github.com/envoyproxy/go-control-plane v0.12.0/go.mod h1:ZBTaoJ23lqITozF0M6G4/IragXCQKCnYbmlmtHvwRG0=
github.com/envoyproxy/protoc-gen-validate v1.0.2/go.mod h1:GpiZQP3dDbg4JouG/NNS7QWXpgx6x8QiMKdmN72jogE=
+github.com/envoyproxy/protoc-gen-validate v1.0.4 h1:gVPz/FMfvh57HdSJQyvBtF00j8JU4zdyUgIUNhlgg0A=
github.com/envoyproxy/protoc-gen-validate v1.0.4/go.mod h1:qys6tmnRsYrQqIhm2bvKZH4Blx/1gTIZ2UKVY1M+Yew=
+github.com/evanphx/json-patch v4.12.0+incompatible/go.mod h1:50XU6AFN0ol/bzJsmQLiYLvXMP4fmwYFNcr97nuDLSk=
+github.com/felixge/httpsnoop v1.0.3 h1:s/nj+GCswXYzN5v2DpNMuMQYe+0DDwt5WVCU6CWBdXk=
github.com/felixge/httpsnoop v1.0.3/go.mod h1:m8KPJKqk1gH5J9DgRY2ASl2lWCfGKXixSwevea8zH2U=
github.com/felixge/httpsnoop v1.0.4/go.mod h1:m8KPJKqk1gH5J9DgRY2ASl2lWCfGKXixSwevea8zH2U=
+github.com/fogleman/gg v1.3.0 h1:/7zJX8F6AaYQc57WQCyN9cAIz+4bCJGO9B+dyW29am8=
+github.com/fxamacker/cbor/v2 v2.6.0 h1:sU6J2usfADwWlYDAFhZBQ6TnLFBHxgesMrQfQgk1tWA=
+github.com/fxamacker/cbor/v2 v2.6.0/go.mod h1:pxXPTn3joSm21Gbwsv0w9OSA2y1HFR9qXEeXQVeNoDQ=
+github.com/gabriel-vasile/mimetype v1.4.2 h1:w5qFW6JKBz9Y393Y4q372O9A7cUSequkh1Q7OhCmWKU=
github.com/gabriel-vasile/mimetype v1.4.2/go.mod h1:zApsH/mKG4w07erKIaJPFiX0Tsq9BFQgN3qGY5GnNgA=
+github.com/getsentry/sentry-go v0.21.0 h1:c9l5F1nPF30JIppulk4veau90PK6Smu3abgVtVQWon4=
github.com/getsentry/sentry-go v0.21.0/go.mod h1:lc76E2QywIyW8WuBnwl8Lc4bkmQH4+w1gwTf25trprY=
+github.com/gin-contrib/sse v0.1.0 h1:Y/yl/+YNO8GZSjAhjMsSuLt29uWRFHdHYUb5lYOV9qE=
github.com/gin-contrib/sse v0.1.0/go.mod h1:RHrZQHXnP2xjPF+u1gW/2HnVO7nvIa9PG3Gm+fLHvGI=
+github.com/gin-gonic/gin v1.9.1 h1:4idEAncQnU5cB7BeOkPtxjfCSye0AAm1R0RVIqJ+Jmg=
github.com/gin-gonic/gin v1.9.1/go.mod h1:hPrL7YrpYKXt5YId3A/Tnip5kqbEAP+KLuI3SUcPTeU=
-github.com/go-kit/log v0.2.1/go.mod h1:NwTd00d/i8cPZ3xOwwiv2PO5MOcx78fFErGNcVmBjv0=
-github.com/go-logfmt/logfmt v0.5.1/go.mod h1:WYhtIu8zTZfxdn5+rREduYbwxfcBr/Vr6KEVveWlfTs=
+github.com/go-fonts/dejavu v0.1.0 h1:JSajPXURYqpr+Cu8U9bt8K+XcACIHWqWrvWCKyeFmVQ=
+github.com/go-fonts/latin-modern v0.2.0 h1:5/Tv1Ek/QCr20C6ZOz15vw3g7GELYL98KWr8Hgo+3vk=
+github.com/go-fonts/liberation v0.2.0 h1:jAkAWJP4S+OsrPLZM4/eC9iW7CtHy+HBXrEwZXWo5VM=
+github.com/go-fonts/stix v0.1.0 h1:UlZlgrvvmT/58o573ot7NFw0vZasZ5I6bcIft/oMdgg=
+github.com/go-gl/glfw v0.0.0-20190409004039-e6da0acd62b1 h1:QbL/5oDUmRBzO9/Z7Seo6zf912W/a6Sr4Eu0G/3Jho0=
+github.com/go-gl/glfw/v3.3/glfw v0.0.0-20200222043503-6f7a984d4dc4 h1:WtGNWLvXpe6ZudgnXrq0barxBImvnnJoMEhXAzcbM0I=
+github.com/go-kit/kit v0.9.0 h1:wDJmvq38kDhkVxi50ni9ykkdUr1PKgqKOoi01fa0Mdk=
+github.com/go-kit/log v0.2.1 h1:MRVx0/zhvdseW+Gza6N9rVzU/IVzaeE1SFI4raAhmBU=
+github.com/go-latex/latex v0.0.0-20210823091927-c0d11ff05a81 h1:6zl3BbBhdnMkpSj2YY30qV3gDcVBGtFgVsV3+/i+mKQ=
+github.com/go-logfmt/logfmt v0.5.1 h1:otpy5pqBCBZ1ng9RQ0dPu4PN7ba75Y/aA+UpowDyNVA=
+github.com/go-logr/logr v0.2.0/go.mod h1:z6/tIYblkpsD+a4lm/fGIIU9mZ+XfAiaFtq7xTgseGU=
github.com/go-logr/logr v1.2.0/go.mod h1:jdQByPbusPIv2/zmleS9BjJVeZ6kBagPoEUsqbVz/1A=
github.com/go-logr/logr v1.2.2/go.mod h1:jdQByPbusPIv2/zmleS9BjJVeZ6kBagPoEUsqbVz/1A=
github.com/go-logr/logr v1.2.3/go.mod h1:jdQByPbusPIv2/zmleS9BjJVeZ6kBagPoEUsqbVz/1A=
github.com/go-logr/logr v1.2.4/go.mod h1:jdQByPbusPIv2/zmleS9BjJVeZ6kBagPoEUsqbVz/1A=
+github.com/go-logr/stdr v1.2.2 h1:hSWxHoqTgW2S2qGc0LTAI563KZ5YKYRhT3MFKZMbjag=
github.com/go-logr/stdr v1.2.2/go.mod h1:mMo/vtBO5dYbehREoey6XUKy/eSumjCCveDpRre4VKE=
+github.com/go-openapi/jsonpointer v0.19.6/go.mod h1:osyAmYz/mB/C3I+WsTTSgw1ONzaLJoLCyoi6/zppojs=
github.com/go-openapi/jsonreference v0.20.1/go.mod h1:Bl1zwGIM8/wsvqjsOQLJ/SH+En5Ap4rVB5KVcIDZG2k=
+github.com/go-openapi/jsonreference v0.20.2/go.mod h1:Bl1zwGIM8/wsvqjsOQLJ/SH+En5Ap4rVB5KVcIDZG2k=
+github.com/go-openapi/swag v0.22.3/go.mod h1:UzaqsxGiab7freDnrUUra0MwWfN/q7tE4j+VcZ0yl14=
github.com/go-openapi/swag v0.22.5/go.mod h1:Gl91UqO+btAM0plGGxHqJcQZ1ZTy6jbmridBTsDy8A0=
github.com/go-openapi/swag v0.22.6/go.mod h1:Gl91UqO+btAM0plGGxHqJcQZ1ZTy6jbmridBTsDy8A0=
+github.com/go-pdf/fpdf v0.6.0 h1:MlgtGIfsdMEEQJr2le6b/HNr1ZlQwxyWr77r2aj2U/8=
+github.com/go-playground/locales v0.14.1 h1:EWaQ/wswjilfKLTECiXz7Rh+3BjFhfDFKv/oXslEjJA=
github.com/go-playground/locales v0.14.1/go.mod h1:hxrqLVvrK65+Rwrd5Fc6F2O76J/NuW9t0sjnWqG1slY=
+github.com/go-playground/universal-translator v0.18.1 h1:Bcnm0ZwsGyWbCzImXv+pAJnYK9S473LQFuzCbDbfSFY=
github.com/go-playground/universal-translator v0.18.1/go.mod h1:xekY+UJKNuX9WP91TpwSH2VMlDf28Uj24BCp08ZFTUY=
+github.com/go-playground/validator/v10 v10.14.0 h1:vgvQWe3XCz3gIeFDm/HnTIbj6UGmg/+t63MyGU2n5js=
github.com/go-playground/validator/v10 v10.14.0/go.mod h1:9iXMNT7sEkjXb0I+enO7QXmzG6QCsPWY4zveKFVRSyU=
+github.com/go-stack/stack v1.8.0 h1:5SgMzNM5HxrEjV0ww2lTmX6E2Izsfxas4+YHWRs3Lsk=
+github.com/gobwas/httphead v0.1.0 h1:exrUm0f4YX0L7EBwZHuCF4GDp8aJfVeBrlLQrs6NqWU=
github.com/gobwas/httphead v0.1.0/go.mod h1:O/RXo79gxV8G+RqlR/otEwx4Q36zl9rqC5u12GKvMCM=
+github.com/gobwas/pool v0.2.1 h1:xfeeEhW7pwmX8nuLVlqbzVc7udMDrwetjEv+TZIz1og=
github.com/gobwas/pool v0.2.1/go.mod h1:q8bcK0KcYlCgd9e7WYLm9LpyS+YeLd8JVDW6WezmKEw=
+github.com/gobwas/ws v1.2.1 h1:F2aeBZrm2NDsc7vbovKrWSogd4wvfAxg0FQ89/iqOTk=
github.com/gobwas/ws v1.2.1/go.mod h1:hRKAFb8wOxFROYNsT1bqfWnhX+b5MFeJM9r2ZSwg/KY=
-github.com/goccy/go-json v0.9.11/go.mod h1:6MelG93GURQebXPDq3khkgXZkazVtN9CRI+MGFi0w8I=
+github.com/goccy/go-json v0.10.2 h1:CrxCmQqYDkv1z7lO7Wbh2HN93uovUHgrECaO5ZrCXAU=
github.com/goccy/go-json v0.10.2/go.mod h1:6MelG93GURQebXPDq3khkgXZkazVtN9CRI+MGFi0w8I=
+github.com/golang-jwt/jwt/v4 v4.5.0 h1:7cYmW1XlMY7h7ii7UhUyChSgS5wUJEnm9uZVTGqOWzg=
github.com/golang-jwt/jwt/v4 v4.5.0/go.mod h1:m21LjoU+eqJr34lmDMbreY2eSTRJ1cv77w39/MY0Ch0=
-github.com/golang/glog v1.1.0/go.mod h1:pfYeQZ3JWZoXTV5sFc986z3HTpwQs9At6P4ImfuP3NQ=
+github.com/golang/freetype v0.0.0-20170609003504-e2365dfdc4a0 h1:DACJavvAHhabrF08vX0COfcOBJRhZ8lUbR+ZWIs0Y5g=
github.com/golang/glog v1.1.2/go.mod h1:zR+okUeTbrL6EL3xHUDxZuEtGv04p5shwip1+mL/rLQ=
+github.com/golang/glog v1.2.0 h1:uCdmnmatrKCgMBlM4rMuJZWOkPDqdbZPnrMXDY4gI68=
github.com/golang/glog v1.2.0/go.mod h1:6AhwSGph0fcJtXVM/PEHPqZlFeoLxhs7/t5UDAwmO+w=
-github.com/golang/protobuf v1.5.3/go.mod h1:XVQd3VNwM+JqD3oG2Ue2ip4fOMUkwXdXDdiuN0vRsmY=
-github.com/golang/snappy v0.0.3/go.mod h1:/XxbfmMg8lxefKM7IXC3fBNl/7bRcc72aCRzEWrmP2Q=
-github.com/golang/snappy v0.0.4/go.mod h1:/XxbfmMg8lxefKM7IXC3fBNl/7bRcc72aCRzEWrmP2Q=
+github.com/golang/mock v1.6.0 h1:ErTB+efbowRARo13NNdxyJji2egdxLGQhRaY+DUumQc=
+github.com/golang/snappy v0.0.4 h1:yAGX7huGHXlcLOEtBnF4w7FQwA26wojNCwOYAEhLjQM=
+github.com/google/btree v1.0.1/go.mod h1:xXMiIv4Fb/0kKde4SpL7qlzvu5cMJDRkFDxJfI9uaxA=
github.com/google/cel-go v0.17.7/go.mod h1:HXZKzB0LXqer5lHHgfWAnlYwJaQBDKMjxjulNQzhwhY=
-github.com/google/flatbuffers v2.0.8+incompatible/go.mod h1:1AeVuKshWv4vARoZatz6mlQ0JxURH0Kv5+zNeJKJCa8=
-github.com/google/go-cmp v0.5.3/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
+github.com/google/cel-go v0.17.8 h1:j9m730pMZt1Fc4oKhCLUHfjj6527LuhYcYw0Rl8gqto=
+github.com/google/cel-go v0.17.8/go.mod h1:HXZKzB0LXqer5lHHgfWAnlYwJaQBDKMjxjulNQzhwhY=
+github.com/google/flatbuffers v2.0.8+incompatible h1:ivUb1cGomAB101ZM1T0nOiWz9pSrTMoa9+EiY7igmkM=
github.com/google/go-pkcs11 v0.2.1-0.20230907215043-c6f79328ddf9/go.mod h1:6eQoGcuNJpa7jnd5pMGdkSaQpNDYvPlXWMcjXXThLlY=
-github.com/google/martian/v3 v3.1.0/go.mod h1:y5Zk1BBys9G+gd6Jrk0W3cC1+ELVxBWuIGO+w/tUAp0=
-github.com/google/martian/v3 v3.3.2/go.mod h1:oBOf6HBosgwRXnUGWUB05QECsc6uvmMiJ3+6W4l/CUk=
-github.com/google/pprof v0.0.0-20201023163331-3e6fc7fc9c4c/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
-github.com/google/pprof v0.0.0-20201203190320-1bf35d6f28c2/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
-github.com/google/pprof v0.0.0-20201218002935-b9804c9f04c2/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
+github.com/google/gofuzz v1.1.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
+github.com/google/martian v2.1.0+incompatible h1:/CP5g8u/VJHijgedC/Legn3BAbAaWPgecwXBIDzw5no=
+github.com/google/martian/v3 v3.3.2 h1:IqNFLAmvJOgVlpdEBiQbDc2EwKW77amAycfTuWKdfvw=
github.com/google/pprof v0.0.0-20210407192527-94a9f03dee38/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
-github.com/google/s2a-go v0.1.4/go.mod h1:Ej+mSEMGRnqRzjc7VtF+jdBwYG5fuJfiZ8ELkjEwM0A=
+github.com/google/renameio v0.1.0 h1:GOZbcHa3HfsPKPlmyPyN2KEohoMXOhdMbHrvbpl2QaA=
+github.com/google/s2a-go v0.1.4 h1:1kZ/sQM3srePvKs3tXAvQzo66XfcReoqFpIpIccE7Oc=
github.com/google/s2a-go v0.1.7/go.mod h1:50CgR4k1jNlWBu4UfS4AcfhVe1r6pdZPygJ3R8F0Qdw=
-github.com/google/uuid v1.1.2/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
github.com/google/uuid v1.5.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
-github.com/googleapis/enterprise-certificate-proxy v0.2.3/go.mod h1:AwSRAtLfXpU5Nm3pW+v7rGDHp09LsPtGY9MduiEsR9k=
+github.com/googleapis/enterprise-certificate-proxy v0.2.3 h1:yk9/cqRKtT9wXZSsRH9aurXEpJX+U6FLtpYTdC3R06k=
github.com/googleapis/enterprise-certificate-proxy v0.2.4/go.mod h1:AwSRAtLfXpU5Nm3pW+v7rGDHp09LsPtGY9MduiEsR9k=
github.com/googleapis/enterprise-certificate-proxy v0.3.2/go.mod h1:VLSiSSBs/ksPL8kq3OBOQ6WRI2QnaFynd1DCjZ62+V0=
-github.com/googleapis/gax-go/v2 v2.10.0/go.mod h1:4UOEnMCrxsSqQ940WnTiD6qJ63le2ev3xfyagutxiPw=
-github.com/googleapis/gax-go/v2 v2.11.0/go.mod h1:DxmR61SGKkGLa2xigwuZIQpkCI2S5iydzRfb3peWZJI=
+github.com/googleapis/gax-go/v2 v2.11.0 h1:9V9PWXEsWnPpQhu/PeQIkS4eGzMlTLGgt80cUUI8Ki4=
github.com/googleapis/gax-go/v2 v2.12.0/go.mod h1:y+aIqrI5eb1YGMVJfuV3185Ts/D7qKpsEkdD5+I6QGU=
-github.com/googleapis/google-cloud-go-testing v0.0.0-20200911160855-bcd43fbb19e8/go.mod h1:dvDLG8qkwmyD9a/MJJN3XJcT3xFxOKAvTZGvuZmac9g=
+github.com/googleapis/go-type-adapters v1.0.0 h1:9XdMn+d/G57qq1s8dNc5IesGCXHf6V2HZ2JwRxfA2tA=
+github.com/googleapis/google-cloud-go-testing v0.0.0-20200911160855-bcd43fbb19e8 h1:tlyzajkF3030q6M8SvmJSemC9DTHL/xaMa18b65+JM4=
+github.com/gorilla/websocket v1.4.2/go.mod h1:YR8l580nyteQvAITg2hZ9XVh4b55+EU/adAjf1fMHhE=
+github.com/gorilla/websocket v1.5.0 h1:PPwGk2jz7EePpoHN/+ClbZu8SPxiqlu12wZP/3sWmnc=
github.com/gorilla/websocket v1.5.0/go.mod h1:YR8l580nyteQvAITg2hZ9XVh4b55+EU/adAjf1fMHhE=
+github.com/gregjones/httpcache v0.0.0-20180305231024-9cad4c3443a7/go.mod h1:FecbI9+v66THATjSRHfNgh1IVFe/9kFxbXtjV0ctIMA=
+github.com/grpc-ecosystem/go-grpc-middleware v1.3.0 h1:+9834+KizmvFV7pXQGSXQTsaWhq2GjuNUt0aUU0YBYw=
github.com/grpc-ecosystem/go-grpc-middleware v1.3.0/go.mod h1:z0ButlSOZa5vEBq9m2m2hlwIgKw+rp3sdCBRoJY+30Y=
+github.com/grpc-ecosystem/go-grpc-prometheus v1.2.0 h1:Ovs26xHkKqVztRpIrF/92BcuyuQ/YW4NSIpoGtfXNho=
github.com/grpc-ecosystem/go-grpc-prometheus v1.2.0/go.mod h1:8NvIoxWQoOIhqOTXgfV/d3M/q6VIi02HzZEHgUlZvzk=
-github.com/grpc-ecosystem/grpc-gateway v1.16.0/go.mod h1:BDjrQk3hbvj6Nolgz8mAMFbcEtjT1g+wF4CSlocrBnw=
+github.com/grpc-ecosystem/grpc-gateway v1.16.0 h1:gmcG1KaJ57LophUzW0Hy8NmPhnMZb4M0+kPpLofRdBo=
+github.com/grpc-ecosystem/grpc-gateway/v2 v2.16.0 h1:YBftPWNWd4WwGqtY2yeZL2ef8rHAxPBD8KFhJpmcqms=
github.com/grpc-ecosystem/grpc-gateway/v2 v2.16.0/go.mod h1:YN5jB8ie0yfIUg6VvR9Kz84aCaG7AsGZnLjhHbUqwPg=
+github.com/hashicorp/golang-lru v0.5.1 h1:0hERBMJE1eitiLkihrMvRVBYAkpHzc/J3QdDN+dAcgU=
+github.com/hpcloud/tail v1.0.0 h1:nfCOvKYfkgYP8hkirhJocXT2+zOD8yUNjXaWfTlyFKI=
+github.com/iancoleman/strcase v0.2.0 h1:05I4QRnGpI0m37iZQRuskXh+w77mr6Z41lwQzuHLwW0=
github.com/iancoleman/strcase v0.3.0/go.mod h1:iwCmte+B7n89clKwxIoIXy/HfoL7AsD47ZCWhYzw7ho=
-github.com/ianlancetaylor/demangle v0.0.0-20200824232613-28f6c0f3b639/go.mod h1:aSSvb/t6k1mPoxDqO4vJh6VOCGPwU4O0C2/Eqndh1Sc=
github.com/ianlancetaylor/demangle v0.0.0-20230524184225-eabc099b10ab/go.mod h1:gx7rwoVhcfuVKG5uya9Hs3Sxj7EIvldVofAWIUtGouw=
+github.com/ianlancetaylor/demangle v0.0.0-20240312041847-bd984b5ce465 h1:KwWnWVWCNtNq/ewIX7HIKnELmEx2nDP42yskD/pi7QE=
+github.com/ianlancetaylor/demangle v0.0.0-20240312041847-bd984b5ce465/go.mod h1:gx7rwoVhcfuVKG5uya9Hs3Sxj7EIvldVofAWIUtGouw=
+github.com/imdario/mergo v0.3.6/go.mod h1:2EnlNZ0deacrJVfApfmtdGgDfMuh/nq6Ok1EcJh5FfA=
github.com/imdario/mergo v0.3.13 h1:lFzP57bqS/wsqKssCGmtLAb8A0wKjLGrve2q3PPVcBk=
+github.com/jessevdk/go-flags v1.4.0 h1:4IU2WS7AumrZ/40jfhf4QVDMsQwqA7VEHozFRrGARJA=
github.com/jessevdk/go-flags v1.4.0/go.mod h1:4FA24M0QyGHXBuZZK/XkWh8h0e1EYbRYJSGM75WSRxI=
+github.com/jonboulle/clockwork v0.2.2 h1:UOGuzwb1PwsrDAObMuhUnj0p5ULPj8V/xJ7Kx9qUBdQ=
github.com/jonboulle/clockwork v0.2.2/go.mod h1:Pkfl5aHPm1nk2H9h0bjmnJD/BcgbGXUBGnn1kMkgxc8=
-github.com/klauspost/asmfmt v1.3.2/go.mod h1:AG8TuvYojzulgDAMCnYn50l/5QV3Bs/tp6j0HLHbNSE=
-github.com/klauspost/compress v1.15.9/go.mod h1:PhcZ0MbTNciWF3rruxRgKxI5NkcHHrHUDtV4Yw2GlzU=
+github.com/jpillora/backoff v1.0.0 h1:uvFg412JmmHBHw7iwprIxkPMI+sGQ4kzOWsMeHnm2EA=
+github.com/jstemmer/go-junit-report v0.9.1 h1:6QPYqodiu3GuPL+7mfx+NwDdp2eTkp9IfEUpgAwUN0o=
+github.com/julienschmidt/httprouter v1.3.0 h1:U0609e9tgbseu3rBINet9P48AI/D3oJs4dN7jwJOQ1U=
+github.com/jung-kurt/gofpdf v1.0.3-0.20190309125859-24315acbbda5 h1:PJr+ZMXIecYc1Ey2zucXdR73SMBtgjPgwa31099IMv0=
+github.com/kballard/go-shellquote v0.0.0-20180428030007-95032a82bc51 h1:Z9n2FFNUXsshfwJMBgNA0RU6/i7WVaAegv3PtuIHPMs=
+github.com/kisielk/errcheck v1.5.0 h1:e8esj/e4R+SAOwFwN+n3zr0nYeCyeweozKfO23MvHzY=
+github.com/kisielk/gotool v1.0.0 h1:AV2c/EiW3KqPNT9ZKl07ehoAGi4C5/01Cfbblndcapg=
+github.com/klauspost/asmfmt v1.3.2 h1:4Ri7ox3EwapiOjCki+hw14RyKk201CN4rzyCJRFLpK4=
+github.com/klauspost/compress v1.15.9 h1:wKRjX6JRtDdrE9qwa4b/Cip7ACOshUI4smpCQanqjSY=
github.com/klauspost/compress v1.16.7/go.mod h1:ntbaceVETuRiXiv4DpjP66DpAtAGkEQskQzEyD//IeE=
-github.com/klauspost/cpuid/v2 v2.0.9/go.mod h1:FInQzS24/EEf25PyTYn52gqo7WaD8xa0213Md/qVLRg=
+github.com/klauspost/cpuid/v2 v2.2.4 h1:acbojRNwl3o09bUq+yDCtZFc1aiwaAAxtcn8YkZXnvk=
github.com/klauspost/cpuid/v2 v2.2.4/go.mod h1:RVVoqg1df56z8g3pUjL/3lE5UfnlrJX8tyFgg4nqhuY=
github.com/klauspost/cpuid/v2 v2.2.5/go.mod h1:Lcz8mBdAVJIBVzewtcLocK12l3Y+JytZYpaMropDUws=
-github.com/kr/fs v0.1.0/go.mod h1:FFnZGqtBN9Gxj7eW1uZ42v5BccTP0vu6NEaFoC2HwRg=
+github.com/konsorten/go-windows-terminal-sequences v1.0.3 h1:CE8S1cTafDpPvMhIxNJKvHsGVBgn1xWYf1NbHQhywc8=
+github.com/kr/fs v0.1.0 h1:Jskdu9ieNAYnjxsi0LbQp1ulIKZV1LAFgK1tWhpZgl8=
+github.com/kr/logfmt v0.0.0-20140226030751-b84e30acd515 h1:T+h1c/A9Gawja4Y9mFVWj2vyii2bbUNDw3kt9VxK2EY=
+github.com/kr/pty v1.1.1 h1:VkoXIwSboBpnk99O/KFauAEILuNHv5DVFKZMBN/gUgw=
+github.com/labstack/echo/v4 v4.10.2 h1:n1jAhnq/elIFTHr1EYpiYtyKgx4RW9ccVgkqByZaN2M=
github.com/labstack/echo/v4 v4.10.2/go.mod h1:OEyqf2//K1DFdE57vw2DRgWY0M7s65IVQO2FzvI4J5k=
+github.com/labstack/gommon v0.4.0 h1:y7cvthEAEbU0yHOf4axH8ZG2NH8knB9iNSoTO8dyIk8=
github.com/labstack/gommon v0.4.0/go.mod h1:uW6kP17uPlLJsD3ijUYn3/M5bAxtlZhMI6m3MFxTMTM=
+github.com/ledongthuc/pdf v0.0.0-20220302134840-0c2507a12d80 h1:6Yzfa6GP0rIo/kULo2bwGEkFvCePZ3qHDDTC3/J9Swo=
github.com/ledongthuc/pdf v0.0.0-20220302134840-0c2507a12d80/go.mod h1:imJHygn/1yfhB7XSJJKlFZKl/J+dCPAknuiaGOshXAs=
+github.com/leodido/go-urn v1.2.4 h1:XlAE/cm/ms7TE/VMVoduSpNBoyc2dOxHs5MZSwAN63Q=
github.com/leodido/go-urn v1.2.4/go.mod h1:7ZrI8mTSeBSHl/UaRyKQW1qZeMgak41ANeCNaVckg+4=
+github.com/lyft/protoc-gen-star v0.6.1 h1:erE0rdztuaDq3bpGifD95wfoPrSZc95nGA6tbiNYh6M=
+github.com/lyft/protoc-gen-star/v2 v2.0.1 h1:keaAo8hRuAT0O3DfJ/wM3rufbAjGeJ1lAtWZHDjKGB0=
github.com/lyft/protoc-gen-star/v2 v2.0.3/go.mod h1:amey7yeodaJhXSbf/TlLvWiqQfLOSpEk//mLlc+axEk=
-github.com/matttproud/golang_protobuf_extensions v1.0.4/go.mod h1:BSXmuO+STAnVfrANrmjBb36TMTDstsz7MSK+HVaYKv4=
-github.com/matttproud/golang_protobuf_extensions/v2 v2.0.0/go.mod h1:QUyp042oQthUoa9bqDv0ER0wrtXnBruoNd7aNjkbP+k=
-github.com/minio/asm2plan9s v0.0.0-20200509001527-cdd76441f9d8/go.mod h1:mC1jAcsrzbxHt8iiaC+zU4b1ylILSosueou12R++wfY=
-github.com/minio/c2goasm v0.0.0-20190812172519-36a3d3bbc4f3/go.mod h1:RagcQ7I8IeTMnF8JTXieKnO4Z6JCsikNEzj0DwauVzE=
+github.com/mattn/go-sqlite3 v1.14.14 h1:qZgc/Rwetq+MtyE18WhzjokPD93dNqLGNT3QJuLvBGw=
+github.com/matttproud/golang_protobuf_extensions v1.0.4 h1:mmDVorXM7PCGKw94cs5zkfA9PSy5pEvNWRP0ET0TIVo=
+github.com/matttproud/golang_protobuf_extensions/v2 v2.0.0 h1:jWpvCLoY8Z/e3VKvlsiIGKtc+UG6U5vzxaoagmhXfyg=
+github.com/minio/asm2plan9s v0.0.0-20200509001527-cdd76441f9d8 h1:AMFGa4R4MiIpspGNG7Z948v4n35fFGB3RR3G/ry4FWs=
+github.com/minio/c2goasm v0.0.0-20190812172519-36a3d3bbc4f3 h1:+n/aFZefKZp7spd8DFdX7uMikMLXX4oubIzJF4kv/wI=
+github.com/moby/spdystream v0.2.0 h1:cjW1zVyyoiM0T7b6UoySUFqzXMoqRckQtXwGPiBhOM8=
github.com/moby/spdystream v0.2.0/go.mod h1:f7i0iNDQJ059oMTcWxx8MA/zKFIuD/lY+0GqbN2Wy8c=
+github.com/mrunalp/fileutils v0.5.1 h1:F+S7ZlNKnrwHfSwdlgNSkKo67ReVf8o9fel6C3dkm/Q=
github.com/mrunalp/fileutils v0.5.1/go.mod h1:M1WthSahJixYnrXQl/DFQuteStB1weuxD2QJNHXfbSQ=
github.com/munnerz/goautoneg v0.0.0-20120707110453-a547fc61f48d/go.mod h1:+n7T8mK8HuQTcFwEeznm/DIxMOiR9yIdICNftLE1DvQ=
+github.com/mwitkow/go-conntrack v0.0.0-20190716064945-2f068394615f h1:KUppIJq7/+SVif2QVs3tOP0zanoHgBEVAwHxUSIzRqU=
+github.com/mxk/go-flowrate v0.0.0-20140419014527-cca7078d478f h1:y5//uYreIhSUg3J1GEMiLbxo1LJaP8RfCpH6pymGZus=
github.com/mxk/go-flowrate v0.0.0-20140419014527-cca7078d478f/go.mod h1:ZdcZmHo+o7JKHSa8/e818NopupXU1YMK5fe1lsApnBw=
+github.com/ncabatoff/fakescraper v0.0.0-20201102132415-4b37ba603d65 h1:Og+dVkxEQNvRGU2vUKeOwYT2UJ+pEaDMWB6tIQnIh6A=
github.com/onsi/ginkgo/v2 v2.1.4/go.mod h1:um6tUpWM/cxCK3/FK8BXqEiUMUwRgSM4JXG47RKZmLU=
+github.com/onsi/ginkgo/v2 v2.15.0/go.mod h1:HlxMHtYF57y6Dpf+mc5529KKmSq9h2FpCF+/ZkwUxKM=
github.com/onsi/gomega v1.19.0/go.mod h1:LY+I3pBVzYsTBU1AnDwOSxaYi9WoWiqgwooUqq9yPro=
+github.com/onsi/gomega v1.31.0/go.mod h1:DW9aCi7U6Yi40wNVAvT6kzFnEVEI5n3DloYBiKiT6zk=
+github.com/onsi/gomega v1.33.0/go.mod h1:+925n5YtiFsLzzafLUHzVMBpvvRAzrydIBiSIxjX3wY=
+github.com/opencontainers/selinux v1.10.0 h1:rAiKF8hTcgLI3w0DHm6i0ylVVcOrlgR1kK99DRLDhyU=
github.com/opencontainers/selinux v1.10.0/go.mod h1:2i0OySw99QjzBBQByd1Gr9gSjvuho1lHsJxIJ3gGbJI=
+github.com/orisano/pixelmatch v0.0.0-20220722002657-fb0b55479cde h1:x0TT0RDC7UhAVbbWWBzr41ElhJx5tXPWkIHA2HWPRuw=
github.com/orisano/pixelmatch v0.0.0-20220722002657-fb0b55479cde/go.mod h1:nZgzbfBr3hhjoZnS66nKrHmduYNpc34ny7RK4z5/HM0=
+github.com/pelletier/go-toml/v2 v2.0.8 h1:0ctb6s9mE31h0/lhu+J6OPmVeDxJn+kYnJc2jZR9tGQ=
github.com/pelletier/go-toml/v2 v2.0.8/go.mod h1:vuYfssBdrU2XDZ9bYydBu6t+6a6PYNcZljzZR9VXg+4=
-github.com/pierrec/lz4/v4 v4.1.15/go.mod h1:gZWDp/Ze/IJXGXf23ltt2EXimqmTUXEy0GFuRQyBid4=
-github.com/pkg/sftp v1.13.1/go.mod h1:3HaPG6Dq1ILlpPZRO0HVMrsydcdLt6HRDccSgb87qRg=
+github.com/phpdave11/gofpdf v1.4.2 h1:KPKiIbfwbvC/wOncwhrpRdXVj2CZTCFlw4wnoyjtHfQ=
+github.com/phpdave11/gofpdi v1.0.13 h1:o61duiW8M9sMlkVXWlvP92sZJtGKENvW3VExs6dZukQ=
+github.com/pierrec/lz4/v4 v4.1.15 h1:MO0/ucJhngq7299dKLwIMtgTfbkoSPF6AoMYDd8Q4q0=
+github.com/pkg/diff v0.0.0-20210226163009-20ebb0f2a09e h1:aoZm08cpOy4WuID//EZDgcC4zIxODThtZNPirFr42+A=
+github.com/pkg/sftp v1.13.1 h1:I2qBYMChEhIjOgazfJmV3/mZM256btk6wkCDRmW7JYs=
+github.com/pquerna/cachecontrol v0.1.0 h1:yJMy84ti9h/+OEWa752kBTKv4XC30OtVVHYv/8cTqKc=
github.com/pquerna/cachecontrol v0.1.0/go.mod h1:NrUG3Z7Rdu85UNR3vm7SOsl1nFIeSiQnrHV5K9mBcUI=
-github.com/prometheus/client_model v0.5.0/go.mod h1:dTiFglRmd66nLR9Pv9f0mZi7B7fk5Pm3gvsjB5tr+kI=
-github.com/prometheus/common v0.45.0/go.mod h1:YJmSTw9BoKxJplESWWxlbyttQR4uaEcGyv9MZjVOJsY=
-github.com/rogpeppe/go-internal v1.9.0/go.mod h1:WtVeX8xhTBvf0smdhujwtBcq4Qrzq/fJaraNFVN+nFs=
+github.com/prometheus/exporter-toolkit v0.11.0 h1:yNTsuZ0aNCNFQ3aFTD2uhPOvr4iD7fdBvKPAEGkNf+g=
+github.com/prometheus/procfs v0.13.0 h1:GqzLlQyfsPbaEHaQkO7tbDlriv/4o5Hudv6OXHGKX7o=
+github.com/remyoudompheng/bigfft v0.0.0-20200410134404-eec4a21b6bb0 h1:OdAsTTz6OkFY5QxjkYwrChwuRruF69c169dPK26NUlk=
+github.com/rogpeppe/fastuuid v1.2.0 h1:Ppwyp6VYCF1nvBTXL3trRso7mXMlRrw9ooo375wvi2s=
+github.com/russross/blackfriday/v2 v2.1.0 h1:JIOH55/0cWyOuilr9/qlrm0BSXldqnqwMsf35Ld67mk=
+github.com/ruudk/golang-pdf417 v0.0.0-20201230142125-a7e3863a1245 h1:K1Xf3bKttbF+koVGaX5xngRIZ5bVjbmPnaxE/dR08uY=
+github.com/seccomp/libseccomp-golang v0.9.2-0.20220502022130-f33da4d89646 h1:RpforrEYXWkmGwJHIGnLZ3tTWStkjVVstwzNGqxX2Ds=
github.com/seccomp/libseccomp-golang v0.9.2-0.20220502022130-f33da4d89646/go.mod h1:JA8cRccbGaA1s33RQf7Y1+q9gHmZX1yB/z9WDN1C6fg=
+github.com/shurcooL/sanitized_anchor_name v1.0.0 h1:PdmoCO6wvbs+7yrJyMORt4/BmY5IYyJwS/kOiWx8mHo=
github.com/shurcooL/sanitized_anchor_name v1.0.0/go.mod h1:1NzhyTcUVG4SuEtjjoZeVRXNmyL/1OwPU0+IJeTBvfc=
+github.com/soheilhy/cmux v0.1.5 h1:jjzc5WVemNEDTLwv9tlmemhC73tI08BNOIGwBOo10Js=
github.com/soheilhy/cmux v0.1.5/go.mod h1:T7TcVDs9LWfQgPlPsdngu6I6QIoyIFZDDC6sNE1GqG0=
+github.com/spaolacci/murmur3 v0.0.0-20180118202830-f09979ecbc72 h1:qLC7fQah7D6K1B0ujays3HV9gkFtllcxhzImRR7ArPQ=
+github.com/spf13/afero v1.9.2 h1:j49Hj62F0n+DaZ1dDCvhABaPNSGNkt32oRFxI33IEMw=
github.com/spf13/afero v1.10.0/go.mod h1:UBogFpq8E9Hx+xc5CNTTEpTnuHVmXDwZcZcE1eb/UhQ=
+github.com/stoewer/go-strcase v1.2.0 h1:Z2iHWqGXH00XYgqDmNgQbIBxf3wrNq0F3feEy0ainaU=
github.com/stoewer/go-strcase v1.2.0/go.mod h1:IBiWB2sKIp3wVVQ3Y035++gc+knqhUQag1KpM8ahLw8=
-github.com/stretchr/objx v0.4.0/go.mod h1:YvHI0jy2hoMjB+UWwv71VJQ9isScKT/TqJzVSSt89Yw=
-github.com/stretchr/objx v0.5.0/go.mod h1:Yh+to48EsGEfYuaHDzXPcE3xhTkx73EhmCGUpEOglKo=
-github.com/stretchr/testify v1.7.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
-github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO+kdMU+MU=
-github.com/stretchr/testify v1.8.1/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=
+github.com/stretchr/testify v1.8.4/go.mod h1:sz/lmYIOXD/1dqDmKjjqLyZ2RngseejIcXlSw2iwfAo=
+github.com/syndtr/gocapability v0.0.0-20200815063812-42c35b437635 h1:kdXcSzyDtseVEc4yCz2qF8ZrQvIDBJLl4S1c3GCXmoI=
github.com/syndtr/gocapability v0.0.0-20200815063812-42c35b437635/go.mod h1:hkRG7XYTFWNJGYcbNJQlaLq0fg1yr4J4t/NcTQtrfww=
+github.com/tmc/grpc-websocket-proxy v0.0.0-20220101234140-673ab2c3ae75 h1:6fotK7otjonDflCTK0BCfls4SPy3NcCVb5dqqmbRknE=
github.com/tmc/grpc-websocket-proxy v0.0.0-20220101234140-673ab2c3ae75/go.mod h1:KO6IkyS8Y3j8OdNO85qEYBsRPuteD+YciPomcXdrMnk=
+github.com/twitchyliquid64/golang-asm v0.15.1 h1:SU5vSMR7hnwNxj24w34ZyCi/FmDZTkS4MhqMhdFk5YI=
github.com/twitchyliquid64/golang-asm v0.15.1/go.mod h1:a1lVb/DtPvCB8fslRZhAngC2+aY1QWCk3Cedj/Gdt08=
+github.com/ugorji/go/codec v1.2.11 h1:BMaWp1Bb6fHwEtbplGBGJ498wD+LKlNSl25MjdZY4dU=
github.com/ugorji/go/codec v1.2.11/go.mod h1:UNopzCgEMSXjBc6AOMqYvWC1ktqTAfzJZUZgYf6w6lg=
+github.com/urfave/cli v1.22.1 h1:+mkCCcOFKPnCmVYVcURKps1Xe+3zP90gSYGNfRkjoIY=
github.com/urfave/cli v1.22.1/go.mod h1:Gos4lmkARVdJ6EkW0WaNv/tZAAMe9V7XWyB60NtXRu0=
+github.com/valyala/bytebufferpool v1.0.0 h1:GqA5TC/0021Y/b9FG4Oi9Mr3q7XYx6KllzawFIhcdPw=
github.com/valyala/bytebufferpool v1.0.0/go.mod h1:6bBcMArwyJ5K/AmCkWv1jt77kVWyCJ6HpOuEn7z0Csc=
+github.com/valyala/fasttemplate v1.2.2 h1:lxLXG0uE3Qnshl9QyaK6XJxMXlQZELvChBOCmQD0Loo=
github.com/valyala/fasttemplate v1.2.2/go.mod h1:KHLXt3tVN2HBp8eijSv/kGJopbvo7S+qRAEEKiv+SiQ=
+github.com/vishvananda/netlink v1.1.0 h1:1iyaYNBLmP6L0220aDnYQpo1QEV4t4hJ+xEEhhJH8j0=
github.com/vishvananda/netlink v1.1.0/go.mod h1:cTgwzPIzzgDAYoQrMm0EdrjRUBkTqKYppBueQtXaqoE=
+github.com/vishvananda/netns v0.0.0-20191106174202-0a2b9b5464df h1:OviZH7qLw/7ZovXvuNyL3XQl8UFofeikI1NW1Gypu7k=
github.com/vishvananda/netns v0.0.0-20191106174202-0a2b9b5464df/go.mod h1:JP3t17pCcGlemwknint6hfoeCVQrEMVwxRLRjXpq+BU=
-github.com/xhit/go-str2duration/v2 v2.1.0/go.mod h1:ohY8p+0f07DiV6Em5LKB0s2YpLtXVyJfNt1+BlmyAsU=
+github.com/x448/float16 v0.8.4 h1:qLwI1I70+NjRFUR3zs1JPUCgaCXSh3SW62uAKT1mSBM=
+github.com/x448/float16 v0.8.4/go.mod h1:14CWIYCyZA/cWjXOioeEpHeN/83MdbZDRQHoFcYsOfg=
+github.com/xhit/go-str2duration v1.2.0 h1:BcV5u025cITWxEQKGWr1URRzrcXtu7uk8+luz3Yuhwc=
+github.com/xhit/go-str2duration/v2 v2.1.0 h1:lxklc02Drh6ynqX+DdPyp5pCKLUQpRT8bp8Ydu2Bstc=
+github.com/xiang90/probing v0.0.0-20190116061207-43a291ad63a2 h1:eY9dn8+vbi4tKz5Qo6v2eYzo7kUS51QINcR5jNpbZS8=
github.com/xiang90/probing v0.0.0-20190116061207-43a291ad63a2/go.mod h1:UETIi67q53MR2AWcXfiuqkDkRtnGDLqkBTpCHuJHxtU=
-github.com/zeebo/xxh3 v1.0.2/go.mod h1:5NWz9Sef7zIDm2JHfFlcQvNekmcEl9ekUZQQKCYaDcA=
+github.com/yuin/goldmark v1.4.13 h1:fVcFKWvrslecOb/tg+Cc05dkeYx540o0FuFt3nUVDoE=
+github.com/zeebo/assert v1.3.0 h1:g7C04CbJuIDKNPFHmsk4hwZDO5O+kntRxzaUoNXj+IQ=
+github.com/zeebo/xxh3 v1.0.2 h1:xZmwmqxHZA8AI603jOQ0tMqmBr9lPeFwGg6d+xy9DC0=
+go.etcd.io/bbolt v1.3.8 h1:xs88BrvEv273UsB79e0hcVrlUWmS0a8upikMFhSyAtA=
go.etcd.io/bbolt v1.3.8/go.mod h1:N9Mkw9X8x5fupy0IKsmuqVtoGDyxsaDlbk4Rd05IAQw=
+go.etcd.io/etcd/api/v3 v3.5.10 h1:szRajuUUbLyppkhs9K6BRtjY37l66XQQmw7oZRANE4k=
go.etcd.io/etcd/api/v3 v3.5.10/go.mod h1:TidfmT4Uycad3NM/o25fG3J07odo4GBB9hoxaodFCtI=
+go.etcd.io/etcd/client/pkg/v3 v3.5.10 h1:kfYIdQftBnbAq8pUWFXfpuuxFSKzlmM5cSn76JByiT0=
go.etcd.io/etcd/client/pkg/v3 v3.5.10/go.mod h1:DYivfIviIuQ8+/lCq4vcxuseg2P2XbHygkKwFo9fc8U=
+go.etcd.io/etcd/client/v2 v2.305.10 h1:MrmRktzv/XF8CvtQt+P6wLUlURaNpSDJHFZhe//2QE4=
go.etcd.io/etcd/client/v2 v2.305.10/go.mod h1:m3CKZi69HzilhVqtPDcjhSGp+kA1OmbNn0qamH80xjA=
+go.etcd.io/etcd/client/v3 v3.5.10 h1:W9TXNZ+oB3MCd/8UjxHTWK5J9Nquw9fQBLJd5ne5/Ao=
go.etcd.io/etcd/client/v3 v3.5.10/go.mod h1:RVeBnDz2PUEZqTpgqwAtUd8nAPf5kjyFyND7P1VkOKc=
+go.etcd.io/etcd/pkg/v3 v3.5.10 h1:WPR8K0e9kWl1gAhB5A7gEa5ZBTNkT9NdNWrR8Qpo1CM=
go.etcd.io/etcd/pkg/v3 v3.5.10/go.mod h1:TKTuCKKcF1zxmfKWDkfz5qqYaE3JncKKZPFf8c1nFUs=
+go.etcd.io/etcd/raft/v3 v3.5.10 h1:cgNAYe7xrsrn/5kXMSaH8kM/Ky8mAdMqGOxyYwpP0LA=
go.etcd.io/etcd/raft/v3 v3.5.10/go.mod h1:odD6kr8XQXTy9oQnyMPBOr0TVe+gT0neQhElQ6jbGRc=
+go.etcd.io/etcd/server/v3 v3.5.10 h1:4NOGyOwD5sUZ22PiWYKmfxqoeh72z6EhYjNosKGLmZg=
go.etcd.io/etcd/server/v3 v3.5.10/go.mod h1:gBplPHfs6YI0L+RpGkTQO7buDbHv5HJGG/Bst0/zIPo=
-go.opencensus.io v0.22.5/go.mod h1:5pWMHQbX5EPX2/62yrJeAkowc+lfs/XD7Uxpq3pI6kk=
-go.opencensus.io v0.24.0/go.mod h1:vNK8G9p7aAivkbmorf4v+7Hgx+Zs0yY+0fOtgBfjQKo=
+go.opencensus.io v0.24.0 h1:y73uSU6J157QMP2kn2r30vwW1A2W2WFwSCGnAVxeaD0=
+go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.42.0 h1:ZOLJc06r4CB42laIXg/7udr0pbZyuAihN10A/XuiQRY=
go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.42.0/go.mod h1:5z+/ZWJQKXa9YT34fQNx5K8Hd1EoIhvtUygUQPqEOgQ=
go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.46.1/go.mod h1:4UoMYEZOC0yN/sPGH76KPkkU7zgiEWYWL9vwmbnTJPE=
go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.47.0/go.mod h1:r9vWsPS/3AQItv3OSlEJ/E4mbrhUbbw18meOjArPtKQ=
+go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.44.0 h1:KfYpVmrjI7JuToy5k8XV3nkapjWx48k4E4JOtVstzQI=
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.44.0/go.mod h1:SeQhzAEccGVZVEy7aH87Nh0km+utSpo1pTv6eMMop48=
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.46.1/go.mod h1:sEGXWArGqc3tVa+ekntsN65DmVbVeW+7lTKTjZF3/Fo=
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.47.0/go.mod h1:SK2UL73Zy1quvRPonmOmRDiWk1KBV3LyIeeIxcEApWw=
+go.opentelemetry.io/otel v1.19.0 h1:MuS/TNf4/j4IXsZuJegVzI1cwut7Qc00344rgH7p8bs=
go.opentelemetry.io/otel v1.19.0/go.mod h1:i0QyjOq3UPoTzff0PJB2N66fb4S0+rSbSB15/oyH9fY=
go.opentelemetry.io/otel v1.21.0/go.mod h1:QZzNPQPm1zLX4gZK4cMi+71eaorMSGT3A4znnUvNNEo=
go.opentelemetry.io/otel v1.22.0/go.mod h1:eoV4iAi3Ea8LkAEI9+GFT44O6T/D0GWAVFyZVCC6pMI=
+go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.19.0 h1:Mne5On7VWdx7omSrSSZvM4Kw7cS7NQkOOmLcgscI51U=
go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.19.0/go.mod h1:IPtUMKL4O3tH5y+iXVyAXqpAwMuzC1IrxVS81rummfE=
+go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.19.0 h1:3d+S281UTjM+AbF31XSOYn1qXn3BgIdWl8HNEpx08Jk=
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.19.0/go.mod h1:0+KuTDyKL4gjKCF75pHOX4wuzYDUZYfAQdSu43o+Z2I=
+go.opentelemetry.io/otel/metric v1.19.0 h1:aTzpGtV0ar9wlV4Sna9sdJyII5jTVJEvKETPiOKwvpE=
go.opentelemetry.io/otel/metric v1.19.0/go.mod h1:L5rUsV9kM1IxCj1MmSdS+JQAcVm319EUrDVLrt7jqt8=
go.opentelemetry.io/otel/metric v1.21.0/go.mod h1:o1p3CA8nNHW8j5yuQLdc1eeqEaPfzug24uvsyIEJRWM=
go.opentelemetry.io/otel/metric v1.22.0/go.mod h1:evJGjVpZv0mQ5QBRJoBF64yMuOf4xCWdXjK8pzFvliY=
+go.opentelemetry.io/otel/sdk v1.19.0 h1:6USY6zH+L8uMH8L3t1enZPR3WFEmSTADlqldyHtJi3o=
go.opentelemetry.io/otel/sdk v1.19.0/go.mod h1:NedEbbS4w3C6zElbLdPJKOpJQOrGUJ+GfzpjUvI0v1A=
go.opentelemetry.io/otel/sdk v1.21.0/go.mod h1:Nna6Yv7PWTdgJHVRD9hIYywQBRx7pbox6nwBnZIxl/E=
+go.opentelemetry.io/otel/trace v1.19.0 h1:DFVQmlVbfVeOuBRrwdtaehRrWiL1JoVs9CPIQ1Dzxpg=
go.opentelemetry.io/otel/trace v1.19.0/go.mod h1:mfaSyvGyEJEI0nyV2I4qhNQnbBOUUmYZpYojqMnX2vo=
go.opentelemetry.io/otel/trace v1.21.0/go.mod h1:LGbsEB0f9LGjN+OZaQQ26sohbOmiMR+BaslueVtS/qQ=
go.opentelemetry.io/otel/trace v1.22.0/go.mod h1:RbbHXVqKES9QhzZq/fE5UnOSILqRt40a21sPw2He1xo=
+go.opentelemetry.io/proto/otlp v1.0.0 h1:T0TX0tmXU8a3CbNXzEKGeU5mIVOdf0oykP+u2lIVU/I=
go.opentelemetry.io/proto/otlp v1.0.0/go.mod h1:Sy6pihPLfYHkr3NkUbEhGHFhINUSI/v80hjKIs5JXpM=
+go.uber.org/atomic v1.10.0 h1:9qC72Qh0+3MqyJbAn8YU5xVq1frD8bn3JtD2oXtafVQ=
go.uber.org/atomic v1.10.0/go.mod h1:LUxbIzbOniOlMKjJjyPfpl4v+PKK2cNJn91OQbhoJI0=
go.uber.org/goleak v1.2.0/go.mod h1:XJYK+MuIchqpmGmUSAzotztawfKvYLUIgg7guXrwVUo=
go.uber.org/multierr v1.10.0/go.mod h1:20+QtiLqy0Nd6FdQB9TLXag12DsQkrbs3htMFfDN80Y=
+golang.org/dl v0.0.0-20190829154251-82a15e2f2ead h1:jeP6FgaSLNTMP+Yri3qjlACywQLye+huGLmNGhBzm6k=
+golang.org/x/arch v0.3.0 h1:02VY4/ZcO/gBOH6PUaoiptASxtXU10jazRCP865E97k=
golang.org/x/arch v0.3.0/go.mod h1:5om86z9Hs0C8fWVUuoMHwpExlXzs5Tkyp9hOrfG7pp8=
-golang.org/x/crypto v0.0.0-20210421170649-83a5a9bb288b/go.mod h1:T9bdIzuCu7OtxOm1hfPfRQxPLYneinmdGuTeoZ9dtd4=
-golang.org/x/crypto v0.0.0-20220314234659-1baeb1ce4c0b/go.mod h1:IxCIyHEi3zRg3s0A5j5BB6A9Jmi73HwBIUl50j+osU4=
golang.org/x/crypto v0.0.0-20220722155217-630584e8d5aa/go.mod h1:IxCIyHEi3zRg3s0A5j5BB6A9Jmi73HwBIUl50j+osU4=
-golang.org/x/crypto v0.9.0/go.mod h1:yrmDGqONDYtNj3tH8X9dzUun2m2lzPa9ngI6/RUPGR0=
golang.org/x/crypto v0.12.0/go.mod h1:NF0Gs7EO5K4qLn+Ylc+fih8BSTeIjAP05siRnAh98yw=
-golang.org/x/crypto v0.13.0/go.mod h1:y6Z2r+Rw4iayiXXAIxJIDAJ1zMW4yaTpebo8fPOliYc=
-golang.org/x/crypto v0.14.0/go.mod h1:MVFd36DqK4CsrnJYDkBA3VC4m2GkXAM0PvzMCn4JQf4=
-golang.org/x/crypto v0.18.0/go.mod h1:R0j02AL6hcrfOiy9T4ZYp/rcWeMxM3L6QYxlOuEG1mg=
-golang.org/x/crypto v0.19.0/go.mod h1:Iy9bg/ha4yyC70EfRS8jz+B6ybOBKMaSxLj6P6oBDfU=
-golang.org/x/crypto v0.21.0/go.mod h1:0BP7YvVV9gBbVKyeTG0Gyn+gZm94bibOW5BjDEYAOMs=
-golang.org/x/lint v0.0.0-20201208152925-83fdc39ff7b5/go.mod h1:3xt1FjdF8hUf6vQPIChWIBhFzV8gjjsPE/fR3IyQdNY=
-golang.org/x/mod v0.4.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
-golang.org/x/mod v0.4.1/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
-golang.org/x/mod v0.7.0/go.mod h1:iBbtSCu2XBx23ZKBPSOrRkjjQPZFPuis4dIYUhu/chs=
-golang.org/x/mod v0.8.0/go.mod h1:iBbtSCu2XBx23ZKBPSOrRkjjQPZFPuis4dIYUhu/chs=
-golang.org/x/mod v0.9.0/go.mod h1:iBbtSCu2XBx23ZKBPSOrRkjjQPZFPuis4dIYUhu/chs=
+golang.org/x/image v0.0.0-20220302094943-723b81ca9867 h1:TcHcE0vrmgzNH1v3ppjcMGbhG5+9fMuvOmUYwNEF4q4=
+golang.org/x/lint v0.0.0-20210508222113-6edffad5e616 h1:VLliZ0d+/avPrXXH+OakdXhpJuEoBZuwh1m2j7U6Iug=
+golang.org/x/mobile v0.0.0-20190719004257-d2bd2a29d028 h1:4+4C/Iv2U4fMZBiMCc98MG1In4gJY5YRhtpDNeDeHWs=
golang.org/x/mod v0.12.0/go.mod h1:iBbtSCu2XBx23ZKBPSOrRkjjQPZFPuis4dIYUhu/chs=
-golang.org/x/net v0.0.0-20201031054903-ff519b6c9102/go.mod h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU=
-golang.org/x/net v0.0.0-20201110031124-69a78807bb2b/go.mod h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU=
-golang.org/x/net v0.0.0-20201209123823-ac852fbbde11/go.mod h1:m0MpNAwzfU5UDzcl9v0D8zg8gWTRqZa9RBIspLL5mdg=
-golang.org/x/net v0.0.0-20201224014010-6772e930b67b/go.mod h1:m0MpNAwzfU5UDzcl9v0D8zg8gWTRqZa9RBIspLL5mdg=
-golang.org/x/net v0.0.0-20211112202133-69e39bad7dc2/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
-golang.org/x/net v0.7.0/go.mod h1:2Tu9+aMcznHK/AK1HMvgo6xiTLG5rD5rZLDS+rp2Bjs=
-golang.org/x/net v0.10.0/go.mod h1:0qNGK6F8kojg2nk9dLZ2mShWaEBan6FAoqfSigmmuDg=
+golang.org/x/mod v0.14.0/go.mod h1:hTbmBsO62+eylJbnUtE2MGJUyE7QWk4xUqPFrRgJ+7c=
golang.org/x/net v0.14.0/go.mod h1:PpSgVXXLK0OxS0F31C1/tv6XNguvCrnXIDrFMspZIUI=
golang.org/x/net v0.16.0/go.mod h1:NxSsAGuq816PNPmqtQdLE42eU2Fs7NoRIZrHJAlaCOE=
-golang.org/x/net v0.17.0/go.mod h1:NxSsAGuq816PNPmqtQdLE42eU2Fs7NoRIZrHJAlaCOE=
golang.org/x/net v0.18.0/go.mod h1:/czyP5RqHAH4odGYxBJ1qz0+CE5WZ+2j1YgoEo8F2jQ=
-golang.org/x/net v0.20.0/go.mod h1:z8BVo6PvndSri0LbOE3hAn0apkU+1YvI6E70E9jsnvY=
-golang.org/x/net v0.21.0/go.mod h1:bIjVDfnllIU7BJ2DNgfnXvpSvtn8VRwhlsaeUTyUS44=
-golang.org/x/oauth2 v0.0.0-20200902213428-5d25da1a8d43/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A=
-golang.org/x/oauth2 v0.0.0-20201109201403-9fd604954f58/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A=
-golang.org/x/oauth2 v0.0.0-20201208152858-08078c50e5b5/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A=
-golang.org/x/oauth2 v0.0.0-20210218202405-ba52d332ba99/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A=
-golang.org/x/oauth2 v0.8.0/go.mod h1:yr7u4HXZRm1R1kBWqr/xKNqewf0plRYoB7sla+BCIXE=
+golang.org/x/oauth2 v0.10.0/go.mod h1:kTpgurOux7LqtuxjuyZa4Gj2gdezIt/jQtGnNFfypQI=
golang.org/x/oauth2 v0.11.0/go.mod h1:LdF7O/8bLR/qWK9DrpXmbHLTouvRHK0SgJl0GmDBchk=
-golang.org/x/oauth2 v0.12.0/go.mod h1:A74bZ3aGXgCY0qaIC9Ahg6Lglin4AMAco8cIv9baba4=
golang.org/x/oauth2 v0.13.0/go.mod h1:/JMhi4ZRXAf4HG9LiNmxvk+45+96RUlVThiH8FzNBn0=
golang.org/x/oauth2 v0.14.0/go.mod h1:lAtNWgaWfL4cm7j2OV8TxGi9Qb7ECORx8DktCY74OwM=
golang.org/x/oauth2 v0.15.0/go.mod h1:q48ptWNTY5XWf+JNten23lcvHpLJ0ZSxF5ttTHKVCAM=
-golang.org/x/oauth2 v0.16.0/go.mod h1:hqZ+0LWXsiVoZpeld6jVt06P3adbS2Uu911W1SsJv2o=
golang.org/x/oauth2 v0.17.0/go.mod h1:OzPDGQiuQMguemayvdylqddI7qcD9lnSDb+1FiwQ5HA=
-golang.org/x/sync v0.2.0/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
-golang.org/x/sync v0.3.0/go.mod h1:FU7BRWz2tNW+3quACPkgCx/L+uEAv1htQ0V83Z9Rj+Y=
golang.org/x/sync v0.4.0/go.mod h1:FU7BRWz2tNW+3quACPkgCx/L+uEAv1htQ0V83Z9Rj+Y=
-golang.org/x/sync v0.5.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk=
-golang.org/x/sys v0.0.0-20200905004654-be1d3432aa8f/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
-golang.org/x/sys v0.0.0-20201201145000-ef89a241ccb3/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
-golang.org/x/sys v0.0.0-20210104204734-6f8348627aad/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
-golang.org/x/sys v0.0.0-20210119212857-b64e53b001e4/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
-golang.org/x/sys v0.0.0-20210225134936-a50acf3fe073/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
-golang.org/x/sys v0.0.0-20210423185535-09eb48e85fd7/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20220310020820-b874c991c1a5/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.5.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.8.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.11.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.12.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.13.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.14.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
-golang.org/x/sys v0.16.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
-golang.org/x/sys v0.17.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
+golang.org/x/sys v0.19.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
golang.org/x/telemetry v0.0.0-20240208230135-b75ee8823808/go.mod h1:KG1lNk5ZFNssSZLrpVb4sMXKMpGwGXOxSG3rnu2gZQQ=
-golang.org/x/term v0.16.0/go.mod h1:yn7UURbUtPyrVJPGPq404EukNFxcm/foM+bV/bfcDsY=
-golang.org/x/text v0.3.4/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
-golang.org/x/text v0.7.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8=
-golang.org/x/text v0.9.0/go.mod h1:e1OnstbJyHTd6l/uOt8jFFHp6TRDWZR/bV3emEE/zU8=
+golang.org/x/telemetry v0.0.0-20240228155512-f48c80bd79b2 h1:IRJeR9r1pYWsHKTRe/IInb7lYvbBVIqOgsX/u0mbOWY=
+golang.org/x/telemetry v0.0.0-20240228155512-f48c80bd79b2/go.mod h1:TeRTkGYfJXctD9OcfyVLyj2J3IxLnKwHJR8f4D8a3YE=
golang.org/x/text v0.12.0/go.mod h1:TvPlkZtksWOMsz7fbANvkp4WM8x/WCo/om8BMLbz+aE=
-golang.org/x/text v0.13.0/go.mod h1:TvPlkZtksWOMsz7fbANvkp4WM8x/WCo/om8BMLbz+aE=
-golang.org/x/tools v0.0.0-20200904185747-39188db58858/go.mod h1:Cj7w3i3Rnn0Xh82ur9kSqwfTHTeVxaDqrfMjpcNT6bE=
-golang.org/x/tools v0.0.0-20201110124207-079ba7bd75cd/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
-golang.org/x/tools v0.0.0-20201201161351-ac6f37ff4c2a/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
-golang.org/x/tools v0.0.0-20201208233053-a543418bbed2/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
-golang.org/x/tools v0.0.0-20210105154028-b0ab187a4818/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
-golang.org/x/tools v0.0.0-20210108195828-e2f9c7f1fc8e/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
-golang.org/x/tools v0.1.0/go.mod h1:xkSsbof2nBLbhDlRMhhhyNLN/zl3eTqcnHD5viDpcZ0=
golang.org/x/tools v0.4.0/go.mod h1:UE5sM2OK9E/d67R0ANs2xJizIymRP5gJU295PvKXxjQ=
-golang.org/x/tools v0.6.0/go.mod h1:Xwgl3UAJ/d3gWutnCtw505GrjyAbvKui8lOU390QaIU=
golang.org/x/tools v0.12.0/go.mod h1:Sc0INKfu04TlqNoRA1hgpFZbhYXHPr4V5DzpSBTPqQM=
golang.org/x/tools v0.13.0/go.mod h1:HvlwmtVNQAhOuCjW7xxvovg8wbNq7LwfXh/k7wXUl58=
-golang.org/x/xerrors v0.0.0-20220907171357-04be3eba64a2/go.mod h1:K8+ghG5WaK9qNqU5K3HdILfMLy1f3aNYFI/wnl100a8=
+golang.org/x/tools v0.16.1/go.mod h1:kYVVN6I1mBNoB1OX+noeBjbRk4IUEPa7JJ+TJMEooJ0=
+golang.org/x/xerrors v0.0.0-20220907171357-04be3eba64a2 h1:H2TDz8ibqkAF6YGhCdN3jS9O0/s90v0rJh3X/OLHEUk=
golang.org/x/xerrors v0.0.0-20231012003039-104605ab7028/go.mod h1:NDW/Ps6MPRej6fsCIbMTohpP40sJ/P/vI1MoTEGwX90=
-google.golang.org/api v0.35.0/go.mod h1:/XrVsuzM0rZmrsbjJutiuftIzeuTQcEeaYcSk/mQ1dg=
-google.golang.org/api v0.36.0/go.mod h1:+z5ficQTmoYpPn8LCUNVpK5I7hwkpjbcgqA7I34qYtE=
-google.golang.org/api v0.40.0/go.mod h1:fYKFpnQN0DsDSKRVRcQSDQNtqWPfM9i+zNPxepjRCQ8=
-google.golang.org/api v0.126.0/go.mod h1:mBwVAtz+87bEN6CbA1GtZPDOqY2R5ONPqJeIlvyo4Aw=
+gonum.org/v1/gonum v0.11.0 h1:f1IJhK4Km5tBJmaiJXtk/PkL4cdVX6J+tGiM187uT5E=
+gonum.org/v1/netlib v0.0.0-20190313105609-8cb42192e0e0 h1:OE9mWmgKkjJyEmDAAtGMPjXu+YNeGvK9VTSHY6+Qihc=
+gonum.org/v1/plot v0.10.1 h1:dnifSs43YJuNMDzB7v8wV64O4ABBHReuAVAoBxqBqS4=
+google.golang.org/api v0.126.0 h1:q4GJq+cAdMAC7XP7njvQ4tvohGLiSlytuL4BQxbIZ+o=
google.golang.org/api v0.128.0/go.mod h1:Y611qgqaE92On/7g65MQgxYul3c0rEB894kniWLY750=
google.golang.org/api v0.149.0/go.mod h1:Mwn1B7JTXrzXtnvmzQE2BD6bYZQ8DShKZDZbeN9I7qI=
google.golang.org/api v0.155.0/go.mod h1:GI5qK5f40kCpHfPn6+YzGAByIKWv8ujFnmoWm7Igduk=
google.golang.org/api v0.162.0/go.mod h1:6SulDkfoBIg4NFmCuZ39XeeAgSHCPecfSUuDyYlAHs0=
-google.golang.org/appengine v1.6.7/go.mod h1:8WjMMxjGQR8xUklV/ARdw2HLXBOI7O7uCIDZVag1xfc=
-google.golang.org/genproto v0.0.0-20200904004341-0bd0a958aa1d/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
-google.golang.org/genproto v0.0.0-20201109203340-2640f1f9cdfb/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
-google.golang.org/genproto v0.0.0-20201201144952-b05cb90ed32e/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
-google.golang.org/genproto v0.0.0-20201210142538-e3217bee35cc/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
-google.golang.org/genproto v0.0.0-20201214200347-8c77b98c765d/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
-google.golang.org/genproto v0.0.0-20210108203827-ffc7fda8c3d7/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
-google.golang.org/genproto v0.0.0-20210226172003-ab064af71705/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
-google.golang.org/genproto v0.0.0-20230530153820-e85fd2cbaebc/go.mod h1:xZnkP7mREFX5MORlOPEzLMr+90PPZQ2QWzrVTWfAq64=
google.golang.org/genproto v0.0.0-20230822172742-b8732ec3820d/go.mod h1:yZTlhN0tQnXo3h00fuXNCxJdLdIdnVFVBaRJ5LWBbw4=
google.golang.org/genproto v0.0.0-20230920204549-e6e6cdab5c13/go.mod h1:CCviP9RmpZ1mxVr8MUjCnSiY09IbAXZxhLE6EhHIdPU=
google.golang.org/genproto v0.0.0-20231002182017-d307bd883b97 h1:SeZZZx0cP0fqUyA+oRzP9k7cSwJlvDFiROO72uwD6i0=
@@ -752,7 +949,6 @@ google.golang.org/genproto v0.0.0-20240213162025-012b6fc9bca9 h1:9+tzLLstTlPTRyJ
google.golang.org/genproto v0.0.0-20240213162025-012b6fc9bca9/go.mod h1:mqHbVIp48Muh7Ywss/AD6I5kNVKZMmAa/QEW58Gxp2s=
google.golang.org/genproto v0.0.0-20240227224415-6ceb2ff114de h1:F6qOa9AZTYJXOUEr4jDysRDLrm4PHePlge4v4TGAlxY=
google.golang.org/genproto v0.0.0-20240227224415-6ceb2ff114de/go.mod h1:VUhTRKeHn9wwcdrk73nvdC9gF178Tzhmt/qyaFcPLSo=
-google.golang.org/genproto/googleapis/api v0.0.0-20230530153820-e85fd2cbaebc/go.mod h1:vHYtlOoi6TsQ3Uk2yxR7NI5z8uoV+3pZtR4jmHIkRig=
google.golang.org/genproto/googleapis/api v0.0.0-20230822172742-b8732ec3820d/go.mod h1:KjSP20unUpOx5kyQUFa7k4OJg0qeJ7DEZflGDu2p6Bk=
google.golang.org/genproto/googleapis/api v0.0.0-20230920204549-e6e6cdab5c13/go.mod h1:RdyHbowztCGQySiCvQPgWQWgWhGnouTdCflKoDBt32U=
google.golang.org/genproto/googleapis/api v0.0.0-20231002182017-d307bd883b97/go.mod h1:iargEX0SFPm3xcfMI0d1domjg0ZF4Aa0p2awqyxhvF0=
@@ -765,11 +961,11 @@ google.golang.org/genproto/googleapis/api v0.0.0-20240116215550-a9fa1716bcac/go.
google.golang.org/genproto/googleapis/api v0.0.0-20240123012728-ef4313101c80/go.mod h1:4jWUdICTdgc3Ibxmr8nAJiiLHwQBY0UI0XZcEMaFKaA=
google.golang.org/genproto/googleapis/api v0.0.0-20240205150955-31a09d347014/go.mod h1:rbHMSEDyoYX62nRVLOCc4Qt1HbsdytAYoVwgjiOhF3I=
google.golang.org/genproto/googleapis/api v0.0.0-20240213162025-012b6fc9bca9/go.mod h1:PVreiBMirk8ypES6aw9d4p6iiBNSIfZEBqr3UGoAi2E=
+google.golang.org/genproto/googleapis/api v0.0.0-20240227224415-6ceb2ff114de h1:jFNzHPIeuzhdRwVhbZdiym9q0ory/xY3sA+v2wPg8I0=
google.golang.org/genproto/googleapis/api v0.0.0-20240227224415-6ceb2ff114de/go.mod h1:5iCWqnniDlqZHrd3neWVTOwvh/v6s3232omMecelax8=
-google.golang.org/genproto/googleapis/bytestream v0.0.0-20230530153820-e85fd2cbaebc/go.mod h1:ylj+BE99M198VPbBh6A8d9n3w8fChvyLK3wwBOjXBFA=
+google.golang.org/genproto/googleapis/bytestream v0.0.0-20230530153820-e85fd2cbaebc h1:g3hIDl0jRNd9PPTs2uBzYuaD5mQuwOkZY0vSc0LR32o=
google.golang.org/genproto/googleapis/bytestream v0.0.0-20231030173426-d783a09b4405/go.mod h1:GRUCuLdzVqZte8+Dl/D4N25yLzcGqqWaYkeVOwulFqw=
google.golang.org/genproto/googleapis/bytestream v0.0.0-20231212172506-995d672761c0/go.mod h1:guYXGPwC6jwxgWKW5Y405fKWOFNwlvUlUnzyp9i0uqo=
-google.golang.org/genproto/googleapis/rpc v0.0.0-20230530153820-e85fd2cbaebc/go.mod h1:66JfowdXAEgad5O9NnYcsNPLCPZJD++2L9X0PCMODrA=
google.golang.org/genproto/googleapis/rpc v0.0.0-20230920204549-e6e6cdab5c13/go.mod h1:KSqppvjFjtoCI+KGd4PELB0qLNxdJHRGqRI09mB6pQA=
google.golang.org/genproto/googleapis/rpc v0.0.0-20231002182017-d307bd883b97/go.mod h1:v7nGkzlmW8P3n/bKmWBn2WpBjpOEx8Q6gMueudAmKfY=
google.golang.org/genproto/googleapis/rpc v0.0.0-20231016165738-49dd2c1f3d0b/go.mod h1:swOH3j0KzcDDgGUWr+SNpyTen5YrXjS3eyPzFYKc6lc=
@@ -781,12 +977,6 @@ google.golang.org/genproto/googleapis/rpc v0.0.0-20240123012728-ef4313101c80/go.
google.golang.org/genproto/googleapis/rpc v0.0.0-20240125205218-1f4bbc51befe/go.mod h1:PAREbraiVEVGVdTZsVWjSbbTtSyGbAgIIvni8a8CD5s=
google.golang.org/genproto/googleapis/rpc v0.0.0-20240205150955-31a09d347014/go.mod h1:SaPjaZGWb0lPqs6Ittu0spdfrOArqji4ZdeP5IC/9N4=
google.golang.org/genproto/googleapis/rpc v0.0.0-20240213162025-012b6fc9bca9/go.mod h1:YUWgXUFRPfoYK1IHMuxH5K6nPEXSCzIMljnQ59lLRCk=
-google.golang.org/grpc v1.31.1/go.mod h1:N36X2cJ7JwdamYAgDz+s+rVMFjt3numwzf/HckM8pak=
-google.golang.org/grpc v1.33.2/go.mod h1:JMHMWHQWaTccqQQlmk3MJZS+GWXOdAesneDmEnv2fbc=
-google.golang.org/grpc v1.34.0/go.mod h1:WotjhfgOW/POjDeRt8vscBtXq+2VjORFy659qA51WJ8=
-google.golang.org/grpc v1.35.0/go.mod h1:qjiiYl8FncCW8feJPdyg3v6XW24KsRHe+dy9BAGRRjU=
-google.golang.org/grpc v1.45.0/go.mod h1:lN7owxKUQEqMfSyQikvvk5tf/6zMPsrK+ONuO11+0rQ=
-google.golang.org/grpc v1.55.0/go.mod h1:iYEXKGkEBhg1PjZQvoYEVPTDkHo1/bjTnfwTeGONTY8=
google.golang.org/grpc v1.56.1/go.mod h1:I9bI3vqKfayGqPUAwGdOSu7kt6oIJLixfffKrpXqQ9s=
google.golang.org/grpc v1.57.0/go.mod h1:Sd+9RMTACXwmub0zcNY2c4arhtrbBYD1AUHI/dt16Mo=
google.golang.org/grpc v1.59.0/go.mod h1:aUPDwccQo6OTjy7Hct4AfBPD1GptF4fyUjIkQ9YtF98=
@@ -794,19 +984,49 @@ google.golang.org/grpc v1.60.1/go.mod h1:OlCHIeLYqSSsLi6i49B5QGdzaMZK9+M7LXN2FKz
google.golang.org/grpc v1.61.0/go.mod h1:VUbo7IFqmF1QtCAstipjG0GIoq49KvMe9+h1jFLBNJs=
google.golang.org/grpc v1.61.1/go.mod h1:VUbo7IFqmF1QtCAstipjG0GIoq49KvMe9+h1jFLBNJs=
google.golang.org/grpc v1.62.1/go.mod h1:IWTG0VlJLCh1SkC58F7np9ka9mx/WNkjl4PGJaiq+QE=
-google.golang.org/grpc/cmd/protoc-gen-go-grpc v1.1.0/go.mod h1:6Kw0yEErY5E/yWrBtf03jp27GLLJujG4z/JK95pnjjw=
-google.golang.org/protobuf v1.27.1/go.mod h1:9q0QmTI4eRPtz6boOQmLYwt+qCgq0jsYwAQnmE0givc=
-google.golang.org/protobuf v1.28.0/go.mod h1:HV8QOd/L58Z+nl8r43ehVNZIU/HEI6OcFqwMG9pJV4I=
-google.golang.org/protobuf v1.30.0/go.mod h1:HV8QOd/L58Z+nl8r43ehVNZIU/HEI6OcFqwMG9pJV4I=
-google.golang.org/protobuf v1.31.0/go.mod h1:HV8QOd/L58Z+nl8r43ehVNZIU/HEI6OcFqwMG9pJV4I=
-google.golang.org/protobuf v1.32.0/go.mod h1:c6P6GXX6sHbq/GpV6MGZEdwhWPcYBgnhAHhKbcUYpos=
+google.golang.org/grpc/cmd/protoc-gen-go-grpc v1.1.0 h1:M1YKkFIboKNieVO5DLUEVzQfGwJD30Nv2jfUgzb5UcE=
+gopkg.in/alecthomas/kingpin.v2 v2.2.6 h1:jMFz6MfLP0/4fUyZle81rXUoxOBFi19VUFKVDOQfozc=
+gopkg.in/errgo.v2 v2.1.0 h1:0vLT13EuvQ0hNvakwLuFZ/jYrLp5F3kcWHXdRggjCE8=
gopkg.in/evanphx/json-patch.v5 v5.6.0 h1:BMT6KIwBD9CaU91PJCZIe46bDmBWa9ynTQgJIOpfQBk=
gopkg.in/evanphx/json-patch.v5 v5.6.0/go.mod h1:/kvTRh1TVm5wuM6OkHxqXtE/1nUZZpihg29RtuIyfvk=
+gopkg.in/fsnotify.v1 v1.4.7 h1:xOHLXZwVvI9hhs+cLKq5+I5onOuwQLhQwiu63xxlHs4=
+gopkg.in/natefinch/lumberjack.v2 v2.2.1 h1:bBRl1b0OH9s/DuPhuXpNl+VtCaJXFZ5/uEFST95x9zc=
gopkg.in/natefinch/lumberjack.v2 v2.2.1/go.mod h1:YD8tP3GAjkrDg1eZH7EGmyESg/lsYskCTPBJVb9jqSc=
+gopkg.in/square/go-jose.v2 v2.6.0 h1:NGk74WTnPKBNUhNzQX7PYcTLUjoq7mzKk2OKbvwk2iI=
gopkg.in/square/go-jose.v2 v2.6.0/go.mod h1:M9dMgbHiYLoDGQrXy7OpJDJWiKiU//h+vD76mk0e1AI=
+honnef.co/go/tools v0.1.3 h1:qTakTkI6ni6LFD5sBwwsdSO+AQqbSIxOauHTTQKZ/7o=
+k8s.io/gengo v0.0.0-20230829151522-9cce18d56c01 h1:pWEwq4Asjm4vjW7vcsmijwBhOr1/shsbSYiWXmNGlks=
k8s.io/gengo v0.0.0-20230829151522-9cce18d56c01/go.mod h1:FiNAH4ZV3gBg2Kwh89tzAEV2be7d5xI0vBa/VySYy3E=
+k8s.io/gengo/v2 v2.0.0-20240228010128-51d4e06bde70/go.mod h1:VH3AT8AaQOqiGjMF9p0/IM1Dj+82ZwjfxUP1IxaHE+8=
+k8s.io/klog/v2 v2.2.0/go.mod h1:Od+F08eJP+W3HUb4pSrPpgp9DGU4GzlpG/TmITuYh/Y=
k8s.io/klog/v2 v2.80.1/go.mod h1:y1WjHnz7Dj687irZUWR/WLkLc5N1YHtjLdmgWjndZn0=
k8s.io/kms v0.29.3/go.mod h1:TBGbJKpRUMk59neTMDMddjIDL+D4HuFUbpuiuzmOPg0=
+k8s.io/kms v0.30.0 h1:ZlnD/ei5lpvUlPw6eLfVvH7d8i9qZ6HwUQgydNVks8g=
+k8s.io/kms v0.30.0/go.mod h1:GrMurD0qk3G4yNgGcsCEmepqf9KyyIrTXYR2lyUOJC4=
+k8s.io/kube-openapi v0.0.0-20240228011516-70dd3763d340/go.mod h1:yD4MZYeKMBwQKVht279WycxKyM84kkAx2DPrTXaeb98=
k8s.io/utils v0.0.0-20210802155522-efc7438f0176/go.mod h1:jPW/WVKK9YHAvNhRxK0md/EJ228hCsBRufyofKtW8HA=
+k8s.io/utils v0.0.0-20230726121419-3b25d923346b/go.mod h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0=
+lukechampine.com/uint128 v1.2.0 h1:mBi/5l91vocEN8otkC5bDLhi2KdCticRiwbdB0O+rjI=
+modernc.org/cc/v3 v3.36.3 h1:uISP3F66UlixxWEcKuIWERa4TwrZENHSL8tWxZz8bHg=
+modernc.org/ccgo/v3 v3.16.9 h1:AXquSwg7GuMk11pIdw7fmO1Y/ybgazVkMhsZWCV0mHM=
+modernc.org/ccorpus v1.11.6 h1:J16RXiiqiCgua6+ZvQot4yUuUy8zxgqbqEEUuGPlISk=
+modernc.org/httpfs v1.0.6 h1:AAgIpFZRXuYnkjftxTAZwMIiwEqAfk8aVB2/oA6nAeM=
+modernc.org/libc v1.17.1 h1:Q8/Cpi36V/QBfuQaFVeisEBs3WqoGAJprZzmf7TfEYI=
+modernc.org/mathutil v1.5.0 h1:rV0Ko/6SfM+8G+yKiyI830l3Wuz1zRutdslNoQ0kfiQ=
+modernc.org/memory v1.2.1 h1:dkRh86wgmq/bJu2cAS2oqBCz/KsMZU7TUM4CibQ7eBs=
+modernc.org/opt v0.1.3 h1:3XOZf2yznlhC+ibLltsDGzABUGVx8J6pnFMS3E4dcq4=
+modernc.org/sqlite v1.18.1 h1:ko32eKt3jf7eqIkCgPAeHMBXw3riNSLhl2f3loEF7o8=
+modernc.org/strutil v1.1.3 h1:fNMm+oJklMGYfU9Ylcywl0CO5O6nTfaowNsh2wpPjzY=
+modernc.org/tcl v1.13.1 h1:npxzTwFTZYM8ghWicVIX1cRWzj7Nd8i6AqqX2p+IYao=
+modernc.org/token v1.0.0 h1:a0jaWiNMDhDUtqOj09wvjWWAqd3q7WpBulmL9H2egsk=
+modernc.org/z v1.5.1 h1:RTNHdsrOpeoSeOF4FbzTo8gBYByaJ5xT7NgZ9ZqRiJM=
+rsc.io/binaryregexp v0.2.0 h1:HfqmD5MEmC0zvwBuF187nq9mdnXjXsSivRiXN7SmRkE=
+rsc.io/pdf v0.1.1 h1:k1MczvYDUvJBe93bYd7wrZLLUEcLZAuF824/I4e5Xr4=
+rsc.io/quote/v3 v3.1.0 h1:9JKUTTIUgS6kzR9mK1YuGKv6Nl+DijDNIc0ghT58FaY=
+rsc.io/sampler v1.3.0 h1:7uVkIFmeBqHfdjD+gZwtXXI+RODJ2Wc4O7MPEh/QiW4=
sigs.k8s.io/apiserver-network-proxy/konnectivity-client v0.28.0/go.mod h1:VHVDI/KrK4fjnV61bE2g3sA7tiETLn8sooImelsCx3Y=
+sigs.k8s.io/apiserver-network-proxy/konnectivity-client v0.29.0 h1:/U5vjBbQn3RChhv7P11uhYvCSm5G2GaIi5AIGBS6r4c=
+sigs.k8s.io/apiserver-network-proxy/konnectivity-client v0.29.0/go.mod h1:z7+wmGM2dfIiLRfrC6jb5kV2Mq/sK1ZP303cxzkV5Y4=
sigs.k8s.io/structured-merge-diff/v4 v4.2.3/go.mod h1:qjx8mGObPmV2aSZepjQjbmb2ihdVs8cGKBraizNC69E=
+sigs.k8s.io/yaml v1.2.0/go.mod h1:yfXDCHCao9+ENCvLSE62v9VSji2MKu5jeNfTrofGhJc=
+sigs.k8s.io/yaml v1.3.0/go.mod h1:GeOyir5tyXNByN85N/dRIT9es5UQNerPYEKK56eTBm8=
From f6bdba29ad8fb6459c053a9d8999d4a3a43bb951 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Sun, 5 May 2024 13:47:52 -0700
Subject: [PATCH 054/283] Bump golangci/golangci-lint-action from 4.0.0 to
5.0.0 (#11328)
Bumps [golangci/golangci-lint-action](https://github.com/golangci/golangci-lint-action) from 4.0.0 to 5.0.0.
- [Release notes](https://github.com/golangci/golangci-lint-action/releases)
- [Commits](https://github.com/golangci/golangci-lint-action/compare/3cfe3a4abbb849e10058ce4af15d205b6da42804...82d40c283aeb1f2b6595839195e95c2d6a49081b)
---
updated-dependencies:
- dependency-name: golangci/golangci-lint-action
dependency-type: direct:production
update-type: version-update:semver-major
...
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
.github/workflows/golangci-lint.yml | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/.github/workflows/golangci-lint.yml b/.github/workflows/golangci-lint.yml
index 2b709ccfd..33a91b081 100644
--- a/.github/workflows/golangci-lint.yml
+++ b/.github/workflows/golangci-lint.yml
@@ -28,6 +28,6 @@ jobs:
check-latest: true
- name: golangci-lint
- uses: golangci/golangci-lint-action@3cfe3a4abbb849e10058ce4af15d205b6da42804 # v4.0.0
+ uses: golangci/golangci-lint-action@82d40c283aeb1f2b6595839195e95c2d6a49081b # v5.0.0
with:
version: v1.56
From c5a54a150e2300deadfcde7ce26c80d8f2fb125b Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Sun, 5 May 2024 13:50:16 -0700
Subject: [PATCH 055/283] Bump sigs.k8s.io/controller-runtime from 0.17.3 to
0.18.1 (#11345)
Bumps [sigs.k8s.io/controller-runtime](https://github.com/kubernetes-sigs/controller-runtime) from 0.17.3 to 0.18.1.
- [Release notes](https://github.com/kubernetes-sigs/controller-runtime/releases)
- [Changelog](https://github.com/kubernetes-sigs/controller-runtime/blob/main/RELEASE.md)
- [Commits](https://github.com/kubernetes-sigs/controller-runtime/compare/v0.17.3...v0.18.1)
---
updated-dependencies:
- dependency-name: sigs.k8s.io/controller-runtime
dependency-type: direct:production
update-type: version-update:semver-minor
...
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 2 +-
go.sum | 4 ++--
2 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/go.mod b/go.mod
index 4b40b93bc..cec60ef9c 100644
--- a/go.mod
+++ b/go.mod
@@ -43,7 +43,7 @@ require (
k8s.io/component-base v0.30.0
k8s.io/klog/v2 v2.120.1
pault.ag/go/sniff v0.0.0-20200207005214-cf7e4d167732
- sigs.k8s.io/controller-runtime v0.17.3
+ sigs.k8s.io/controller-runtime v0.18.1
sigs.k8s.io/mdtoc v1.1.0
)
diff --git a/go.sum b/go.sum
index 13e4ebd2d..1ad706885 100644
--- a/go.sum
+++ b/go.sum
@@ -1974,8 +1974,8 @@ rsc.io/binaryregexp v0.2.0/go.mod h1:qTv7/COck+e2FymRvadv62gMdZztPaShugOCi3I+8D8
rsc.io/pdf v0.1.1/go.mod h1:n8OzWcQ6Sp37PL01nO98y4iUCRdTGarVfzxY20ICaU4=
rsc.io/quote/v3 v3.1.0/go.mod h1:yEA65RcK8LyAZtP9Kv3t0HmxON59tX3rD+tICJqUlj0=
rsc.io/sampler v1.3.0/go.mod h1:T1hPZKmBbMNahiBKFy5HrXp6adAjACjK9JXDnKaTXpA=
-sigs.k8s.io/controller-runtime v0.17.3 h1:65QmN7r3FWgTxDMz9fvGnO1kbf2nu+acg9p2R9oYYYk=
-sigs.k8s.io/controller-runtime v0.17.3/go.mod h1:N0jpP5Lo7lMTF9aL56Z/B2oWBJjey6StQM0jRbKQXtY=
+sigs.k8s.io/controller-runtime v0.18.1 h1:RpWbigmuiylbxOCLy0tGnq1cU1qWPwNIQzoJk+QeJx4=
+sigs.k8s.io/controller-runtime v0.18.1/go.mod h1:tuAt1+wbVsXIT8lPtk5RURxqAnq7xkpv2Mhttslg7Hw=
sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd h1:EDPBXCAspyGV4jQlpZSudPeMmr1bNJefnuqLsRAsHZo=
sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd/go.mod h1:B8JuhiUyNFVKdsE8h686QcCxMaH6HrOAZj4vswFpcB0=
sigs.k8s.io/kustomize/api v0.16.0 h1:/zAR4FOQDCkgSDmVzV2uiFbuy9bhu3jEzthrHCuvm1g=
From cfe0daace1a1625f692caec3077c488d224e8cc4 Mon Sep 17 00:00:00 2001
From: Ricardo Katz
Date: Sun, 5 May 2024 23:06:28 -0300
Subject: [PATCH 056/283] Bump Kubernetes version on images (#11346)
---
build/dev-env.sh | 2 +-
images/test-runner/Makefile | 16 ++++++++--------
images/test-runner/TAG | 2 +-
test/e2e/run-chart-test.sh | 2 +-
test/e2e/run-kind-e2e.sh | 2 +-
5 files changed, 12 insertions(+), 12 deletions(-)
diff --git a/build/dev-env.sh b/build/dev-env.sh
index 93ed3de40..699c98030 100755
--- a/build/dev-env.sh
+++ b/build/dev-env.sh
@@ -64,7 +64,7 @@ echo "[dev-env] building image"
make build image
docker tag "${REGISTRY}/controller:${TAG}" "${DEV_IMAGE}"
-export K8S_VERSION=${K8S_VERSION:-v1.26.3@sha256:61b92f38dff6ccc29969e7aa154d34e38b89443af1a2c14e6cfbd2df6419c66f}
+export K8S_VERSION=${K8S_VERSION:-v1.29.2@sha256:51a1434a5397193442f0be2a297b488b6c919ce8a3931be0ce822606ea5ca245}
KIND_CLUSTER_NAME="ingress-nginx-dev"
diff --git a/images/test-runner/Makefile b/images/test-runner/Makefile
index ac0757ab2..d82427140 100644
--- a/images/test-runner/Makefile
+++ b/images/test-runner/Makefile
@@ -49,8 +49,8 @@ image:
--push \
--build-arg BASE_IMAGE=${NGINX_BASE_IMAGE} \
--build-arg GOLANG_VERSION=${GO_VERSION} \
- --build-arg ETCD_VERSION=3.4.3-0 \
- --build-arg K8S_RELEASE=v1.26.0 \
+ --build-arg ETCD_VERSION=3.5.13-0 \
+ --build-arg K8S_RELEASE=v1.29.2 \
--build-arg RESTY_CLI_VERSION=0.27 \
--build-arg RESTY_CLI_SHA=e5f4f3128af49ba5c4d039d0554e5ae91bbe05866f60eccfa96d3653274bff90 \
--build-arg LUAROCKS_VERSION=3.8.0 \
@@ -58,8 +58,8 @@ image:
--build-arg CHART_TESTING_VERSION=3.8.0 \
--build-arg YAML_LINT_VERSION=1.33.0 \
--build-arg YAMALE_VERSION=4.0.4 \
- --build-arg HELM_VERSION=3.11.2 \
- --build-arg GINKGO_VERSION=2.17.1 \
+ --build-arg HELM_VERSION=3.14.4 \
+ --build-arg GINKGO_VERSION=2.17.2 \
--build-arg GOLINT_VERSION=latest \
-t ${IMAGE}:${TAG} rootfs
@@ -70,8 +70,8 @@ build: ensure-buildx
--pull \
--build-arg BASE_IMAGE=${NGINX_BASE_IMAGE} \
--build-arg GOLANG_VERSION=${GO_VERSION} \
- --build-arg ETCD_VERSION=3.4.3-0 \
- --build-arg K8S_RELEASE=v1.26.0 \
+ --build-arg ETCD_VERSION=3.5.13-0 \
+ --build-arg K8S_RELEASE=v1.29.2 \
--build-arg RESTY_CLI_VERSION=0.27 \
--build-arg RESTY_CLI_SHA=e5f4f3128af49ba5c4d039d0554e5ae91bbe05866f60eccfa96d3653274bff90 \
--build-arg LUAROCKS_VERSION=3.8.0 \
@@ -79,8 +79,8 @@ build: ensure-buildx
--build-arg CHART_TESTING_VERSION=3.8.0 \
--build-arg YAML_LINT_VERSION=1.33.0 \
--build-arg YAMALE_VERSION=4.0.4 \
- --build-arg HELM_VERSION=3.11.2 \
- --build-arg GINKGO_VERSION=2.17.1 \
+ --build-arg HELM_VERSION=3.14.4 \
+ --build-arg GINKGO_VERSION=2.17.2 \
--build-arg GOLINT_VERSION=latest \
-t ${IMAGE}:${TAG} rootfs
diff --git a/images/test-runner/TAG b/images/test-runner/TAG
index 90ab6e946..8ce995b80 100644
--- a/images/test-runner/TAG
+++ b/images/test-runner/TAG
@@ -1 +1 @@
-v0.0.2
\ No newline at end of file
+v0.0.3
\ No newline at end of file
diff --git a/test/e2e/run-chart-test.sh b/test/e2e/run-chart-test.sh
index a453bd1b4..dadb5195d 100755
--- a/test/e2e/run-chart-test.sh
+++ b/test/e2e/run-chart-test.sh
@@ -62,7 +62,7 @@ export KUBECONFIG="${KUBECONFIG:-$HOME/.kube/kind-config-$KIND_CLUSTER_NAME}"
if [ "${SKIP_CLUSTER_CREATION:-false}" = "false" ]; then
echo "[dev-env] creating Kubernetes cluster with kind"
- export K8S_VERSION=${K8S_VERSION:-v1.26.3@sha256:61b92f38dff6ccc29969e7aa154d34e38b89443af1a2c14e6cfbd2df6419c66f}
+ export K8S_VERSION=${K8S_VERSION:-v1.29.2@sha256:51a1434a5397193442f0be2a297b488b6c919ce8a3931be0ce822606ea5ca245}
kind create cluster \
--verbosity=${KIND_LOG_LEVEL} \
diff --git a/test/e2e/run-kind-e2e.sh b/test/e2e/run-kind-e2e.sh
index 891e5dbae..128964393 100755
--- a/test/e2e/run-kind-e2e.sh
+++ b/test/e2e/run-kind-e2e.sh
@@ -64,7 +64,7 @@ echo "Running e2e with nginx base image ${NGINX_BASE_IMAGE}"
if [ "${SKIP_CLUSTER_CREATION}" = "false" ]; then
echo "[dev-env] creating Kubernetes cluster with kind"
- export K8S_VERSION=${K8S_VERSION:-v1.26.3@sha256:61b92f38dff6ccc29969e7aa154d34e38b89443af1a2c14e6cfbd2df6419c66f}
+ export K8S_VERSION=${K8S_VERSION:-v1.29.2@sha256:51a1434a5397193442f0be2a297b488b6c919ce8a3931be0ce822606ea5ca245}
# delete the cluster if it exists
if kind get clusters | grep "${KIND_CLUSTER_NAME}"; then
From 689b993a3ce9d92143ff891bf38b9da72a499c13 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 6 May 2024 05:41:20 -0700
Subject: [PATCH 057/283] Bump the all group with 3 updates (#11348)
Bumps the all group with 3 updates: [actions/setup-go](https://github.com/actions/setup-go), [actions/dependency-review-action](https://github.com/actions/dependency-review-action) and [golangci/golangci-lint-action](https://github.com/golangci/golangci-lint-action).
Updates `actions/setup-go` from 5.0.0 to 5.0.1
- [Release notes](https://github.com/actions/setup-go/releases)
- [Commits](https://github.com/actions/setup-go/compare/0c52d547c9bc32b1aa3301fd7a9cb496313a4491...cdcb36043654635271a94b9a6d1392de5bb323a7)
Updates `actions/dependency-review-action` from 4.2.5 to 4.3.2
- [Release notes](https://github.com/actions/dependency-review-action/releases)
- [Commits](https://github.com/actions/dependency-review-action/compare/5bbc3ba658137598168acb2ab73b21c432dd411b...0c155c5e8556a497adf53f2c18edabf945ed8e70)
Updates `golangci/golangci-lint-action` from 5.0.0 to 5.3.0
- [Release notes](https://github.com/golangci/golangci-lint-action/releases)
- [Commits](https://github.com/golangci/golangci-lint-action/compare/82d40c283aeb1f2b6595839195e95c2d6a49081b...38e1018663fa5173f3968ea0777460d3de38f256)
---
updated-dependencies:
- dependency-name: actions/setup-go
dependency-type: direct:production
update-type: version-update:semver-patch
dependency-group: all
- dependency-name: actions/dependency-review-action
dependency-type: direct:production
update-type: version-update:semver-minor
dependency-group: all
- dependency-name: golangci/golangci-lint-action
dependency-type: direct:production
update-type: version-update:semver-minor
dependency-group: all
...
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
.github/workflows/ci.yaml | 6 +++---
.github/workflows/depreview.yaml | 2 +-
.github/workflows/golangci-lint.yml | 4 ++--
.github/workflows/images.yaml | 2 +-
.github/workflows/plugin.yaml | 2 +-
5 files changed, 8 insertions(+), 8 deletions(-)
diff --git a/.github/workflows/ci.yaml b/.github/workflows/ci.yaml
index afc2f7d38..cafb5ad95 100644
--- a/.github/workflows/ci.yaml
+++ b/.github/workflows/ci.yaml
@@ -84,7 +84,7 @@ jobs:
- name: Set up Go
id: go
- uses: actions/setup-go@0c52d547c9bc32b1aa3301fd7a9cb496313a4491 # v5.0.0
+ uses: actions/setup-go@cdcb36043654635271a94b9a6d1392de5bb323a7 # v5.0.1
with:
go-version: ${{ env.GOLANG_VERSION }}
check-latest: true
@@ -114,7 +114,7 @@ jobs:
- name: Set up Go
id: go
- uses: actions/setup-go@0c52d547c9bc32b1aa3301fd7a9cb496313a4491 # v5.0.0
+ uses: actions/setup-go@cdcb36043654635271a94b9a6d1392de5bb323a7 # v5.0.1
with:
go-version: ${{ steps.golangversion.outputs.version }}
check-latest: true
@@ -242,7 +242,7 @@ jobs:
uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
- name: Setup Go
- uses: actions/setup-go@0c52d547c9bc32b1aa3301fd7a9cb496313a4491 # v5.0.0
+ uses: actions/setup-go@cdcb36043654635271a94b9a6d1392de5bb323a7 # v5.0.1
with:
go-version: ${{ needs.build.outputs.golangversion }}
check-latest: true
diff --git a/.github/workflows/depreview.yaml b/.github/workflows/depreview.yaml
index c9881c2a3..ffe249546 100644
--- a/.github/workflows/depreview.yaml
+++ b/.github/workflows/depreview.yaml
@@ -11,4 +11,4 @@ jobs:
- name: 'Checkout Repository'
uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
- name: 'Dependency Review'
- uses: actions/dependency-review-action@5bbc3ba658137598168acb2ab73b21c432dd411b # v4.2.5
+ uses: actions/dependency-review-action@0c155c5e8556a497adf53f2c18edabf945ed8e70 # v4.3.2
diff --git a/.github/workflows/golangci-lint.yml b/.github/workflows/golangci-lint.yml
index 33a91b081..ff04ab3da 100644
--- a/.github/workflows/golangci-lint.yml
+++ b/.github/workflows/golangci-lint.yml
@@ -22,12 +22,12 @@ jobs:
- name: Set up Go
id: go
- uses: actions/setup-go@0c52d547c9bc32b1aa3301fd7a9cb496313a4491 # v5.0.0
+ uses: actions/setup-go@cdcb36043654635271a94b9a6d1392de5bb323a7 # v5.0.1
with:
go-version: ${{ env.GOLANG_VERSION }}
check-latest: true
- name: golangci-lint
- uses: golangci/golangci-lint-action@82d40c283aeb1f2b6595839195e95c2d6a49081b # v5.0.0
+ uses: golangci/golangci-lint-action@38e1018663fa5173f3968ea0777460d3de38f256 # v5.3.0
with:
version: v1.56
diff --git a/.github/workflows/images.yaml b/.github/workflows/images.yaml
index a7a2adce0..4123a5efa 100644
--- a/.github/workflows/images.yaml
+++ b/.github/workflows/images.yaml
@@ -151,7 +151,7 @@ jobs:
- name: Set up Go
id: go
- uses: actions/setup-go@0c52d547c9bc32b1aa3301fd7a9cb496313a4491 # v5.0.0
+ uses: actions/setup-go@cdcb36043654635271a94b9a6d1392de5bb323a7 # v5.0.1
with:
go-version: ${{ env.GOLANG_VERSION }}
check-latest: true
diff --git a/.github/workflows/plugin.yaml b/.github/workflows/plugin.yaml
index 1b8c8f19b..56992f34d 100644
--- a/.github/workflows/plugin.yaml
+++ b/.github/workflows/plugin.yaml
@@ -20,7 +20,7 @@ jobs:
run: echo "GOLANG_VERSION=$(cat GOLANG_VERSION)" >> $GITHUB_ENV
- name: Set up Go
- uses: actions/setup-go@0c52d547c9bc32b1aa3301fd7a9cb496313a4491 # v5.0.0
+ uses: actions/setup-go@cdcb36043654635271a94b9a6d1392de5bb323a7 # v5.0.1
with:
go-version: ${{ env.GOLANG_VERSION }}
check-latest: true
From 4e11074323c311cf16a479ffe22be5beb4c7fec9 Mon Sep 17 00:00:00 2001
From: Rafael da Fonseca
Date: Tue, 14 May 2024 22:45:25 +0100
Subject: [PATCH 058/283] Allow configuring nginx worker reload behaviour, to
prevent multiple concurrent worker reloads which can lead to high resource
usage and OOMKill (#10884)
* feat: allow configuring nginx worker reload behaviour, to prevent multiple concurrent worker reloads
Signed-off-by: Rafael da Fonseca
* appease linter, remove unnecessary log line
Signed-off-by: Rafael da Fonseca
* Flip to using a positive behaviour flag instead of negative
Signed-off-by: Rafael da Fonseca
* Update helm-docs
Signed-off-by: Rafael da Fonseca
* Avoid calling GetBackendConfiguration() twice, use clearer name for helm chart option
Signed-off-by: Rafael da Fonseca
* Fix helm-docs ordering
Signed-off-by: Rafael da Fonseca
---------
Signed-off-by: Rafael da Fonseca
---
charts/ingress-nginx/README.md | 1 +
.../templates/controller-configmap.yaml | 1 +
charts/ingress-nginx/values.yaml | 2 +
.../nginx-configuration/configmap.md | 1 +
internal/ingress/controller/config/config.go | 8 ++++
internal/ingress/controller/nginx.go | 47 +++++++++++++++++--
.../ingress/controller/template/configmap.go | 12 +++++
7 files changed, 69 insertions(+), 3 deletions(-)
diff --git a/charts/ingress-nginx/README.md b/charts/ingress-nginx/README.md
index 1c166e05e..8ea6bae85 100644
--- a/charts/ingress-nginx/README.md
+++ b/charts/ingress-nginx/README.md
@@ -301,6 +301,7 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
| controller.enableAnnotationValidations | bool | `false` | |
| controller.enableMimalloc | bool | `true` | Enable mimalloc as a drop-in replacement for malloc. # ref: https://github.com/microsoft/mimalloc # |
| controller.enableTopologyAwareRouting | bool | `false` | This configuration enables Topology Aware Routing feature, used together with service annotation service.kubernetes.io/topology-mode="auto" Defaults to false |
+| controller.enableWorkerSerialReloads | bool | `false` | This configuration defines if NGINX workers should reload serially instead of concurrently when multiple changes that require reloads are queued |
| controller.existingPsp | string | `""` | Use an existing PSP instead of creating one |
| controller.extraArgs | object | `{}` | Additional command line arguments to pass to Ingress-Nginx Controller E.g. to specify the default SSL certificate you can use |
| controller.extraContainers | list | `[]` | Additional containers to be added to the controller pod. See https://github.com/lemonldap-ng-controller/lemonldap-ng-controller as example. |
diff --git a/charts/ingress-nginx/templates/controller-configmap.yaml b/charts/ingress-nginx/templates/controller-configmap.yaml
index 22080d115..50ae824a8 100644
--- a/charts/ingress-nginx/templates/controller-configmap.yaml
+++ b/charts/ingress-nginx/templates/controller-configmap.yaml
@@ -14,6 +14,7 @@ metadata:
namespace: {{ include "ingress-nginx.namespace" . }}
data:
allow-snippet-annotations: "{{ .Values.controller.allowSnippetAnnotations }}"
+ enable-serial-reloads: "{{ .Values.controller.enableWorkerSerialReloads }}"
{{- if .Values.controller.addHeaders }}
add-headers: {{ include "ingress-nginx.namespace" . }}/{{ include "ingress-nginx.fullname" . }}-custom-add-headers
{{- end }}
diff --git a/charts/ingress-nginx/values.yaml b/charts/ingress-nginx/values.yaml
index 85990614b..2a361614c 100644
--- a/charts/ingress-nginx/values.yaml
+++ b/charts/ingress-nginx/values.yaml
@@ -93,6 +93,8 @@ controller:
# when users add those annotations.
# Global snippets in ConfigMap are still respected
allowSnippetAnnotations: false
+ # -- This configuration defines if NGINX workers should reload serially instead of concurrently when multiple changes that require reloads are queued
+ enableWorkerSerialReloads: false
# -- Required for use with CNI based kubernetes installations (such as ones set up by kubeadm),
# since CNI and hostport don't mix yet. Can be deprecated once https://github.com/kubernetes/kubernetes/issues/23920
# is merged
diff --git a/docs/user-guide/nginx-configuration/configmap.md b/docs/user-guide/nginx-configuration/configmap.md
index 52c54c4fe..13f82a17d 100644
--- a/docs/user-guide/nginx-configuration/configmap.md
+++ b/docs/user-guide/nginx-configuration/configmap.md
@@ -114,6 +114,7 @@ The following table shows a configuration option's name, type, and the default v
|[worker-processes](#worker-processes)| string | `` ||
|[worker-cpu-affinity](#worker-cpu-affinity)| string | "" ||
|[worker-shutdown-timeout](#worker-shutdown-timeout)| string | "240s" ||
+|[enable-serial-reloads](#enable-serial-reloads)|bool|"false"||
|[load-balance](#load-balance)| string | "round_robin" ||
|[variables-hash-bucket-size](#variables-hash-bucket-size)| int | 128 ||
|[variables-hash-max-size](#variables-hash-max-size)| int | 2048 ||
diff --git a/internal/ingress/controller/config/config.go b/internal/ingress/controller/config/config.go
index 47f2120f1..6349d6006 100644
--- a/internal/ingress/controller/config/config.go
+++ b/internal/ingress/controller/config/config.go
@@ -477,6 +477,13 @@ type Configuration struct {
// http://nginx.org/en/docs/ngx_core_module.html#worker_processes
WorkerProcesses string `json:"worker-processes,omitempty"`
+ // Defines whether multiple concurrent reloads of worker processes should occur.
+ // Set this to false to prevent more than n x 2 workers to exist at any time, to avoid potential OOM situations and high CPU load
+ // With this setting on false, configuration changes in the queue will be re-queued with an exponential backoff, until the number of worker process is the expected value.
+ // By default new worker processes are spawned every time there's a change that cannot be applied dynamically with no upper limit to the number of running workers
+ // http://nginx.org/en/docs/ngx_core_module.html#worker_processes
+ WorkerSerialReloads bool `json:"enable-serial-reloads,omitempty"`
+
// Defines a timeout for a graceful shutdown of worker processes
// http://nginx.org/en/docs/ngx_core_module.html#worker_shutdown_timeout
WorkerShutdownTimeout string `json:"worker-shutdown-timeout,omitempty"`
@@ -851,6 +858,7 @@ func NewDefault() Configuration {
UseGeoIP2: false,
GeoIP2AutoReloadMinutes: 0,
WorkerProcesses: strconv.Itoa(runtime.NumCPU()),
+ WorkerSerialReloads: false,
WorkerShutdownTimeout: "240s",
VariablesHashBucketSize: 256,
VariablesHashMaxSize: 2048,
diff --git a/internal/ingress/controller/nginx.go b/internal/ingress/controller/nginx.go
index b81734154..f74b3245e 100644
--- a/internal/ingress/controller/nginx.go
+++ b/internal/ingress/controller/nginx.go
@@ -35,6 +35,7 @@ import (
"syscall"
"text/template"
"time"
+ "unicode"
proxyproto "github.com/armon/go-proxyproto"
"github.com/eapache/channels"
@@ -87,9 +88,10 @@ func NewNGINXController(config *Configuration, mc metric.Collector) *NGINXContro
n := &NGINXController{
isIPV6Enabled: ing_net.IsIPv6Enabled(),
- resolver: h,
- cfg: config,
- syncRateLimiter: flowcontrol.NewTokenBucketRateLimiter(config.SyncRateLimit, 1),
+ resolver: h,
+ cfg: config,
+ syncRateLimiter: flowcontrol.NewTokenBucketRateLimiter(config.SyncRateLimit, 1),
+ workersReloading: false,
recorder: eventBroadcaster.NewRecorder(scheme.Scheme, apiv1.EventSource{
Component: "nginx-ingress-controller",
@@ -229,6 +231,8 @@ type NGINXController struct {
syncRateLimiter flowcontrol.RateLimiter
+ workersReloading bool
+
// stopLock is used to enforce that only a single call to Stop send at
// a given time. We allow stopping through an HTTP endpoint and
// allowing concurrent stoppers leads to stack traces.
@@ -676,6 +680,11 @@ func (n *NGINXController) OnUpdate(ingressCfg ingress.Configuration) error {
cfg := n.store.GetBackendConfiguration()
cfg.Resolver = n.resolver
+ workerSerialReloads := cfg.WorkerSerialReloads
+ if workerSerialReloads && n.workersReloading {
+ return errors.New("worker reload already in progress, requeuing reload")
+ }
+
content, err := n.generateTemplate(cfg, ingressCfg)
if err != nil {
return err
@@ -738,9 +747,41 @@ func (n *NGINXController) OnUpdate(ingressCfg ingress.Configuration) error {
return fmt.Errorf("%v\n%v", err, string(o))
}
+ // Reload status checking runs in a separate goroutine to avoid blocking the sync queue
+ if workerSerialReloads {
+ go n.awaitWorkersReload()
+ }
+
return nil
}
+// awaitWorkersReload checks if the number of workers has returned to the expected count
+func (n *NGINXController) awaitWorkersReload() {
+ n.workersReloading = true
+ defer func() { n.workersReloading = false }()
+
+ expectedWorkers := n.store.GetBackendConfiguration().WorkerProcesses
+ var numWorkers string
+ klog.V(3).Infof("waiting for worker count to be equal to %s", expectedWorkers)
+ for numWorkers != expectedWorkers {
+ time.Sleep(time.Second)
+ o, err := exec.Command("/bin/sh", "-c", "pgrep worker | wc -l").Output()
+ if err != nil {
+ klog.ErrorS(err, numWorkers)
+ return
+ }
+ // cleanup any non-printable chars from shell output
+ numWorkers = strings.Map(func(r rune) rune {
+ if unicode.IsPrint(r) {
+ return r
+ }
+ return -1
+ }, string(o))
+
+ klog.V(3).Infof("Currently running nginx worker processes: %s, expected %s", numWorkers, expectedWorkers)
+ }
+}
+
// nginxHashBucketSize computes the correct NGINX hash_bucket_size for a hash
// with the given longest key.
func nginxHashBucketSize(longestString int) int {
diff --git a/internal/ingress/controller/template/configmap.go b/internal/ingress/controller/template/configmap.go
index f78dbad03..1a7f15f1c 100644
--- a/internal/ingress/controller/template/configmap.go
+++ b/internal/ingress/controller/template/configmap.go
@@ -69,6 +69,7 @@ const (
luaSharedDictsKey = "lua-shared-dicts"
plugins = "plugins"
debugConnections = "debug-connections"
+ workerSerialReloads = "enable-serial-reloads"
)
var (
@@ -404,6 +405,17 @@ func ReadConfig(src map[string]string) config.Configuration {
delete(conf, workerProcesses)
}
+ if val, ok := conf[workerSerialReloads]; ok {
+ boolVal, err := strconv.ParseBool(val)
+ if err != nil {
+ to.WorkerSerialReloads = false
+ klog.Warningf("failed to parse enable-serial-reloads setting, valid values are true or false, found %s", val)
+ } else {
+ to.WorkerSerialReloads = boolVal
+ }
+ delete(conf, workerSerialReloads)
+ }
+
if val, ok := conf[plugins]; ok {
to.Plugins = splitAndTrimSpace(val, ",")
delete(conf, plugins)
From 20d9a609b57934fe2d939ec4b34e2b8634a6d73f Mon Sep 17 00:00:00 2001
From: Lucas Andrade Flores
Date: Wed, 15 May 2024 22:23:21 +0200
Subject: [PATCH 059/283] Docs: Remove opentracing and zipkin from docs
(#11361)
---
.../nginx-configuration/annotations.md | 20 --
.../nginx-configuration/configmap.md | 42 ---
.../third-party-addons/opentracing.md | 263 ------------------
3 files changed, 325 deletions(-)
delete mode 100644 docs/user-guide/third-party-addons/opentracing.md
diff --git a/docs/user-guide/nginx-configuration/annotations.md b/docs/user-guide/nginx-configuration/annotations.md
index 2230f80f7..cf4902c1e 100755
--- a/docs/user-guide/nginx-configuration/annotations.md
+++ b/docs/user-guide/nginx-configuration/annotations.md
@@ -124,8 +124,6 @@ You can add these Kubernetes annotations to specific Ingress objects to customiz
|[nginx.ingress.kubernetes.io/ssl-prefer-server-ciphers](#ssl-ciphers)|"true" or "false"|
|[nginx.ingress.kubernetes.io/connection-proxy-header](#connection-proxy-header)|string|
|[nginx.ingress.kubernetes.io/enable-access-log](#enable-access-log)|"true" or "false"|
-|[nginx.ingress.kubernetes.io/enable-opentracing](#enable-opentracing)|"true" or "false"|
-|[nginx.ingress.kubernetes.io/opentracing-trust-incoming-span](#opentracing-trust-incoming-span)|"true" or "false"|
|[nginx.ingress.kubernetes.io/enable-opentelemetry](#enable-opentelemetry)|"true" or "false"|
|[nginx.ingress.kubernetes.io/opentelemetry-trust-incoming-span](#opentelemetry-trust-incoming-spans)|"true" or "false"|
|[nginx.ingress.kubernetes.io/use-regex](#use-regex)|bool|
@@ -830,24 +828,6 @@ Note that rewrite logs are sent to the error_log file at the notice level. To en
nginx.ingress.kubernetes.io/enable-rewrite-log: "true"
```
-### Enable Opentracing
-
-Opentracing can be enabled or disabled globally through the ConfigMap but this will sometimes need to be overridden
-to enable it or disable it for a specific ingress (e.g. to turn off tracing of external health check endpoints)
-
-```yaml
-nginx.ingress.kubernetes.io/enable-opentracing: "true"
-```
-
-### Opentracing Trust Incoming Span
-
-The option to trust incoming trace spans can be enabled or disabled globally through the ConfigMap but this will
-sometimes need to be overridden to enable it or disable it for a specific ingress (e.g. only enable on a private endpoint)
-
-```yaml
-nginx.ingress.kubernetes.io/opentracing-trust-incoming-span: "true"
-```
-
### Enable Opentelemetry
Opentelemetry can be enabled or disabled globally through the ConfigMap but this will sometimes need to be overridden
diff --git a/docs/user-guide/nginx-configuration/configmap.md b/docs/user-guide/nginx-configuration/configmap.md
index 13f82a17d..3127f73a4 100644
--- a/docs/user-guide/nginx-configuration/configmap.md
+++ b/docs/user-guide/nginx-configuration/configmap.md
@@ -135,13 +135,6 @@ The following table shows a configuration option's name, type, and the default v
|[compute-full-forwarded-for](#compute-full-forwarded-for)| bool | "false" ||
|[proxy-add-original-uri-header](#proxy-add-original-uri-header)| bool | "false" ||
|[generate-request-id](#generate-request-id)| bool | "true" ||
-|[enable-opentracing](#enable-opentracing)| bool | "false" ||
-|[opentracing-operation-name](#opentracing-operation-name)| string | "" ||
-|[opentracing-location-operation-name](#opentracing-location-operation-name)| string | "" ||
-|[zipkin-collector-host](#zipkin-collector-host)| string | "" ||
-|[zipkin-collector-port](#zipkin-collector-port)| int | 9411 ||
-|[zipkin-service-name](#zipkin-service-name)| string | "nginx" ||
-|[zipkin-sample-rate](#zipkin-sample-rate)| float | 1.0 ||
|[jaeger-collector-host](#jaeger-collector-host)| string | "" ||
|[jaeger-collector-port](#jaeger-collector-port)| int | 6831 ||
|[jaeger-endpoint](#jaeger-endpoint)| string | "" ||
@@ -945,41 +938,6 @@ Adds an X-Original-Uri header with the original request URI to the backend reque
Ensures that X-Request-ID is defaulted to a random value, if no X-Request-ID is present in the request
-## enable-opentracing
-
-Enables the nginx Opentracing extension. _**default:**_ is disabled
-
-_References:_
-[https://github.com/opentracing-contrib/nginx-opentracing](https://github.com/opentracing-contrib/nginx-opentracing)
-
-## opentracing-operation-name
-
-Specifies a custom name for the server span. _**default:**_ is empty
-
-For example, set to "HTTP $request_method $uri".
-
-## opentracing-location-operation-name
-
-Specifies a custom name for the location span. _**default:**_ is empty
-
-For example, set to "HTTP $request_method $uri".
-
-## zipkin-collector-host
-
-Specifies the host to use when uploading traces. It must be a valid URL.
-
-## zipkin-collector-port
-
-Specifies the port to use when uploading traces. _**default:**_ 9411
-
-## zipkin-service-name
-
-Specifies the service name to use for any traces created. _**default:**_ nginx
-
-## zipkin-sample-rate
-
-Specifies sample rate for any traces created. _**default:**_ 1.0
-
## jaeger-collector-host
Specifies the host to use when uploading traces. It must be a valid URL.
diff --git a/docs/user-guide/third-party-addons/opentracing.md b/docs/user-guide/third-party-addons/opentracing.md
deleted file mode 100644
index f5ec59faf..000000000
--- a/docs/user-guide/third-party-addons/opentracing.md
+++ /dev/null
@@ -1,263 +0,0 @@
-# OpenTracing
-
-Enables requests served by NGINX for distributed tracing via The OpenTracing Project.
-
-Using the third party module [opentracing-contrib/nginx-opentracing](https://github.com/opentracing-contrib/nginx-opentracing) the Ingress-Nginx Controller can configure NGINX to enable [OpenTracing](http://opentracing.io) instrumentation.
-By default this feature is disabled.
-
-## Usage
-
-To enable the instrumentation we must enable OpenTracing in the configuration ConfigMap:
-```
-data:
- enable-opentracing: "true"
-```
-
-To enable or disable instrumentation for a single Ingress, use
-the `enable-opentracing` annotation:
-```
-kind: Ingress
-metadata:
- annotations:
- nginx.ingress.kubernetes.io/enable-opentracing: "true"
-```
-
-We must also set the host to use when uploading traces:
-
-```
-zipkin-collector-host: zipkin.default.svc.cluster.local
-jaeger-collector-host: jaeger-agent.default.svc.cluster.local
-datadog-collector-host: datadog-agent.default.svc.cluster.local
-```
-NOTE: While the option is called `jaeger-collector-host`, you will need to point this to a `jaeger-agent`, and not the `jaeger-collector` component.
-Alternatively, you can set `jaeger-endpoint` and specify the full endpoint for uploading traces. This will use TCP and should be used for a collector rather than an agent.
-
-Next you will need to deploy a distributed tracing system which uses OpenTracing.
-[Zipkin](https://github.com/openzipkin/zipkin) and
-[Jaeger](https://github.com/jaegertracing/jaeger) and
-[Datadog](https://github.com/DataDog/dd-opentracing-cpp)
-have been tested.
-
-Other optional configuration options:
-```
-# specifies the name to use for the server span
-opentracing-operation-name
-
-# specifies specifies the name to use for the location span
-opentracing-location-operation-name
-
-# sets whether or not to trust incoming tracing spans
-opentracing-trust-incoming-span
-
-# specifies the port to use when uploading traces, Default: 9411
-zipkin-collector-port
-
-# specifies the service name to use for any traces created, Default: nginx
-zipkin-service-name
-
-# specifies sample rate for any traces created, Default: 1.0
-zipkin-sample-rate
-
-# specifies the port to use when uploading traces, Default: 6831
-jaeger-collector-port
-
-# specifies the endpoint to use when uploading traces to a collector instead of an agent
-jaeger-endpoint
-
-# specifies the service name to use for any traces created, Default: nginx
-jaeger-service-name
-
-# specifies the traceparent/tracestate propagation format
-jaeger-propagation-format
-
-# specifies the sampler to be used when sampling traces.
-# The available samplers are: const, probabilistic, ratelimiting, remote, Default: const
-jaeger-sampler-type
-
-# specifies the argument to be passed to the sampler constructor, Default: 1
-jaeger-sampler-param
-
-# Specifies the custom remote sampler host to be passed to the sampler constructor. Must be a valid URL.
-# Default: http://127.0.0.1
-jaeger-sampler-host
-
-# Specifies the custom remote sampler port to be passed to the sampler constructor. Must be a number. Default: 5778
-jaeger-sampler-port
-
-# Specifies the header name used for passing trace context. Must be a string. Default: uber-trace-id
-jaeger-trace-context-header-name
-
-# Specifies the header name used for force sampling. Must be a string. Default: jaeger-debug-id
-jaeger-debug-header
-
-# Specifies the header name used to submit baggage if there is no root span. Must be a string. Default: jaeger-baggage
-jaeger-baggage-header
-
-# Specifies the header prefix used to propagate baggage. Must be a string. Default: uberctx-
-jaeger-tracer-baggage-header-prefix
-
-# specifies the port to use when uploading traces, Default 8126
-datadog-collector-port
-
-# specifies the service name to use for any traces created, Default: nginx
-datadog-service-name
-
-# specifies the environment this trace belongs to, Default: prod
-datadog-environment
-
-# specifies the operation name to use for any traces collected, Default: nginx.handle
-datadog-operation-name-override
-
-# Specifies to use client-side sampling for distributed priority sampling and ignore sample rate, Default: true
-datadog-priority-sampling
-
-# specifies sample rate for any traces created, Default: 1.0
-datadog-sample-rate
-```
-
-All these options (including host) allow environment variables, such as `$HOSTNAME` or `$HOST_IP`. In the case of Jaeger, if you have a Jaeger agent running on each machine in your cluster, you can use something like `$HOST_IP` (which can be 'mounted' with the `status.hostIP` fieldpath, as described [here](https://kubernetes.io/docs/tasks/inject-data-application/downward-api-volume-expose-pod-information/#capabilities-of-the-downward-api)) to make sure traces will be sent to the local agent.
-
-
-Note that you can also set whether to trust incoming spans (global default is true) per-location using annotations like the following:
-```
-kind: Ingress
-metadata:
- annotations:
- nginx.ingress.kubernetes.io/opentracing-trust-incoming-span: "true"
-```
-
-## Examples
-
-The following examples show how to deploy and test different distributed tracing systems. These example can be performed using Minikube.
-
-### Zipkin
-
-In the [rnburn/zipkin-date-server](https://github.com/rnburn/zipkin-date-server)
-GitHub repository is an example of a dockerized date service. To install the example and Zipkin collector run:
-
-```
-kubectl create -f https://raw.githubusercontent.com/rnburn/zipkin-date-server/master/kubernetes/zipkin.yaml
-kubectl create -f https://raw.githubusercontent.com/rnburn/zipkin-date-server/master/kubernetes/deployment.yaml
-```
-
-Also we need to configure the Ingress-NGINX controller ConfigMap with the required values:
-
-```
-$ echo '
-apiVersion: v1
-kind: ConfigMap
-data:
- enable-opentracing: "true"
- zipkin-collector-host: zipkin.default.svc.cluster.local
-metadata:
- name: ingress-nginx-controller
- namespace: kube-system
-' | kubectl replace -f -
-```
-
-In the Zipkin interface we can see the details:
-
-
-### Jaeger
-
-1. Enable Ingress addon in Minikube:
- ```
- $ minikube addons enable ingress
- ```
-
-2. Add Minikube IP to /etc/hosts:
- ```
- $ echo "$(minikube ip) example.com" | sudo tee -a /etc/hosts
- ```
-
-3. Apply a basic Service and Ingress Resource:
- ```
- # Create Echoheaders Deployment
- $ kubectl run echoheaders --image=registry.k8s.io/echoserver:1.4 --replicas=1 --port=8080
-
- # Expose as a Cluster-IP
- $ kubectl expose deployment echoheaders --port=80 --target-port=8080 --name=echoheaders-x
-
- # Apply the Ingress Resource
- $ echo '
- apiVersion: networking.k8s.io/v1
- kind: Ingress
- metadata:
- name: echo-ingress
- spec:
- ingressClassName: nginx
- rules:
- - host: example.com
- http:
- paths:
- - path: /echo
- pathType: Prefix
- backend:
- service:
- name: echoheaders-x
- port:
- number: 80
- ' | kubectl apply -f -
- ```
-
-4. Enable OpenTracing and set the jaeger-collector-host:
- ```
- $ echo '
- apiVersion: v1
- kind: ConfigMap
- data:
- enable-opentracing: "true"
- jaeger-collector-host: jaeger-agent.default.svc.cluster.local
- metadata:
- name: ingress-nginx-controller
- namespace: kube-system
- ' | kubectl replace -f -
- ```
-
-5. Apply the Jaeger All-In-One Template:
- ```
- $ kubectl apply -f https://raw.githubusercontent.com/jaegertracing/jaeger-kubernetes/master/all-in-one/jaeger-all-in-one-template.yml
- ```
-
-6. Make a few requests to the Service:
- ```
- $ curl example.com/echo -d "meow"
-
- CLIENT VALUES:
- client_address=172.17.0.5
- command=POST
- real path=/echo
- query=nil
- request_version=1.1
- request_uri=http://example.com:8080/echo
-
- SERVER VALUES:
- server_version=nginx: 1.10.0 - lua: 10001
-
- HEADERS RECEIVED:
- accept=*/*
- connection=close
- content-length=4
- content-type=application/x-www-form-urlencoded
- host=example.com
- user-agent=curl/7.54.0
- x-forwarded-for=192.168.99.1
- x-forwarded-host=example.com
- x-forwarded-port=80
- x-forwarded-proto=http
- x-original-uri=/echo
- x-real-ip=192.168.99.1
- x-scheme=http
- BODY:
- meow
- ```
-
-7. View the Jaeger UI:
- ```
- $ minikube service jaeger-query --url
-
- http://192.168.99.100:30183
- ```
-
- In the Jaeger interface we can see the details:
- 
From ac0f6fcd398065bd2ce54c655480a7ed32526127 Mon Sep 17 00:00:00 2001
From: Nicholas Orlowsky
Date: Sat, 18 May 2024 02:44:18 +0200
Subject: [PATCH 060/283] fix lint errors
---
pkg/util/runtime/cpu_linux.go | 11 +++------
test/e2e/cgroups/cgroups.go | 46 ++++++++++++++++++++++++++---------
2 files changed, 38 insertions(+), 19 deletions(-)
diff --git a/pkg/util/runtime/cpu_linux.go b/pkg/util/runtime/cpu_linux.go
index c97184bcf..9cb260c4b 100644
--- a/pkg/util/runtime/cpu_linux.go
+++ b/pkg/util/runtime/cpu_linux.go
@@ -64,14 +64,13 @@ func GetCgroupVersion() int64 {
// /sys/fs/cgroup/cgroup.controllers will not exist with cgroupsv1
if _, err := os.Stat("/sys/fs/cgroup/cgroup.controllers"); err == nil {
return 2
- } else {
- return 1
}
+
+ return 1
}
-func readCgroup2FileToInt64Tuple(cgroupFile string) (int64, int64) {
- contents, err := os.ReadFile(filepath.Join("/sys/fs/cgroup/", cgroupFile))
-
+func readCgroup2FileToInt64Tuple(cgroupFile string) (quota, period int64) {
+ contents, err := os.ReadFile(filepath.Join(string(os.PathSeparator), "sys", "fs", "cgroup", cgroupFile))
if err != nil {
return -1, -1
}
@@ -87,7 +86,6 @@ func readCgroup2FileToInt64Tuple(cgroupFile string) (int64, int64) {
}
cpuQuota, err := strconv.ParseInt(values[0], 10, 64)
-
if err != nil {
return -1, -1
}
@@ -97,7 +95,6 @@ func readCgroup2FileToInt64Tuple(cgroupFile string) (int64, int64) {
}
cpuPeriod, err := strconv.ParseInt(values[1], 10, 64)
-
if err != nil {
return -1, -1
}
diff --git a/test/e2e/cgroups/cgroups.go b/test/e2e/cgroups/cgroups.go
index 6ad8558df..e01f683e4 100644
--- a/test/e2e/cgroups/cgroups.go
+++ b/test/e2e/cgroups/cgroups.go
@@ -19,6 +19,7 @@ package cgroups
import (
"log"
"os"
+ "path/filepath"
"github.com/onsi/ginkgo/v2"
"github.com/stretchr/testify/assert"
@@ -26,7 +27,6 @@ import (
"k8s.io/ingress-nginx/test/e2e/framework"
"k8s.io/ingress-nginx/pkg/util/runtime"
- "path/filepath"
libcontainercgroups "github.com/opencontainers/runc/libcontainer/cgroups"
)
@@ -46,22 +46,34 @@ var _ = framework.IngressNginxDescribeSerial("[CGroups] cgroups", func() {
}
quotaFile, err := os.Create(filepath.Join(cgroupPath, "cpu.cfs_quota_us"))
-
if err != nil {
log.Fatal(err)
}
periodFile, err := os.Create(filepath.Join(cgroupPath, "cpu.cfs_period_us"))
-
if err != nil {
log.Fatal(err)
}
- quotaFile.WriteString("4")
- quotaFile.Sync()
+ _, err = quotaFile.WriteString("4")
+ if err != nil {
+ log.Fatal(err)
+ }
- periodFile.WriteString("2")
- periodFile.Sync()
+ err = quotaFile.Sync()
+ if err != nil {
+ log.Fatal(err)
+ }
+
+ _, err = periodFile.WriteString("2")
+ if err != nil {
+ log.Fatal(err)
+ }
+
+ err = periodFile.Sync()
+ if err != nil {
+ log.Fatal(err)
+ }
assert.Equal(ginkgo.GinkgoT(), runtime.GetCgroupVersion(), int64(1))
assert.Equal(ginkgo.GinkgoT(), runtime.NumCPU(), 2)
@@ -75,15 +87,25 @@ var _ = framework.IngressNginxDescribeSerial("[CGroups] cgroups", func() {
log.Fatal(err)
}
- os.Create("/sys/fs/cgroup/cgroup.controllers")
- file, err := os.Create("/sys/fs/cgroup/cpu.max")
-
+ _, err := os.Create("/sys/fs/cgroup/cgroup.controllers")
if err != nil {
log.Fatal(err)
}
- file.WriteString("4 2")
- file.Sync()
+ file, err := os.Create("/sys/fs/cgroup/cpu.max")
+ if err != nil {
+ log.Fatal(err)
+ }
+
+ _, err = file.WriteString("4 2")
+ if err != nil {
+ log.Fatal(err)
+ }
+
+ err = file.Sync()
+ if err != nil {
+ log.Fatal(err)
+ }
assert.Equal(ginkgo.GinkgoT(), runtime.GetCgroupVersion(), int64(2))
assert.Equal(ginkgo.GinkgoT(), runtime.NumCPU(), 2)
From b2d67ff92bad02c041be12b7f02d66fc417a2e6a Mon Sep 17 00:00:00 2001
From: Nicholas Orlowsky
Date: Mon, 20 May 2024 14:37:46 +0200
Subject: [PATCH 061/283] fix tests
---
pkg/util/runtime/cpu_linux.go | 62 +++++++++++++++++++++++++----------
test/e2e/cgroups/cgroups.go | 26 +++++++--------
2 files changed, 56 insertions(+), 32 deletions(-)
diff --git a/pkg/util/runtime/cpu_linux.go b/pkg/util/runtime/cpu_linux.go
index 9cb260c4b..7db609053 100644
--- a/pkg/util/runtime/cpu_linux.go
+++ b/pkg/util/runtime/cpu_linux.go
@@ -36,21 +36,41 @@ import (
//
// https://www.kernel.org/doc/Documentation/scheduler/sched-bwc.txt
func NumCPU() int {
+ return NumCPUWithCustomPath("")
+}
+
+func NumCPUWithCustomPath(path string) int {
cpus := runtime.NumCPU()
- cgroupVersion := GetCgroupVersion()
+ cgroupVersionCheckPath := path
+
+ if cgroupVersionCheckPath == "" {
+ cgroupVersionCheckPath = "/sys/fs/cgroup/"
+ }
+
+ cgroupVersion := GetCgroupVersion(cgroupVersionCheckPath)
cpuQuota := int64(-1)
cpuPeriod := int64(-1)
if cgroupVersion == 1 {
- cgroupPath, err := libcontainercgroups.FindCgroupMountpoint("", "cpu")
- if err != nil {
- return cpus
+ cgroupPath := ""
+ if path == "" {
+ cgroupPathRd, err := libcontainercgroups.FindCgroupMountpoint("", "cpu")
+ if err != nil {
+ return cpus
+ }
+ cgroupPath = cgroupPathRd
+ } else {
+ cgroupPath = path
}
cpuQuota = readCgroupFileToInt64(cgroupPath, "cpu.cfs_quota_us")
cpuPeriod = readCgroupFileToInt64(cgroupPath, "cpu.cfs_period_us")
} else if cgroupVersion == 2 {
- cpuQuota, cpuPeriod = readCgroup2FileToInt64Tuple("cpu.max")
+ cgroupPath := "/sys/fs/cgroup/"
+ if path != "" {
+ cgroupPath = path
+ }
+ cpuQuota, cpuPeriod = readCgroup2FileToInt64Tuple(cgroupPath, "cpu.max")
}
if cpuQuota == -1 || cpuPeriod == -1 {
@@ -60,26 +80,21 @@ func NumCPU() int {
return int(math.Ceil(float64(cpuQuota) / float64(cpuPeriod)))
}
-func GetCgroupVersion() int64 {
+func GetCgroupVersion(cgroupPath string) int64 {
// /sys/fs/cgroup/cgroup.controllers will not exist with cgroupsv1
- if _, err := os.Stat("/sys/fs/cgroup/cgroup.controllers"); err == nil {
+ if _, err := os.Stat(filepath.Join(cgroupPath, "cgroup.controllers")); err == nil {
return 2
}
return 1
}
-func readCgroup2FileToInt64Tuple(cgroupFile string) (quota, period int64) {
- contents, err := os.ReadFile(filepath.Join(string(os.PathSeparator), "sys", "fs", "cgroup", cgroupFile))
- if err != nil {
- return -1, -1
- }
-
+func readCgroup2StringToInt64Tuple(cgroupString string) (quota, period int64) {
// file contents looks like: $MAX $PERIOD
// $MAX can have value "max" indicating no limit
// it is possible for $PERIOD to be unset
- values := strings.Fields(string(contents))
+ values := strings.Fields(cgroupString)
if values[0] == "max" {
return -1, -1
@@ -102,16 +117,29 @@ func readCgroup2FileToInt64Tuple(cgroupFile string) (quota, period int64) {
return cpuQuota, cpuPeriod
}
-func readCgroupFileToInt64(cgroupPath, cgroupFile string) int64 {
+func readCgroup2FileToInt64Tuple(cgroupPath, cgroupFile string) (quota, period int64) {
contents, err := os.ReadFile(filepath.Join(cgroupPath, cgroupFile))
if err != nil {
- return -1
+ return -1, -1
}
- strValue := strings.TrimSpace(string(contents))
+ return readCgroup2StringToInt64Tuple(string(contents))
+}
+
+func readCgroupStringToInt64(contents string) int64 {
+ strValue := strings.TrimSpace(contents)
if value, err := strconv.ParseInt(strValue, 10, 64); err == nil {
return value
}
return -1
}
+
+func readCgroupFileToInt64(cgroupPath, cgroupFile string) int64 {
+ contents, err := os.ReadFile(filepath.Join(cgroupPath, cgroupFile))
+ if err != nil {
+ return -1
+ }
+
+ return readCgroupStringToInt64(string(contents))
+}
diff --git a/test/e2e/cgroups/cgroups.go b/test/e2e/cgroups/cgroups.go
index e01f683e4..59c6f6bf6 100644
--- a/test/e2e/cgroups/cgroups.go
+++ b/test/e2e/cgroups/cgroups.go
@@ -27,8 +27,6 @@ import (
"k8s.io/ingress-nginx/test/e2e/framework"
"k8s.io/ingress-nginx/pkg/util/runtime"
-
- libcontainercgroups "github.com/opencontainers/runc/libcontainer/cgroups"
)
var _ = framework.IngressNginxDescribeSerial("[CGroups] cgroups", func() {
@@ -40,10 +38,7 @@ var _ = framework.IngressNginxDescribeSerial("[CGroups] cgroups", func() {
})
ginkgo.It("detects cgroups version v1", func() {
- cgroupPath, err := libcontainercgroups.FindCgroupMountpoint("", "cpu")
- if err != nil {
- log.Fatal(err)
- }
+ cgroupPath := "/testing/sys/fs/cgroup/"
quotaFile, err := os.Create(filepath.Join(cgroupPath, "cpu.cfs_quota_us"))
if err != nil {
@@ -75,24 +70,25 @@ var _ = framework.IngressNginxDescribeSerial("[CGroups] cgroups", func() {
log.Fatal(err)
}
- assert.Equal(ginkgo.GinkgoT(), runtime.GetCgroupVersion(), int64(1))
- assert.Equal(ginkgo.GinkgoT(), runtime.NumCPU(), 2)
+ assert.Equal(ginkgo.GinkgoT(), runtime.GetCgroupVersion(cgroupPath), int64(1))
+ assert.Equal(ginkgo.GinkgoT(), runtime.NumCPUWithCustomPath(cgroupPath), 2)
os.Remove(filepath.Join(cgroupPath, "cpu.cfs_quota_us"))
os.Remove(filepath.Join(cgroupPath, "cpu.cfs_period_us"))
})
ginkgo.It("detect cgroups version v2", func() {
- if err := os.MkdirAll("/sys/fs/cgroup/", os.ModePerm); err != nil {
+ cgroupPath := "/testing/sys/fs/cgroup/"
+ if err := os.MkdirAll(cgroupPath, os.ModePerm); err != nil {
log.Fatal(err)
}
- _, err := os.Create("/sys/fs/cgroup/cgroup.controllers")
+ _, err := os.Create(filepath.Join(cgroupPath, "cgroup.controllers"))
if err != nil {
log.Fatal(err)
}
- file, err := os.Create("/sys/fs/cgroup/cpu.max")
+ file, err := os.Create(filepath.Join(cgroupPath, "cpu.max"))
if err != nil {
log.Fatal(err)
}
@@ -107,10 +103,10 @@ var _ = framework.IngressNginxDescribeSerial("[CGroups] cgroups", func() {
log.Fatal(err)
}
- assert.Equal(ginkgo.GinkgoT(), runtime.GetCgroupVersion(), int64(2))
- assert.Equal(ginkgo.GinkgoT(), runtime.NumCPU(), 2)
+ assert.Equal(ginkgo.GinkgoT(), runtime.GetCgroupVersion(cgroupPath), int64(2))
+ assert.Equal(ginkgo.GinkgoT(), runtime.NumCPUWithCustomPath(cgroupPath), 2)
- os.Remove("/sys/fs/cgroup/cpu.max")
- os.Remove("/sys/fs/cgroup/cgroup.controllers")
+ os.Remove(filepath.Join(cgroupPath, "cpu.max"))
+ os.Remove(filepath.Join(cgroupPath, "cgroup.controllers"))
})
})
From e9f371787e82e11b6009b77d740e88edd8691bf8 Mon Sep 17 00:00:00 2001
From: Nicholas Orlowsky
Date: Mon, 20 May 2024 16:14:39 +0200
Subject: [PATCH 062/283] fix v1 test
---
test/e2e/cgroups/cgroups.go | 3 +++
1 file changed, 3 insertions(+)
diff --git a/test/e2e/cgroups/cgroups.go b/test/e2e/cgroups/cgroups.go
index 59c6f6bf6..eab194324 100644
--- a/test/e2e/cgroups/cgroups.go
+++ b/test/e2e/cgroups/cgroups.go
@@ -39,6 +39,9 @@ var _ = framework.IngressNginxDescribeSerial("[CGroups] cgroups", func() {
ginkgo.It("detects cgroups version v1", func() {
cgroupPath := "/testing/sys/fs/cgroup/"
+ if err := os.MkdirAll(cgroupPath, os.ModePerm); err != nil {
+ log.Fatal(err)
+ }
quotaFile, err := os.Create(filepath.Join(cgroupPath, "cpu.cfs_quota_us"))
if err != nil {
From 95efaf3e394cbe7fa280d754261a861e5e4f67aa Mon Sep 17 00:00:00 2001
From: Carlos Parada
Date: Wed, 22 May 2024 14:08:30 +0100
Subject: [PATCH 063/283] Accept user defined annotations in IngressClass
(#11362)
---
charts/ingress-nginx/README.md | 3 ++-
.../ingress-nginx/templates/controller-ingressclass.yaml | 7 +++++--
charts/ingress-nginx/values.yaml | 2 ++
3 files changed, 9 insertions(+), 3 deletions(-)
diff --git a/charts/ingress-nginx/README.md b/charts/ingress-nginx/README.md
index 8ea6bae85..8171d4e1d 100644
--- a/charts/ingress-nginx/README.md
+++ b/charts/ingress-nginx/README.md
@@ -332,8 +332,9 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
| controller.image.tag | string | `"v1.10.0"` | |
| controller.ingressClass | string | `"nginx"` | For backwards compatibility with ingress.class annotation, use ingressClass. Algorithm is as follows, first ingressClassName is considered, if not present, controller looks for ingress.class annotation |
| controller.ingressClassByName | bool | `false` | Process IngressClass per name (additionally as per spec.controller). |
-| controller.ingressClassResource | object | `{"aliases":[],"controllerValue":"k8s.io/ingress-nginx","default":false,"enabled":true,"name":"nginx","parameters":{}}` | This section refers to the creation of the IngressClass resource. IngressClasses are immutable and cannot be changed after creation. We do not support namespaced IngressClasses, yet, so a ClusterRole and a ClusterRoleBinding is required. |
+| controller.ingressClassResource | object | `{"aliases":[],"annotations":{},"controllerValue":"k8s.io/ingress-nginx","default":false,"enabled":true,"name":"nginx","parameters":{}}` | This section refers to the creation of the IngressClass resource. IngressClasses are immutable and cannot be changed after creation. We do not support namespaced IngressClasses, yet, so a ClusterRole and a ClusterRoleBinding is required. |
| controller.ingressClassResource.aliases | list | `[]` | Aliases of this IngressClass. Creates copies with identical settings but the respective alias as name. Useful for development environments with only one Ingress Controller but production-like Ingress resources. `default` gets enabled on the original IngressClass only. |
+| controller.ingressClassResource.annotations | object | `{}` | Annotations to be added to the IngressClass resource. |
| controller.ingressClassResource.controllerValue | string | `"k8s.io/ingress-nginx"` | Controller of the IngressClass. An Ingress Controller looks for IngressClasses it should reconcile by this value. This value is also being set as the `--controller-class` argument of this Ingress Controller. Ref: https://kubernetes.io/docs/concepts/services-networking/ingress/#ingress-class |
| controller.ingressClassResource.default | bool | `false` | If true, Ingresses without `ingressClassName` get assigned to this IngressClass on creation. Ingress creation gets rejected if there are multiple default IngressClasses. Ref: https://kubernetes.io/docs/concepts/services-networking/ingress/#default-ingress-class |
| controller.ingressClassResource.enabled | bool | `true` | Create the IngressClass or not |
diff --git a/charts/ingress-nginx/templates/controller-ingressclass.yaml b/charts/ingress-nginx/templates/controller-ingressclass.yaml
index e439e0adb..18cace48c 100644
--- a/charts/ingress-nginx/templates/controller-ingressclass.yaml
+++ b/charts/ingress-nginx/templates/controller-ingressclass.yaml
@@ -9,10 +9,13 @@ metadata:
{{- toYaml . | nindent 4 }}
{{- end }}
name: {{ .Values.controller.ingressClassResource.name }}
- {{- if .Values.controller.ingressClassResource.default }}
annotations:
+ {{- if .Values.controller.ingressClassResource.default }}
ingressclass.kubernetes.io/is-default-class: "true"
- {{- end }}
+ {{- end }}
+ {{- if .Values.controller.ingressClassResource.annotations }}
+ {{- toYaml .Values.controller.ingressClassResource.annotations | nindent 4 }}
+ {{- end }}
spec:
controller: {{ .Values.controller.ingressClassResource.controllerValue }}
{{- with .Values.controller.ingressClassResource.parameters }}
diff --git a/charts/ingress-nginx/values.yaml b/charts/ingress-nginx/values.yaml
index 2a361614c..37aa0f73b 100644
--- a/charts/ingress-nginx/values.yaml
+++ b/charts/ingress-nginx/values.yaml
@@ -127,6 +127,8 @@ controller:
# Ingress creation gets rejected if there are multiple default IngressClasses.
# Ref: https://kubernetes.io/docs/concepts/services-networking/ingress/#default-ingress-class
default: false
+ # -- Annotations to be added to the IngressClass resource.
+ annotations: {}
# -- Controller of the IngressClass. An Ingress Controller looks for IngressClasses it should reconcile by this value.
# This value is also being set as the `--controller-class` argument of this Ingress Controller.
# Ref: https://kubernetes.io/docs/concepts/services-networking/ingress/#ingress-class
From 8737642126b8f8148a0f0be23d9466f97ba158e1 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Thu, 23 May 2024 05:10:14 -0700
Subject: [PATCH 064/283] Bump golangci/golangci-lint-action from 5.3.0 to
6.0.1 (#11355)
Bumps [golangci/golangci-lint-action](https://github.com/golangci/golangci-lint-action) from 5.3.0 to 6.0.1.
- [Release notes](https://github.com/golangci/golangci-lint-action/releases)
- [Commits](https://github.com/golangci/golangci-lint-action/compare/38e1018663fa5173f3968ea0777460d3de38f256...a4f60bb28d35aeee14e6880718e0c85ff1882e64)
---
updated-dependencies:
- dependency-name: golangci/golangci-lint-action
dependency-type: direct:production
update-type: version-update:semver-major
...
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
.github/workflows/golangci-lint.yml | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/.github/workflows/golangci-lint.yml b/.github/workflows/golangci-lint.yml
index ff04ab3da..91fbbe088 100644
--- a/.github/workflows/golangci-lint.yml
+++ b/.github/workflows/golangci-lint.yml
@@ -28,6 +28,6 @@ jobs:
check-latest: true
- name: golangci-lint
- uses: golangci/golangci-lint-action@38e1018663fa5173f3968ea0777460d3de38f256 # v5.3.0
+ uses: golangci/golangci-lint-action@a4f60bb28d35aeee14e6880718e0c85ff1882e64 # v6.0.1
with:
version: v1.56
From b540a1f7c52cfb904813863f55ff6cac6a77cdf0 Mon Sep 17 00:00:00 2001
From: k8s-infra-cherrypick-robot
<90416843+k8s-infra-cherrypick-robot@users.noreply.github.com>
Date: Thu, 23 May 2024 10:02:35 -0700
Subject: [PATCH 065/283] add workflow to helm release and update ct for branch
(#11378)
Signed-off-by: James Strong
Co-authored-by: James Strong
---
.github/workflows/helm.yaml | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/.github/workflows/helm.yaml b/.github/workflows/helm.yaml
index 1da3972b0..f6ef5a680 100644
--- a/.github/workflows/helm.yaml
+++ b/.github/workflows/helm.yaml
@@ -5,6 +5,8 @@ on:
branches:
- main
- release-*
+
+ workflow_dispatch:
permissions:
contents: read
@@ -39,7 +41,7 @@ jobs:
uses: helm/chart-testing-action@e6669bcd63d7cb57cb4380c33043eebe5d111992 # v2.6.1
- name: Run chart-testing (lint)
- run: ct lint --config ./.ct.yaml
+ run: ct lint --config --target-branch ${{ github.ref_name }} ./.ct.yaml
- uses: dorny/paths-filter@de90cc6fb38fc0963ad72b210f1f284cd68cea36 # v3.0.2
id: filter
From 3b1908e20693c57a97b55d8a563da284a5dbf36c Mon Sep 17 00:00:00 2001
From: k8s-infra-cherrypick-robot
<90416843+k8s-infra-cherrypick-robot@users.noreply.github.com>
Date: Thu, 23 May 2024 10:13:59 -0700
Subject: [PATCH 066/283] sfix position of options (#11379)
Co-authored-by: James Strong
---
.github/workflows/helm.yaml | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/.github/workflows/helm.yaml b/.github/workflows/helm.yaml
index f6ef5a680..24674e3f2 100644
--- a/.github/workflows/helm.yaml
+++ b/.github/workflows/helm.yaml
@@ -41,7 +41,7 @@ jobs:
uses: helm/chart-testing-action@e6669bcd63d7cb57cb4380c33043eebe5d111992 # v2.6.1
- name: Run chart-testing (lint)
- run: ct lint --config --target-branch ${{ github.ref_name }} ./.ct.yaml
+ run: ct lint --target-branch ${{ github.ref_name }} --config ./.ct.yaml
- uses: dorny/paths-filter@de90cc6fb38fc0963ad72b210f1f284cd68cea36 # v3.0.2
id: filter
From d0e9934789d5f07699788d5fa1f3819ebc0a8919 Mon Sep 17 00:00:00 2001
From: Anddd7
Date: Mon, 27 May 2024 00:37:11 +0800
Subject: [PATCH 067/283] feat: Add grpc timeouts annotations (#11258)
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
* ✨ feat: add grpc timeouts with proxy settings if backend is grpc
* 📝 docs: Documentation only changes
* 🐛 fix: uppercase for protocol
* 📝 docs: grpc timeouts example
* 📝 docs: add links and default values for proxy timeout
* 🧪 test: add e2e test for timeout
* 🐛 fix: upgrade to 1.0.6 to fix nil pointer
* 🐛 fix: lint
* 🧪 test: trigger ci
---
docs/examples/grpc/README.md | 6 +-
.../nginx-configuration/annotations.md | 6 +
.../nginx-configuration/configmap.md | 6 +
go.mod | 1 +
go.sum | 2 +
rootfs/etc/nginx/template/nginx.tmpl | 7 ++
test/e2e/annotations/grpc.go | 94 ++++++++++++++-
test/e2e/framework/grpc_delay.go | 109 ++++++++++++++++++
8 files changed, 224 insertions(+), 7 deletions(-)
create mode 100644 test/e2e/framework/grpc_delay.go
diff --git a/docs/examples/grpc/README.md b/docs/examples/grpc/README.md
index 508b23fb8..23126c345 100644
--- a/docs/examples/grpc/README.md
+++ b/docs/examples/grpc/README.md
@@ -166,11 +166,9 @@ This example demonstrates how to route traffic to a gRPC service through the Ing
### Notes on using response/request streams
+> `grpc_read_timeout` and `grpc_send_timeout` will be set as `proxy_read_timeout` and `proxy_send_timeout` when you set backend protocol to `GRPC` or `GRPCS`.
+
1. If your server only does response streaming and you expect a stream to be open longer than 60 seconds, you will have to change the `grpc_read_timeout` to accommodate this.
2. If your service only does request streaming and you expect a stream to be open longer than 60 seconds, you have to change the
`grpc_send_timeout` and the `client_body_timeout`.
3. If you do both response and request streaming with an open stream longer than 60 seconds, you have to change all three timeouts: `grpc_read_timeout`, `grpc_send_timeout` and `client_body_timeout`.
-
-Values for the timeouts must be specified as e.g. `"1200s"`.
-
-> On the most recent versions of ingress-nginx, changing these timeouts requires using the `nginx.ingress.kubernetes.io/server-snippet` annotation. There are plans for future releases to allow using the Kubernetes annotations to define each timeout separately.
diff --git a/docs/user-guide/nginx-configuration/annotations.md b/docs/user-guide/nginx-configuration/annotations.md
index cf4902c1e..0ea54a29f 100755
--- a/docs/user-guide/nginx-configuration/annotations.md
+++ b/docs/user-guide/nginx-configuration/annotations.md
@@ -698,6 +698,12 @@ In some scenarios is required to have different values. To allow this we provide
- `nginx.ingress.kubernetes.io/proxy-next-upstream-tries`
- `nginx.ingress.kubernetes.io/proxy-request-buffering`
+If you indicate [Backend Protocol](#backend-protocol) as `GRPC` or `GRPCS`, the following grpc values will be set and inherited from proxy timeouts:
+
+- [`grpc_connect_timeout=5s`](https://nginx.org/en/docs/http/ngx_http_grpc_module.html#grpc_connect_timeout), from `nginx.ingress.kubernetes.io/proxy-connect-timeout`
+- [`grpc_send_timeout=60s`](https://nginx.org/en/docs/http/ngx_http_grpc_module.html#grpc_send_timeout), from `nginx.ingress.kubernetes.io/proxy-send-timeout`
+- [`grpc_read_timeout=60s`](https://nginx.org/en/docs/http/ngx_http_grpc_module.html#grpc_read_timeout), from `nginx.ingress.kubernetes.io/proxy-read-timeout`
+
Note: All timeout values are unitless and in seconds e.g. `nginx.ingress.kubernetes.io/proxy-read-timeout: "120"` sets a valid 120 seconds proxy read timeout.
### Proxy redirect
diff --git a/docs/user-guide/nginx-configuration/configmap.md b/docs/user-guide/nginx-configuration/configmap.md
index 3127f73a4..48ab316cb 100644
--- a/docs/user-guide/nginx-configuration/configmap.md
+++ b/docs/user-guide/nginx-configuration/configmap.md
@@ -1101,14 +1101,20 @@ See NGINX [client_max_body_size](https://nginx.org/en/docs/http/ngx_http_core_mo
Sets the timeout for [establishing a connection with a proxied server](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_connect_timeout). It should be noted that this timeout cannot usually exceed 75 seconds.
+It will also set the [grpc_connect_timeout](https://nginx.org/en/docs/http/ngx_http_grpc_module.html#grpc_connect_timeout) for gRPC connections.
+
## proxy-read-timeout
Sets the timeout in seconds for [reading a response from the proxied server](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_read_timeout). The timeout is set only between two successive read operations, not for the transmission of the whole response.
+It will also set the [grpc_read_timeout](https://nginx.org/en/docs/http/ngx_http_grpc_module.html#grpc_read_timeout) for gRPC connections.
+
## proxy-send-timeout
Sets the timeout in seconds for [transmitting a request to the proxied server](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_send_timeout). The timeout is set only between two successive write operations, not for the transmission of the whole request.
+It will also set the [grpc_send_timeout](https://nginx.org/en/docs/http/ngx_http_grpc_module.html#grpc_send_timeout) for gRPC connections.
+
## proxy-buffers-number
Sets the number of the buffer used for [reading the first part of the response](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_buffers) received from the proxied server. This part usually contains a small response header.
diff --git a/go.mod b/go.mod
index cec60ef9c..75782885a 100644
--- a/go.mod
+++ b/go.mod
@@ -48,6 +48,7 @@ require (
)
require (
+ github.com/Anddd7/pb v0.0.0-20240425032658-369b0f6a404c
github.com/Azure/go-ansiterm v0.0.0-20230124172434-306776ec8161 // indirect
github.com/BurntSushi/toml v1.3.2 // indirect
github.com/beorn7/perks v1.0.1 // indirect
diff --git a/go.sum b/go.sum
index 1ad706885..d62944e1f 100644
--- a/go.sum
+++ b/go.sum
@@ -597,6 +597,8 @@ cloud.google.com/go/workflows v1.10.0/go.mod h1:fZ8LmRmZQWacon9UCX1r/g/DfAXx5VcP
dario.cat/mergo v1.0.0 h1:AGCNq9Evsj31mOgNPcLyXc+4PNABt905YmuqPYYpBWk=
dario.cat/mergo v1.0.0/go.mod h1:uNxQE+84aUszobStD9th8a29P2fMDhsBdgRYvZOxGmk=
dmitri.shuralyov.com/gpu/mtl v0.0.0-20190408044501-666a987793e9/go.mod h1:H6x//7gZCb22OMCxBHrMx7a5I7Hp++hsVxbQ4BYO7hU=
+github.com/Anddd7/pb v0.0.0-20240425032658-369b0f6a404c h1:uhBf0CHXi7nCFZXxHV7l1cBcYFEEVRK4FYxvm1l9lKg=
+github.com/Anddd7/pb v0.0.0-20240425032658-369b0f6a404c/go.mod h1:vYWKbnXd2KAZHUECLPzSE0Er3FgiEmOdPtxwSIRihck=
gioui.org v0.0.0-20210308172011-57750fc8a0a6/go.mod h1:RSH6KIUZ0p2xy5zHDxgAM4zumjgTw83q2ge/PI+yyw8=
git.sr.ht/~sbinet/gg v0.3.1/go.mod h1:KGYtlADtqsqANL9ueOFkWymvzUvLMQllU5Ixo+8v3pc=
github.com/Azure/go-ansiterm v0.0.0-20230124172434-306776ec8161 h1:L/gRVlceqvL25UVaW/CKtUDjefjrs0SPonmDGUVOYP0=
diff --git a/rootfs/etc/nginx/template/nginx.tmpl b/rootfs/etc/nginx/template/nginx.tmpl
index 4c0da2eb9..93a04e3e6 100644
--- a/rootfs/etc/nginx/template/nginx.tmpl
+++ b/rootfs/etc/nginx/template/nginx.tmpl
@@ -1481,6 +1481,13 @@ stream {
proxy_next_upstream_timeout {{ $location.Proxy.NextUpstreamTimeout }};
proxy_next_upstream_tries {{ $location.Proxy.NextUpstreamTries }};
+ {{ if or (eq $location.BackendProtocol "GRPC") (eq $location.BackendProtocol "GRPCS") }}
+ # Grpc settings
+ grpc_connect_timeout {{ $location.Proxy.ConnectTimeout }}s;
+ grpc_send_timeout {{ $location.Proxy.SendTimeout }}s;
+ grpc_read_timeout {{ $location.Proxy.ReadTimeout }}s;
+ {{ end }}
+
{{/* Add any additional configuration defined */}}
{{ $location.ConfigurationSnippet }}
diff --git a/test/e2e/annotations/grpc.go b/test/e2e/annotations/grpc.go
index b3be82c2a..60696e139 100644
--- a/test/e2e/annotations/grpc.go
+++ b/test/e2e/annotations/grpc.go
@@ -22,11 +22,13 @@ import (
"fmt"
"strings"
+ delaypb "github.com/Anddd7/pb/grpcbin"
pb "github.com/moul/pb/grpcbin/go-grpc"
"github.com/onsi/ginkgo/v2"
"github.com/stretchr/testify/assert"
"google.golang.org/grpc"
"google.golang.org/grpc/credentials"
+ "google.golang.org/grpc/credentials/insecure"
"google.golang.org/grpc/metadata"
corev1 "k8s.io/api/core/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
@@ -35,7 +37,10 @@ import (
"k8s.io/ingress-nginx/test/e2e/framework"
)
-const echoHost = "echo"
+const (
+ echoHost = "echo"
+ host = "grpc"
+)
var _ = framework.DescribeAnnotation("backend-protocol - GRPC", func() {
f := framework.NewDefaultFramework("grpc", framework.WithHTTPBunEnabled())
@@ -43,8 +48,6 @@ var _ = framework.DescribeAnnotation("backend-protocol - GRPC", func() {
ginkgo.It("should use grpc_pass in the configuration file", func() {
f.NewGRPCFortuneTellerDeployment()
- host := "grpc"
-
annotations := map[string]string{
"nginx.ingress.kubernetes.io/backend-protocol": "GRPC",
}
@@ -259,4 +262,89 @@ var _ = framework.DescribeAnnotation("backend-protocol - GRPC", func() {
metadata := res.GetMetadata()
assert.Equal(ginkgo.GinkgoT(), metadata["content-type"].Values[0], "application/grpc")
})
+
+ ginkgo.It("should return OK when request not exceed timeout", func() {
+ f.NewGRPCBinDelayDeployment()
+
+ proxyTimeout := "10"
+ ingressName := "grpcbin-delay"
+
+ annotations := make(map[string]string)
+ annotations["nginx.ingress.kubernetes.io/backend-protocol"] = "GRPC"
+ annotations["nginx.ingress.kubernetes.io/proxy-connect-timeout"] = proxyTimeout
+ annotations["nginx.ingress.kubernetes.io/proxy-send-timeout"] = proxyTimeout
+ annotations["nginx.ingress.kubernetes.io/proxy-read-timeout"] = proxyTimeout
+
+ ing := framework.NewSingleIngress(host, "/", host, f.Namespace, ingressName, 50051, annotations)
+
+ f.EnsureIngress(ing)
+
+ f.WaitForNginxServer(host,
+ func(server string) bool {
+ return strings.Contains(server, fmt.Sprintf("grpc_connect_timeout %ss;", proxyTimeout)) &&
+ strings.Contains(server, fmt.Sprintf("grpc_send_timeout %ss;", proxyTimeout)) &&
+ strings.Contains(server, fmt.Sprintf("grpc_read_timeout %ss;", proxyTimeout))
+ })
+
+ conn, err := grpc.Dial(
+ f.GetNginxIP()+":80",
+ grpc.WithTransportCredentials(insecure.NewCredentials()),
+ grpc.WithAuthority(host),
+ )
+ assert.Nil(ginkgo.GinkgoT(), err, "error creating a connection")
+ defer conn.Close()
+
+ client := delaypb.NewGrpcbinServiceClient(conn)
+
+ res, err := client.Unary(context.Background(), &delaypb.UnaryRequest{
+ Data: "hello",
+ })
+ assert.Nil(ginkgo.GinkgoT(), err)
+
+ metadata := res.GetResponseAttributes().RequestHeaders
+ assert.Equal(ginkgo.GinkgoT(), metadata["content-type"], "application/grpc")
+ assert.Equal(ginkgo.GinkgoT(), metadata[":authority"], host)
+ })
+
+ ginkgo.It("should return Error when request exceed timeout", func() {
+ f.NewGRPCBinDelayDeployment()
+
+ proxyTimeout := "10"
+ ingressName := "grpcbin-delay"
+
+ annotations := make(map[string]string)
+ annotations["nginx.ingress.kubernetes.io/backend-protocol"] = "GRPC"
+ annotations["nginx.ingress.kubernetes.io/proxy-connect-timeout"] = proxyTimeout
+ annotations["nginx.ingress.kubernetes.io/proxy-send-timeout"] = proxyTimeout
+ annotations["nginx.ingress.kubernetes.io/proxy-read-timeout"] = proxyTimeout
+
+ ing := framework.NewSingleIngress(host, "/", host, f.Namespace, ingressName, 50051, annotations)
+
+ f.EnsureIngress(ing)
+
+ f.WaitForNginxServer(host,
+ func(server string) bool {
+ return strings.Contains(server, fmt.Sprintf("grpc_connect_timeout %ss;", proxyTimeout)) &&
+ strings.Contains(server, fmt.Sprintf("grpc_send_timeout %ss;", proxyTimeout)) &&
+ strings.Contains(server, fmt.Sprintf("grpc_read_timeout %ss;", proxyTimeout))
+ })
+
+ conn, err := grpc.Dial(
+ f.GetNginxIP()+":80",
+ grpc.WithTransportCredentials(insecure.NewCredentials()),
+ grpc.WithAuthority(host),
+ )
+ assert.Nil(ginkgo.GinkgoT(), err, "error creating a connection")
+ defer conn.Close()
+
+ client := delaypb.NewGrpcbinServiceClient(conn)
+
+ _, err = client.Unary(context.Background(), &delaypb.UnaryRequest{
+ Data: "hello",
+ RequestAttributes: &delaypb.RequestAttributes{
+ Delay: 15,
+ },
+ })
+ assert.Error(ginkgo.GinkgoT(), err)
+ })
})
diff --git a/test/e2e/framework/grpc_delay.go b/test/e2e/framework/grpc_delay.go
new file mode 100644
index 000000000..58d10b2e9
--- /dev/null
+++ b/test/e2e/framework/grpc_delay.go
@@ -0,0 +1,109 @@
+/*
+Copyright 2024 The Kubernetes Authors.
+
+Licensed under the Apache License, Version 2.0 (the "License");
+you may not use this file except in compliance with the License.
+You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law or agreed to in writing, software
+distributed under the License is distributed on an "AS IS" BASIS,
+WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+See the License for the specific language governing permissions and
+limitations under the License.
+*/
+
+package framework
+
+import (
+ "github.com/onsi/ginkgo/v2"
+ "github.com/stretchr/testify/assert"
+ appsv1 "k8s.io/api/apps/v1"
+ corev1 "k8s.io/api/core/v1"
+ metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
+ "k8s.io/apimachinery/pkg/fields"
+ "k8s.io/apimachinery/pkg/util/intstr"
+)
+
+// NewGRPCBinDelayDeployment creates a new single replica
+// deployment of the grpcbin image in a particular namespace
+func (f *Framework) NewGRPCBinDelayDeployment() {
+ f.NewNewGRPCBinDelayDeploymentWithReplicas(1)
+}
+
+// NewNewGRPCBinDelayDeploymentWithReplicas creates a new deployment of the
+// grpcbin image in a particular namespace. Number of replicas is configurable
+func (f *Framework) NewNewGRPCBinDelayDeploymentWithReplicas(replicas int32) {
+ name := "grpcbin-delay"
+
+ deployment := &appsv1.Deployment{
+ ObjectMeta: metav1.ObjectMeta{
+ Name: name,
+ Namespace: f.Namespace,
+ },
+ Spec: appsv1.DeploymentSpec{
+ Replicas: NewInt32(replicas),
+ Selector: &metav1.LabelSelector{
+ MatchLabels: map[string]string{
+ "app": name,
+ },
+ },
+ Template: corev1.PodTemplateSpec{
+ ObjectMeta: metav1.ObjectMeta{
+ Labels: map[string]string{
+ "app": name,
+ },
+ },
+ Spec: corev1.PodSpec{
+ TerminationGracePeriodSeconds: NewInt64(0),
+ Containers: []corev1.Container{
+ {
+ Name: name,
+ Image: "ghcr.io/anddd7/grpcbin:v1.0.6",
+ Env: []corev1.EnvVar{},
+ Ports: []corev1.ContainerPort{
+ {
+ Name: "grpc",
+ ContainerPort: 50051,
+ },
+ },
+ },
+ },
+ },
+ },
+ },
+ }
+
+ d := f.EnsureDeployment(deployment)
+
+ err := waitForPodsReady(f.KubeClientSet, DefaultTimeout, int(replicas), f.Namespace, &metav1.ListOptions{
+ LabelSelector: fields.SelectorFromSet(fields.Set(d.Spec.Template.ObjectMeta.Labels)).String(),
+ })
+ assert.Nil(ginkgo.GinkgoT(), err, "failed to wait for to become ready")
+
+ service := &corev1.Service{
+ ObjectMeta: metav1.ObjectMeta{
+ Name: name,
+ Namespace: f.Namespace,
+ },
+ Spec: corev1.ServiceSpec{
+ Ports: []corev1.ServicePort{
+ {
+ Name: "grpc",
+ Port: 50051,
+ TargetPort: intstr.FromInt(50051),
+ Protocol: "TCP",
+ },
+ },
+ Selector: map[string]string{
+ "app": name,
+ },
+ },
+ }
+
+ f.EnsureService(service)
+
+ err = WaitForEndpoints(f.KubeClientSet, DefaultTimeout, name, f.Namespace, int(replicas))
+ assert.Nil(ginkgo.GinkgoT(), err, "waiting for endpoints to become ready")
+}
From 57490cbcdc46789aa5420da55ae8d3e15089f4a0 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 27 May 2024 05:05:23 -0700
Subject: [PATCH 068/283] Bump golang.org/x/crypto from 0.22.0 to 0.23.0
(#11357)
Bumps [golang.org/x/crypto](https://github.com/golang/crypto) from 0.22.0 to 0.23.0.
- [Commits](https://github.com/golang/crypto/compare/v0.22.0...v0.23.0)
---
updated-dependencies:
- dependency-name: golang.org/x/crypto
dependency-type: direct:production
update-type: version-update:semver-minor
...
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 4 ++--
go.sum | 8 ++++----
2 files changed, 6 insertions(+), 6 deletions(-)
diff --git a/go.mod b/go.mod
index 75782885a..eaa8d34d3 100644
--- a/go.mod
+++ b/go.mod
@@ -27,7 +27,7 @@ require (
github.com/stretchr/testify v1.9.0
github.com/yudai/gojsondiff v1.0.0
github.com/zakjan/cert-chain-resolver v0.0.0-20221221105603-fcedb00c5b30
- golang.org/x/crypto v0.22.0
+ golang.org/x/crypto v0.23.0
golang.org/x/exp v0.0.0-20240416160154-fe59bbe5cc7f
google.golang.org/grpc v1.63.2
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab
@@ -113,7 +113,7 @@ require (
golang.org/x/oauth2 v0.20.0 // indirect
golang.org/x/sync v0.7.0 // indirect
golang.org/x/sys v0.20.0 // indirect
- golang.org/x/term v0.19.0 // indirect
+ golang.org/x/term v0.20.0 // indirect
golang.org/x/text v0.15.0 // indirect
golang.org/x/time v0.5.0 // indirect
golang.org/x/tools v0.20.0 // indirect
diff --git a/go.sum b/go.sum
index d62944e1f..e5e58cf7d 100644
--- a/go.sum
+++ b/go.sum
@@ -1164,8 +1164,8 @@ golang.org/x/crypto v0.16.0/go.mod h1:gCAAfMLgwOJRpTjQ2zCCt2OcSfYMTeZVSRtQlPC7Nq
golang.org/x/crypto v0.18.0/go.mod h1:R0j02AL6hcrfOiy9T4ZYp/rcWeMxM3L6QYxlOuEG1mg=
golang.org/x/crypto v0.19.0/go.mod h1:Iy9bg/ha4yyC70EfRS8jz+B6ybOBKMaSxLj6P6oBDfU=
golang.org/x/crypto v0.21.0/go.mod h1:0BP7YvVV9gBbVKyeTG0Gyn+gZm94bibOW5BjDEYAOMs=
-golang.org/x/crypto v0.22.0 h1:g1v0xeRhjcugydODzvb3mEM9SQ0HGp9s/nh3COQ/C30=
-golang.org/x/crypto v0.22.0/go.mod h1:vr6Su+7cTlO45qkww3VDJlzDn0ctJvRgYbC2NvXHt+M=
+golang.org/x/crypto v0.23.0 h1:dIJU/v2J8Mdglj/8rJ6UUOM3Zc9zLZxVZwwxMooUSAI=
+golang.org/x/crypto v0.23.0/go.mod h1:CKFgDieR+mRhux2Lsu27y0fO304Db0wZe70UKqHu0v8=
golang.org/x/exp v0.0.0-20180321215751-8460e604b9de/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
golang.org/x/exp v0.0.0-20180807140117-3d87b88a115f/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
@@ -1476,8 +1476,8 @@ golang.org/x/term v0.15.0/go.mod h1:BDl952bC7+uMoWR75FIrCDx79TPU9oHkTZ9yRbYOrX0=
golang.org/x/term v0.16.0/go.mod h1:yn7UURbUtPyrVJPGPq404EukNFxcm/foM+bV/bfcDsY=
golang.org/x/term v0.17.0/go.mod h1:lLRBjIVuehSbZlaOtGMbcMncT+aqLLLmKrsjNrUguwk=
golang.org/x/term v0.18.0/go.mod h1:ILwASektA3OnRv7amZ1xhE/KTR+u50pbXfZ03+6Nx58=
-golang.org/x/term v0.19.0 h1:+ThwsDv+tYfnJFhF4L8jITxu1tdTWRTZpdsWgEgjL6Q=
-golang.org/x/term v0.19.0/go.mod h1:2CuTdWZ7KHSQwUzKva0cbMg6q2DMI3Mmxp+gKJbskEk=
+golang.org/x/term v0.20.0 h1:VnkxpohqXaOBYJtBmEppKUG6mXpi+4O6purfc2+sMhw=
+golang.org/x/term v0.20.0/go.mod h1:8UkIAJTvZgivsXaD6/pH6U9ecQzZ45awqEOzuCvwpFY=
golang.org/x/text v0.0.0-20170915032832-14c0d48ead0c/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
golang.org/x/text v0.3.1-0.20180807135948-17ff2d5776d2/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
From 4fcc62ab5b4ddaf8e3ec4319e5a5ba54174ab9b4 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 27 May 2024 05:07:38 -0700
Subject: [PATCH 069/283] Bump the all group across 1 directory with 6 updates
(#11383)
Bumps the all group with 6 updates in the / directory:
| Package | From | To |
| --- | --- | --- |
| [actions/checkout](https://github.com/actions/checkout) | `4.1.4` | `4.1.6` |
| [dorny/test-reporter](https://github.com/dorny/test-reporter) | `1.9.0` | `1.9.1` |
| [goreleaser/goreleaser-action](https://github.com/goreleaser/goreleaser-action) | `5.0.0` | `5.1.0` |
| [ossf/scorecard-action](https://github.com/ossf/scorecard-action) | `2.3.1` | `2.3.3` |
| [github/codeql-action](https://github.com/github/codeql-action) | `3.25.3` | `3.25.6` |
| [aquasecurity/trivy-action](https://github.com/aquasecurity/trivy-action) | `0.19.0` | `0.21.0` |
Updates `actions/checkout` from 4.1.4 to 4.1.6
- [Release notes](https://github.com/actions/checkout/releases)
- [Changelog](https://github.com/actions/checkout/blob/main/CHANGELOG.md)
- [Commits](https://github.com/actions/checkout/compare/0ad4b8fadaa221de15dcec353f45205ec38ea70b...a5ac7e51b41094c92402da3b24376905380afc29)
Updates `dorny/test-reporter` from 1.9.0 to 1.9.1
- [Release notes](https://github.com/dorny/test-reporter/releases)
- [Changelog](https://github.com/dorny/test-reporter/blob/main/CHANGELOG.md)
- [Commits](https://github.com/dorny/test-reporter/compare/c40d89d5e987cd80f3a32b3c233556e22bdca958...31a54ee7ebcacc03a09ea97a7e5465a47b84aea5)
Updates `goreleaser/goreleaser-action` from 5.0.0 to 5.1.0
- [Release notes](https://github.com/goreleaser/goreleaser-action/releases)
- [Commits](https://github.com/goreleaser/goreleaser-action/compare/7ec5c2b0c6cdda6e8bbb49444bc797dd33d74dd8...5742e2a039330cbb23ebf35f046f814d4c6ff811)
Updates `ossf/scorecard-action` from 2.3.1 to 2.3.3
- [Release notes](https://github.com/ossf/scorecard-action/releases)
- [Changelog](https://github.com/ossf/scorecard-action/blob/main/RELEASE.md)
- [Commits](https://github.com/ossf/scorecard-action/compare/0864cf19026789058feabb7e87baa5f140aac736...dc50aa9510b46c811795eb24b2f1ba02a914e534)
Updates `github/codeql-action` from 3.25.3 to 3.25.6
- [Release notes](https://github.com/github/codeql-action/releases)
- [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md)
- [Commits](https://github.com/github/codeql-action/compare/d39d31e687223d841ef683f52467bd88e9b21c14...9fdb3e49720b44c48891d036bb502feb25684276)
Updates `aquasecurity/trivy-action` from 0.19.0 to 0.21.0
- [Release notes](https://github.com/aquasecurity/trivy-action/releases)
- [Commits](https://github.com/aquasecurity/trivy-action/compare/d710430a6722f083d3b36b8339ff66b32f22ee55...fd25fed6972e341ff0007ddb61f77e88103953c2)
---
updated-dependencies:
- dependency-name: actions/checkout
dependency-type: direct:production
update-type: version-update:semver-patch
dependency-group: all
- dependency-name: dorny/test-reporter
dependency-type: direct:production
update-type: version-update:semver-patch
dependency-group: all
- dependency-name: goreleaser/goreleaser-action
dependency-type: direct:production
update-type: version-update:semver-minor
dependency-group: all
- dependency-name: ossf/scorecard-action
dependency-type: direct:production
update-type: version-update:semver-patch
dependency-group: all
- dependency-name: github/codeql-action
dependency-type: direct:production
update-type: version-update:semver-patch
dependency-group: all
- dependency-name: aquasecurity/trivy-action
dependency-type: direct:production
update-type: version-update:semver-minor
dependency-group: all
...
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
.github/workflows/ci.yaml | 10 +++++-----
.github/workflows/depreview.yaml | 2 +-
.github/workflows/docs.yaml | 4 ++--
.github/workflows/golangci-lint.yml | 2 +-
.github/workflows/helm.yaml | 4 ++--
.github/workflows/images.yaml | 8 ++++----
.github/workflows/junit-reports.yaml | 2 +-
.github/workflows/perftest.yaml | 2 +-
.github/workflows/plugin.yaml | 6 +++---
.github/workflows/scorecards.yml | 6 +++---
.github/workflows/vulnerability-scans.yaml | 8 ++++----
.github/workflows/zz-tmpl-images.yaml | 6 +++---
.github/workflows/zz-tmpl-k8s-e2e.yaml | 2 +-
13 files changed, 31 insertions(+), 31 deletions(-)
diff --git a/.github/workflows/ci.yaml b/.github/workflows/ci.yaml
index cafb5ad95..70369418f 100644
--- a/.github/workflows/ci.yaml
+++ b/.github/workflows/ci.yaml
@@ -47,7 +47,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
+ uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
- uses: dorny/paths-filter@de90cc6fb38fc0963ad72b210f1f284cd68cea36 # v3.0.2
id: filter
@@ -77,7 +77,7 @@ jobs:
(needs.changes.outputs.go == 'true')
steps:
- name: Checkout
- uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
+ uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
- name: Get go version
run: echo "GOLANG_VERSION=$(cat GOLANG_VERSION)" >> $GITHUB_ENV
@@ -105,7 +105,7 @@ jobs:
PLATFORMS: linux/amd64
steps:
- name: Checkout
- uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
+ uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
- name: Get go version
id: golangversion
@@ -179,7 +179,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
+ uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
with:
fetch-depth: 0
@@ -239,7 +239,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
+ uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
- name: Setup Go
uses: actions/setup-go@cdcb36043654635271a94b9a6d1392de5bb323a7 # v5.0.1
diff --git a/.github/workflows/depreview.yaml b/.github/workflows/depreview.yaml
index ffe249546..fea5a4e4e 100644
--- a/.github/workflows/depreview.yaml
+++ b/.github/workflows/depreview.yaml
@@ -9,6 +9,6 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: 'Checkout Repository'
- uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
+ uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
- name: 'Dependency Review'
uses: actions/dependency-review-action@0c155c5e8556a497adf53f2c18edabf945ed8e70 # v4.3.2
diff --git a/.github/workflows/docs.yaml b/.github/workflows/docs.yaml
index 76b5818f4..0e12a0dc7 100644
--- a/.github/workflows/docs.yaml
+++ b/.github/workflows/docs.yaml
@@ -23,7 +23,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
+ uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
- uses: dorny/paths-filter@de90cc6fb38fc0963ad72b210f1f284cd68cea36 # v3.0.2
id: filter
@@ -47,7 +47,7 @@ jobs:
steps:
- name: Checkout master
- uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
+ uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
- name: Deploy
uses: ./.github/actions/mkdocs
diff --git a/.github/workflows/golangci-lint.yml b/.github/workflows/golangci-lint.yml
index 91fbbe088..8e6ec5200 100644
--- a/.github/workflows/golangci-lint.yml
+++ b/.github/workflows/golangci-lint.yml
@@ -15,7 +15,7 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Checkout
- uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
+ uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
- name: Get go version
run: echo "GOLANG_VERSION=$(cat GOLANG_VERSION)" >> $GITHUB_ENV
diff --git a/.github/workflows/helm.yaml b/.github/workflows/helm.yaml
index 24674e3f2..f3aa7ced8 100644
--- a/.github/workflows/helm.yaml
+++ b/.github/workflows/helm.yaml
@@ -27,7 +27,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
+ uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
- name: Run Artifact Hub lint
run: |
@@ -66,7 +66,7 @@ jobs:
steps:
- name: Checkout master
- uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
+ uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
with:
# Fetch entire history. Required for chart-releaser; see https://github.com/helm/chart-releaser-action/issues/13#issuecomment-602063896
fetch-depth: 0
diff --git a/.github/workflows/images.yaml b/.github/workflows/images.yaml
index 4123a5efa..18c09a570 100644
--- a/.github/workflows/images.yaml
+++ b/.github/workflows/images.yaml
@@ -41,7 +41,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
+ uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
- uses: dorny/paths-filter@de90cc6fb38fc0963ad72b210f1f284cd68cea36 # v3.0.2
id: filter
with:
@@ -144,7 +144,7 @@ jobs:
k8s: [v1.26.14, v1.27.11, v1.28.7, v1.29.2]
steps:
- name: Checkout
- uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
+ uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
- name: Get go version
run: echo "GOLANG_VERSION=$(cat GOLANG_VERSION)" >> $GITHUB_ENV
@@ -178,7 +178,7 @@ jobs:
nginx: ['1.25.3', '1.21.6']
steps:
- name: Checkout
- uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
+ uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
- name: image build
run: |
cd images/opentelemetry && make NGINX_VERSION=${{ matrix.nginx }} build
@@ -195,7 +195,7 @@ jobs:
PLATFORMS: linux/amd64,linux/arm,linux/arm64,linux/s390x
steps:
- name: Checkout
- uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
+ uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
- name: Set up QEMU
uses: docker/setup-qemu-action@68827325e0b33c7199eb31dd4e31fbe9023e06e3 # v3.0.0
- name: Set up Docker Buildx
diff --git a/.github/workflows/junit-reports.yaml b/.github/workflows/junit-reports.yaml
index 0d76abbfb..947b90c25 100644
--- a/.github/workflows/junit-reports.yaml
+++ b/.github/workflows/junit-reports.yaml
@@ -9,7 +9,7 @@ jobs:
report:
runs-on: ubuntu-latest
steps:
- - uses: dorny/test-reporter@c40d89d5e987cd80f3a32b3c233556e22bdca958 # v1.9.0
+ - uses: dorny/test-reporter@31a54ee7ebcacc03a09ea97a7e5465a47b84aea5 # v1.9.1
with:
artifact: /e2e-test-reports-(.*)/
name: JEST Tests $1 # Name of the check run which will be created
diff --git a/.github/workflows/perftest.yaml b/.github/workflows/perftest.yaml
index f2999ee97..9a544c645 100644
--- a/.github/workflows/perftest.yaml
+++ b/.github/workflows/perftest.yaml
@@ -19,7 +19,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
+ uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
- name: Install K6
run: |
diff --git a/.github/workflows/plugin.yaml b/.github/workflows/plugin.yaml
index 56992f34d..137e1dccc 100644
--- a/.github/workflows/plugin.yaml
+++ b/.github/workflows/plugin.yaml
@@ -12,7 +12,7 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Checkout
- uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
+ uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
with:
fetch-depth: 0
@@ -27,7 +27,7 @@ jobs:
- name: Run GoReleaser Snapshot
if: ${{ ! startsWith(github.ref, 'refs/tags/') }}
- uses: goreleaser/goreleaser-action@7ec5c2b0c6cdda6e8bbb49444bc797dd33d74dd8 # v5.0.0
+ uses: goreleaser/goreleaser-action@5742e2a039330cbb23ebf35f046f814d4c6ff811 # v5.1.0
with:
version: latest
args: release --snapshot --clean
@@ -36,7 +36,7 @@ jobs:
- name: Run GoReleaser
if: ${{ startsWith(github.ref, 'refs/tags/') }}
- uses: goreleaser/goreleaser-action@7ec5c2b0c6cdda6e8bbb49444bc797dd33d74dd8 # v5.0.0
+ uses: goreleaser/goreleaser-action@5742e2a039330cbb23ebf35f046f814d4c6ff811 # v5.1.0
with:
version: latest
args: release --clean
diff --git a/.github/workflows/scorecards.yml b/.github/workflows/scorecards.yml
index c98b2d180..75e12a95b 100644
--- a/.github/workflows/scorecards.yml
+++ b/.github/workflows/scorecards.yml
@@ -27,12 +27,12 @@ jobs:
steps:
- name: "Checkout code"
- uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
+ uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
with:
persist-credentials: false
- name: "Run analysis"
- uses: ossf/scorecard-action@0864cf19026789058feabb7e87baa5f140aac736 # v2.3.1
+ uses: ossf/scorecard-action@dc50aa9510b46c811795eb24b2f1ba02a914e534 # v2.3.3
with:
results_file: results.sarif
results_format: sarif
@@ -59,6 +59,6 @@ jobs:
# Upload the results to GitHub's code scanning dashboard.
- name: "Upload to code-scanning"
- uses: github/codeql-action/upload-sarif@d39d31e687223d841ef683f52467bd88e9b21c14 # v3.25.3
+ uses: github/codeql-action/upload-sarif@9fdb3e49720b44c48891d036bb502feb25684276 # v3.25.6
with:
sarif_file: results.sarif
diff --git a/.github/workflows/vulnerability-scans.yaml b/.github/workflows/vulnerability-scans.yaml
index 44e8954ed..c6f51a372 100644
--- a/.github/workflows/vulnerability-scans.yaml
+++ b/.github/workflows/vulnerability-scans.yaml
@@ -22,7 +22,7 @@ jobs:
versions: ${{ steps.version.outputs.TAGS }}
steps:
- name: Checkout code
- uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
+ uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
with:
fetch-depth: 0
@@ -52,7 +52,7 @@ jobs:
versions: ${{ fromJSON(needs.version.outputs.versions) }}
steps:
- name: Checkout code
- uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
+ uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
- shell: bash
id: test
@@ -60,7 +60,7 @@ jobs:
- name: Scan image with AquaSec/Trivy
id: scan
- uses: aquasecurity/trivy-action@d710430a6722f083d3b36b8339ff66b32f22ee55 # v0.19.0
+ uses: aquasecurity/trivy-action@fd25fed6972e341ff0007ddb61f77e88103953c2 # v0.21.0
with:
image-ref: registry.k8s.io/ingress-nginx/controller:${{ matrix.versions }}
format: 'sarif'
@@ -75,7 +75,7 @@ jobs:
# This step checks out a copy of your repository.
- name: Upload SARIF file
- uses: github/codeql-action/upload-sarif@d39d31e687223d841ef683f52467bd88e9b21c14 # v3.25.3
+ uses: github/codeql-action/upload-sarif@9fdb3e49720b44c48891d036bb502feb25684276 # v3.25.6
with:
token: ${{ github.token }}
# Path to SARIF file relative to the root of the repository
diff --git a/.github/workflows/zz-tmpl-images.yaml b/.github/workflows/zz-tmpl-images.yaml
index 4ab9a4efb..7d7f7a284 100644
--- a/.github/workflows/zz-tmpl-images.yaml
+++ b/.github/workflows/zz-tmpl-images.yaml
@@ -31,7 +31,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
+ uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
- uses: dorny/paths-filter@de90cc6fb38fc0963ad72b210f1f284cd68cea36 # v3.0.2
id: filter
with:
@@ -48,7 +48,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
+ uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
- name: Build
run: |
@@ -67,7 +67,7 @@ jobs:
PLATFORMS: ${{ inputs.platforms-publish }}
steps:
- name: Checkout
- uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
+ uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
- name: Login to GitHub Container Registry
uses: docker/login-action@e92390c5fb421da1463c202d546fed0ec5c39f20 # v3.1.0
diff --git a/.github/workflows/zz-tmpl-k8s-e2e.yaml b/.github/workflows/zz-tmpl-k8s-e2e.yaml
index 9ca47112b..016157aad 100644
--- a/.github/workflows/zz-tmpl-k8s-e2e.yaml
+++ b/.github/workflows/zz-tmpl-k8s-e2e.yaml
@@ -20,7 +20,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4
+ uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
- name: cache
uses: actions/download-artifact@65a9edc5881444af0b9093a5e628f2fe47ea3b2e # v4.1.7
From ba48c6b3c1215133f0a3b8a7e812dffa887206f0 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 27 May 2024 05:10:56 -0700
Subject: [PATCH 070/283] Bump the all group across 1 directory with 3 updates
(#11384)
Bumps the all group with 3 updates in the / directory: [github.com/prometheus/client_golang](https://github.com/prometheus/client_golang), [k8s.io/component-base](https://github.com/kubernetes/component-base) and [sigs.k8s.io/controller-runtime](https://github.com/kubernetes-sigs/controller-runtime).
Updates `github.com/prometheus/client_golang` from 1.19.0 to 1.19.1
- [Release notes](https://github.com/prometheus/client_golang/releases)
- [Changelog](https://github.com/prometheus/client_golang/blob/main/CHANGELOG.md)
- [Commits](https://github.com/prometheus/client_golang/compare/v1.19.0...v1.19.1)
Updates `k8s.io/component-base` from 0.30.0 to 0.30.1
- [Commits](https://github.com/kubernetes/component-base/compare/v0.30.0...v0.30.1)
Updates `sigs.k8s.io/controller-runtime` from 0.18.1 to 0.18.3
- [Release notes](https://github.com/kubernetes-sigs/controller-runtime/releases)
- [Changelog](https://github.com/kubernetes-sigs/controller-runtime/blob/main/RELEASE.md)
- [Commits](https://github.com/kubernetes-sigs/controller-runtime/compare/v0.18.1...v0.18.3)
---
updated-dependencies:
- dependency-name: github.com/prometheus/client_golang
dependency-type: direct:production
update-type: version-update:semver-patch
dependency-group: all
- dependency-name: k8s.io/component-base
dependency-type: direct:production
update-type: version-update:semver-patch
dependency-group: all
- dependency-name: sigs.k8s.io/controller-runtime
dependency-type: direct:production
update-type: version-update:semver-patch
dependency-group: all
...
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 18 +++++++++---------
go.sum | 39 ++++++++++++++++++++-------------------
2 files changed, 29 insertions(+), 28 deletions(-)
diff --git a/go.mod b/go.mod
index eaa8d34d3..cf17df231 100644
--- a/go.mod
+++ b/go.mod
@@ -19,7 +19,7 @@ require (
github.com/onsi/ginkgo/v2 v2.17.2
github.com/opencontainers/runc v1.1.12
github.com/pmezard/go-difflib v1.0.0
- github.com/prometheus/client_golang v1.19.0
+ github.com/prometheus/client_golang v1.19.1
github.com/prometheus/client_model v0.6.1
github.com/prometheus/common v0.53.0
github.com/spf13/cobra v1.8.0
@@ -33,17 +33,17 @@ require (
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab
gopkg.in/go-playground/pool.v3 v3.1.1
gopkg.in/mcuadros/go-syslog.v2 v2.3.0
- k8s.io/api v0.30.0
- k8s.io/apiextensions-apiserver v0.30.0
- k8s.io/apimachinery v0.30.0
- k8s.io/apiserver v0.30.0
+ k8s.io/api v0.30.1
+ k8s.io/apiextensions-apiserver v0.30.1
+ k8s.io/apimachinery v0.30.1
+ k8s.io/apiserver v0.30.1
k8s.io/cli-runtime v0.30.0
- k8s.io/client-go v0.30.0
- k8s.io/code-generator v0.30.0
- k8s.io/component-base v0.30.0
+ k8s.io/client-go v0.30.1
+ k8s.io/code-generator v0.30.1
+ k8s.io/component-base v0.30.1
k8s.io/klog/v2 v2.120.1
pault.ag/go/sniff v0.0.0-20200207005214-cf7e4d167732
- sigs.k8s.io/controller-runtime v0.18.1
+ sigs.k8s.io/controller-runtime v0.18.3
sigs.k8s.io/mdtoc v1.1.0
)
diff --git a/go.sum b/go.sum
index e5e58cf7d..eb6fcc026 100644
--- a/go.sum
+++ b/go.sum
@@ -597,10 +597,10 @@ cloud.google.com/go/workflows v1.10.0/go.mod h1:fZ8LmRmZQWacon9UCX1r/g/DfAXx5VcP
dario.cat/mergo v1.0.0 h1:AGCNq9Evsj31mOgNPcLyXc+4PNABt905YmuqPYYpBWk=
dario.cat/mergo v1.0.0/go.mod h1:uNxQE+84aUszobStD9th8a29P2fMDhsBdgRYvZOxGmk=
dmitri.shuralyov.com/gpu/mtl v0.0.0-20190408044501-666a987793e9/go.mod h1:H6x//7gZCb22OMCxBHrMx7a5I7Hp++hsVxbQ4BYO7hU=
-github.com/Anddd7/pb v0.0.0-20240425032658-369b0f6a404c h1:uhBf0CHXi7nCFZXxHV7l1cBcYFEEVRK4FYxvm1l9lKg=
-github.com/Anddd7/pb v0.0.0-20240425032658-369b0f6a404c/go.mod h1:vYWKbnXd2KAZHUECLPzSE0Er3FgiEmOdPtxwSIRihck=
gioui.org v0.0.0-20210308172011-57750fc8a0a6/go.mod h1:RSH6KIUZ0p2xy5zHDxgAM4zumjgTw83q2ge/PI+yyw8=
git.sr.ht/~sbinet/gg v0.3.1/go.mod h1:KGYtlADtqsqANL9ueOFkWymvzUvLMQllU5Ixo+8v3pc=
+github.com/Anddd7/pb v0.0.0-20240425032658-369b0f6a404c h1:uhBf0CHXi7nCFZXxHV7l1cBcYFEEVRK4FYxvm1l9lKg=
+github.com/Anddd7/pb v0.0.0-20240425032658-369b0f6a404c/go.mod h1:vYWKbnXd2KAZHUECLPzSE0Er3FgiEmOdPtxwSIRihck=
github.com/Azure/go-ansiterm v0.0.0-20230124172434-306776ec8161 h1:L/gRVlceqvL25UVaW/CKtUDjefjrs0SPonmDGUVOYP0=
github.com/Azure/go-ansiterm v0.0.0-20230124172434-306776ec8161/go.mod h1:xomTg63KZ2rFqZQzSB4Vz2SUXa1BpHTVz9L5PTmPC4E=
github.com/BurntSushi/toml v0.3.1/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU=
@@ -1020,8 +1020,9 @@ github.com/prometheus/client_golang v1.14.0/go.mod h1:8vpkKitgIVNcqrRBWh1C4TIUQg
github.com/prometheus/client_golang v1.15.1/go.mod h1:e9yaBhRPU2pPNsZwE+JdQl0KEt1N9XgF6zxWmaC0xOk=
github.com/prometheus/client_golang v1.17.0/go.mod h1:VeL+gMmOAxkS2IqfCq0ZmHSL+LjWfWDUmp1mBz9JgUY=
github.com/prometheus/client_golang v1.18.0/go.mod h1:T+GXkCk5wSJyOqMIzVgvvjFDlkOQntgjkJWKrN5txjA=
-github.com/prometheus/client_golang v1.19.0 h1:ygXvpU1AoN1MhdzckN+PyD9QJOSD4x7kmXYlnfbA6JU=
github.com/prometheus/client_golang v1.19.0/go.mod h1:ZRM9uEAypZakd+q/x7+gmsvXdURP+DABIEIjnmDdp+k=
+github.com/prometheus/client_golang v1.19.1 h1:wZWJDwK+NameRJuPGDhlnFgx8e8HN3XHQeLaYJFJBOE=
+github.com/prometheus/client_golang v1.19.1/go.mod h1:mP78NwGzrVks5S2H6ab8+ZZGJLZUq1hoULYBAYBw1Ho=
github.com/prometheus/client_model v0.0.0-20180712105110-5c3871d89910/go.mod h1:MbSGuTsp3dbXC40dX6PRTWyKYBIrTGTE9sqQNg2J8bo=
github.com/prometheus/client_model v0.0.0-20190129233127-fd36f4220a90/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
github.com/prometheus/client_model v0.0.0-20190812154241-14fe0d1b01d4/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
@@ -1912,22 +1913,22 @@ honnef.co/go/tools v0.0.1-2019.2.3/go.mod h1:a3bituU0lyd329TUQxRnasdCoJDkEUEAqEt
honnef.co/go/tools v0.0.1-2020.1.3/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k=
honnef.co/go/tools v0.0.1-2020.1.4/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k=
honnef.co/go/tools v0.1.3/go.mod h1:NgwopIslSNH47DimFoV78dnkksY2EFtX0ajyb3K/las=
-k8s.io/api v0.30.0 h1:siWhRq7cNjy2iHssOB9SCGNCl2spiF1dO3dABqZ8niA=
-k8s.io/api v0.30.0/go.mod h1:OPlaYhoHs8EQ1ql0R/TsUgaRPhpKNxIMrKQfWUp8QSE=
-k8s.io/apiextensions-apiserver v0.30.0 h1:jcZFKMqnICJfRxTgnC4E+Hpcq8UEhT8B2lhBcQ+6uAs=
-k8s.io/apiextensions-apiserver v0.30.0/go.mod h1:N9ogQFGcrbWqAY9p2mUAL5mGxsLqwgtUce127VtRX5Y=
-k8s.io/apimachinery v0.30.0 h1:qxVPsyDM5XS96NIh9Oj6LavoVFYff/Pon9cZeDIkHHA=
-k8s.io/apimachinery v0.30.0/go.mod h1:iexa2somDaxdnj7bha06bhb43Zpa6eWH8N8dbqVjTUc=
-k8s.io/apiserver v0.30.0 h1:QCec+U72tMQ+9tR6A0sMBB5Vh6ImCEkoKkTDRABWq6M=
-k8s.io/apiserver v0.30.0/go.mod h1:smOIBq8t0MbKZi7O7SyIpjPsiKJ8qa+llcFCluKyqiY=
+k8s.io/api v0.30.1 h1:kCm/6mADMdbAxmIh0LBjS54nQBE+U4KmbCfIkF5CpJY=
+k8s.io/api v0.30.1/go.mod h1:ddbN2C0+0DIiPntan/bye3SW3PdwLa11/0yqwvuRrJM=
+k8s.io/apiextensions-apiserver v0.30.1 h1:4fAJZ9985BmpJG6PkoxVRpXv9vmPUOVzl614xarePws=
+k8s.io/apiextensions-apiserver v0.30.1/go.mod h1:R4GuSrlhgq43oRY9sF2IToFh7PVlF1JjfWdoG3pixk4=
+k8s.io/apimachinery v0.30.1 h1:ZQStsEfo4n65yAdlGTfP/uSHMQSoYzU/oeEbkmF7P2U=
+k8s.io/apimachinery v0.30.1/go.mod h1:iexa2somDaxdnj7bha06bhb43Zpa6eWH8N8dbqVjTUc=
+k8s.io/apiserver v0.30.1 h1:BEWEe8bzS12nMtDKXzCF5Q5ovp6LjjYkSp8qOPk8LZ8=
+k8s.io/apiserver v0.30.1/go.mod h1:i87ZnQ+/PGAmSbD/iEKM68bm1D5reX8fO4Ito4B01mo=
k8s.io/cli-runtime v0.30.0 h1:0vn6/XhOvn1RJ2KJOC6IRR2CGqrpT6QQF4+8pYpWQ48=
k8s.io/cli-runtime v0.30.0/go.mod h1:vATpDMATVTMA79sZ0YUCzlMelf6rUjoBzlp+RnoM+cg=
-k8s.io/client-go v0.30.0 h1:sB1AGGlhY/o7KCyCEQ0bPWzYDL0pwOZO4vAtTSh/gJQ=
-k8s.io/client-go v0.30.0/go.mod h1:g7li5O5256qe6TYdAMyX/otJqMhIiGgTapdLchhmOaY=
-k8s.io/code-generator v0.30.0 h1:3VUVqHvWFSVSm9kqL/G6kD4ZwNdHF6J/jPyo3Jgjy3k=
-k8s.io/code-generator v0.30.0/go.mod h1:mBMZhfRR4IunJUh2+7LVmdcWwpouCH5+LNPkZ3t/v7Q=
-k8s.io/component-base v0.30.0 h1:cj6bp38g0ainlfYtaOQuRELh5KSYjhKxM+io7AUIk4o=
-k8s.io/component-base v0.30.0/go.mod h1:V9x/0ePFNaKeKYA3bOvIbrNoluTSG+fSJKjLdjOoeXQ=
+k8s.io/client-go v0.30.1 h1:uC/Ir6A3R46wdkgCV3vbLyNOYyCJ8oZnjtJGKfytl/Q=
+k8s.io/client-go v0.30.1/go.mod h1:wrAqLNs2trwiCH/wxxmT/x3hKVH9PuV0GGW0oDoHVqc=
+k8s.io/code-generator v0.30.1 h1:ZsG++q5Vt0ScmKCeLhynUuWgcwFGg1Hl1AGfatqPJBI=
+k8s.io/code-generator v0.30.1/go.mod h1:hFgxRsvOUg79mbpbVKfjJvRhVz1qLoe40yZDJ/hwRH4=
+k8s.io/component-base v0.30.1 h1:bvAtlPh1UrdaZL20D9+sWxsJljMi0QZ3Lmw+kmZAaxQ=
+k8s.io/component-base v0.30.1/go.mod h1:e/X9kDiOebwlI41AvBHuWdqFriSRrX50CdwA9TFaHLI=
k8s.io/gengo/v2 v2.0.0-20240404160639-a0386bf69313 h1:bKcdZJOPICVmIIuaM9+MXmapE94dn5AYv5ODs1jA43o=
k8s.io/gengo/v2 v2.0.0-20240404160639-a0386bf69313/go.mod h1:VH3AT8AaQOqiGjMF9p0/IM1Dj+82ZwjfxUP1IxaHE+8=
k8s.io/klog/v2 v2.120.1 h1:QXU6cPEOIslTGvZaXvFWiP9VKyeet3sawzTOvdXb4Vw=
@@ -1976,8 +1977,8 @@ rsc.io/binaryregexp v0.2.0/go.mod h1:qTv7/COck+e2FymRvadv62gMdZztPaShugOCi3I+8D8
rsc.io/pdf v0.1.1/go.mod h1:n8OzWcQ6Sp37PL01nO98y4iUCRdTGarVfzxY20ICaU4=
rsc.io/quote/v3 v3.1.0/go.mod h1:yEA65RcK8LyAZtP9Kv3t0HmxON59tX3rD+tICJqUlj0=
rsc.io/sampler v1.3.0/go.mod h1:T1hPZKmBbMNahiBKFy5HrXp6adAjACjK9JXDnKaTXpA=
-sigs.k8s.io/controller-runtime v0.18.1 h1:RpWbigmuiylbxOCLy0tGnq1cU1qWPwNIQzoJk+QeJx4=
-sigs.k8s.io/controller-runtime v0.18.1/go.mod h1:tuAt1+wbVsXIT8lPtk5RURxqAnq7xkpv2Mhttslg7Hw=
+sigs.k8s.io/controller-runtime v0.18.3 h1:B5Wmmo8WMWK7izei+2LlXLVDGzMwAHBNLX68lwtlSR4=
+sigs.k8s.io/controller-runtime v0.18.3/go.mod h1:TVoGrfdpbA9VRFaRnKgk9P5/atA0pMwq+f+msb9M8Sg=
sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd h1:EDPBXCAspyGV4jQlpZSudPeMmr1bNJefnuqLsRAsHZo=
sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd/go.mod h1:B8JuhiUyNFVKdsE8h686QcCxMaH6HrOAZj4vswFpcB0=
sigs.k8s.io/kustomize/api v0.16.0 h1:/zAR4FOQDCkgSDmVzV2uiFbuy9bhu3jEzthrHCuvm1g=
From 5639979cb514d5310e069f88b2c8e89a9b5f84f5 Mon Sep 17 00:00:00 2001
From: Long Wu Yuan
Date: Wed, 29 May 2024 00:07:30 +0530
Subject: [PATCH 071/283] removed tlsv1 & tlsv1.1 (#11343)
---
docs/user-guide/tls.md | 4 +-
internal/ingress/annotations/proxyssl/main.go | 4 +-
.../ingress/annotations/proxyssl/main_test.go | 4 +-
.../ingress/annotations/sslcipher/main.go | 2 +-
pkg/apis/ingress/types.go | 2 +-
test/data/config.json | 123624 ++++++++-------
test/e2e/annotations/proxyssl.go | 8 +-
7 files changed, 63363 insertions(+), 60285 deletions(-)
diff --git a/docs/user-guide/tls.md b/docs/user-guide/tls.md
index 11338981b..af62cf7e3 100644
--- a/docs/user-guide/tls.md
+++ b/docs/user-guide/tls.md
@@ -23,7 +23,7 @@ The resulting secret will be of type `kubernetes.io/tls`.
## Host names
-Ensure that the relevant [ingress rules specify a matching host name](https://kubernetes.io/docs/concepts/services-networking/ingress/#tls).
+Ensure that the relevant [ingress rules specify a matching hostname](https://kubernetes.io/docs/concepts/services-networking/ingress/#tls).
## Default SSL Certificate
@@ -145,7 +145,7 @@ metadata:
name: nginx-config
data:
ssl-ciphers: "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES256-SHA256:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA"
- ssl-protocols: "TLSv1 TLSv1.1 TLSv1.2 TLSv1.3"
+ ssl-protocols: "TLSv1.2 TLSv1.3"
```
diff --git a/internal/ingress/annotations/proxyssl/main.go b/internal/ingress/annotations/proxyssl/main.go
index 0e854cd21..c40bc85e0 100644
--- a/internal/ingress/annotations/proxyssl/main.go
+++ b/internal/ingress/annotations/proxyssl/main.go
@@ -32,7 +32,7 @@ import (
const (
defaultProxySSLCiphers = "DEFAULT"
- defaultProxySSLProtocols = "TLSv1 TLSv1.1 TLSv1.2"
+ defaultProxySSLProtocols = "TLSv1.2"
defaultProxySSLVerify = "off"
defaultProxySSLVerifyDepth = 1
defaultProxySSLServerName = "off"
@@ -40,7 +40,7 @@ const (
var (
proxySSLOnOffRegex = regexp.MustCompile(`^(on|off)$`)
- proxySSLProtocolRegex = regexp.MustCompile(`^(SSLv2|SSLv3|TLSv1|TLSv1\.1|TLSv1\.2|TLSv1\.3| )*$`)
+ proxySSLProtocolRegex = regexp.MustCompile(`^(TLSv1\.2|TLSv1\.3| )*$`)
proxySSLCiphersRegex = regexp.MustCompile(`^[A-Za-z0-9\+:\_\-!]*$`)
)
diff --git a/internal/ingress/annotations/proxyssl/main_test.go b/internal/ingress/annotations/proxyssl/main_test.go
index a20c6813d..cfa31f1d1 100644
--- a/internal/ingress/annotations/proxyssl/main_test.go
+++ b/internal/ingress/annotations/proxyssl/main_test.go
@@ -32,7 +32,7 @@ const (
proxySslCiphers = "HIGH:-SHA"
off = "off"
sslServerName = "w00t"
- defaultProtocol = "SSLv2 TLSv1 TLSv1.2 TLSv1.3"
+ defaultProtocol = "TLSv1.2 TLSv1.3"
)
func buildIngress() *networking.Ingress {
@@ -103,7 +103,7 @@ func TestAnnotations(t *testing.T) {
data[parser.GetAnnotationWithPrefix(proxySSLSecretAnnotation)] = defaultDemoSecret
data[parser.GetAnnotationWithPrefix("proxy-ssl-ciphers")] = proxySslCiphers
data[parser.GetAnnotationWithPrefix("proxy-ssl-name")] = "$host"
- data[parser.GetAnnotationWithPrefix("proxy-ssl-protocols")] = "TLSv1.3 SSLv2 TLSv1 TLSv1.2"
+ data[parser.GetAnnotationWithPrefix("proxy-ssl-protocols")] = "TLSv1.3 TLSv1.2"
data[parser.GetAnnotationWithPrefix("proxy-ssl-server-name")] = "on"
data[parser.GetAnnotationWithPrefix("proxy-ssl-session-reuse")] = off
data[parser.GetAnnotationWithPrefix("proxy-ssl-verify")] = "on"
diff --git a/internal/ingress/annotations/sslcipher/main.go b/internal/ingress/annotations/sslcipher/main.go
index 7a282d0a0..3cfd903bd 100644
--- a/internal/ingress/annotations/sslcipher/main.go
+++ b/internal/ingress/annotations/sslcipher/main.go
@@ -43,7 +43,7 @@ var sslCipherAnnotations = parser.Annotation{
Scope: parser.AnnotationScopeIngress,
Risk: parser.AnnotationRiskLow,
Documentation: `The following annotation will set the ssl_prefer_server_ciphers directive at the server level.
- This configuration specifies that server ciphers should be preferred over client ciphers when using the SSLv3 and TLS protocols.`,
+ This configuration specifies that server ciphers should be preferred over client ciphers when using the TLS protocols.`,
},
sslCipherAnnotation: {
Validator: parser.ValidateRegex(regexValidSSLCipher, true),
diff --git a/pkg/apis/ingress/types.go b/pkg/apis/ingress/types.go
index 269814d34..36067732e 100644
--- a/pkg/apis/ingress/types.go
+++ b/pkg/apis/ingress/types.go
@@ -211,7 +211,7 @@ type Server struct {
// SSLCiphers returns list of ciphers to be enabled
SSLCiphers string `json:"sslCiphers,omitempty"`
// SSLPreferServerCiphers indicates that server ciphers should be preferred
- // over client ciphers when using the SSLv3 and TLS protocols.
+ // over client ciphers when using the TLS protocols.
SSLPreferServerCiphers string `json:"sslPreferServerCiphers,omitempty"`
// AuthTLSError contains the reason why the access to a server should be denied
AuthTLSError string `json:"authTLSError,omitempty"`
diff --git a/test/data/config.json b/test/data/config.json
index d64cfe0d2..df8a9fd3d 100644
--- a/test/data/config.json
+++ b/test/data/config.json
@@ -1,60275 +1,63353 @@
{
- "backlogSize": 32768,
- "isIPV6Enabled": true,
- "cfg": {
- "disable-ipv6": false,
- "bind-address-ipv4": ["1.1.1.1", "2.2.2.2"],
- "bind-address-ipv6": ["[2001:db8:a0b:12f0::1]", "[3731:54:65fe:2::a7]", "[33:33:33::33::33]"],
- "backend": {
- "custom-http-errors": [404],
- "proxy-buffers-number": "4",
- "proxy-buffer-size": "4k",
- "proxy-connect-timeout": 5,
- "proxy-read-timeout": 60,
- "proxy-send-timeout": 60,
- "skip-access-log-urls": ["~*health-check", "~*info"],
- "ssl-redirect": true,
- "upstream-fail-timeout": 0,
- "upstream-max-fails": 0,
- "upstream-hash-by": "$request_uri",
- "whitelist-source-range": null
- },
- "bodySize": "1m",
- "enableSpdy": false,
- "errorLogLevel": "notice",
- "gzipTypes": "application/atom+xml application/javascript application/x-javascript application/json application/rss+xml application/vnd.ms-fontobject application/x-font-ttf application/x-web-app-manifest+json application/xhtml+xml application/xml font/opentype image/svg+xml image/x-icon text/css text/javascript text/plain text/x-component",
- "hsts": true,
- "hstsIncludeSubdomains": true,
- "hstsMaxAge": "31536000",
- "keepAlive": 75,
- "mapHashBucketSize": 64,
- "maxWorkerConnections": 16384,
- "nginxStatusIpv4Whitelist": "127.0.0.1",
- "nginxStatusIpv6Whitelist": "::1",
- "proxyRealIpCidr": "0.0.0.0/0",
- "retryNonIdempotent": false,
- "serverNameHashBucketSize": 64,
- "serverNameHashMaxSize": 16384,
- "sslBufferSize": "4k",
- "sslCiphers": "ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA",
- "sslProtocols": "TLSv1 TLSv1.1 TLSv1.2",
- "sslSessionCache": true,
- "sslSessionCacheSize": "10m",
- "sslSessionTickets": true,
- "sslSessionTimeout": "10m",
- "useGzip": true,
- "useHttp2": true,
- "proxyStreamTimeout": "600s",
- "workerProcesses": 1,
- "limitConnZoneVariable": "$remote_addr"
- },
- "customErrors": true,
- "defResolver": "",
- "healthzURI": "/healthz",
- "passthroughBackends": [{
- "namespace": "default-kubernetes-443",
- "hostname": "foo-898.bar.com"
- }, {
- "namespace": "default-echoheaders-x-80",
- "hostname": "foo-997.bar.com"
- }, {
- "namespace": "default-kubernetes-443",
- "hostname": "kubernetes.foo-bar.com"
- }],
- "servers": [{
- "hostname": "_",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/testpath",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": true
- },
- "denylist": {
- "cidr": ["1.1.1.1"]
- },
- "whitelist": {
- "cidr": ["1.1.1.1"]
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }, {
- "path": "/",
- "isDefBackend": true,
- "backend": "upstream-default-backend",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": ["1.1.1.1"]
- },
- "whitelist": {
- "cidr": ["1.1.1.1"]
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "bar.baz.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/foo",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }, {
- "path": "/bar",
- "isDefBackend": false,
- "backend": "default-echoheaders-y-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }, {
- "path": "/",
- "isDefBackend": true,
- "backend": "upstream-default-backend",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": null
- },
- "whitelist": {
- "cidr": null
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "default-backend.sample.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": true,
- "backend": "default-echoheaders-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": null
- },
- "whitelist": {
- "cidr": null
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "external-auth-01.sample.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "https://httpbun.com/basic-auth/user/passwd",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": true
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-1.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-10.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-100.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-1000.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-101.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-102.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-103.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-104.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-105.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-106.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-107.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-108.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-109.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-11.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-110.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-111.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-112.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-113.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-114.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-115.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-116.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-117.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-118.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-119.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-12.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-120.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-121.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-122.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-123.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-124.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-125.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-126.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-127.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-128.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-129.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-13.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-130.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-131.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-132.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-133.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-134.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-135.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-136.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-137.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-138.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-139.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-14.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-140.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-141.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-142.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-143.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-144.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-145.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-146.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-147.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-148.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-149.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-15.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-150.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-151.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-152.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-153.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-154.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-155.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-156.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-157.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-158.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-159.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-16.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-160.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-161.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-162.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-163.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-164.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-165.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-166.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-167.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-168.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-169.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-17.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-170.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-171.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-172.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-173.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-174.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-175.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-176.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-177.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-178.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-179.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-18.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-180.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-181.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-182.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-183.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-184.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-185.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-186.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-187.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-188.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-189.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-19.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-190.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-191.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-192.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-193.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-194.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-195.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-196.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-197.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-198.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-199.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-2.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-20.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-200.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-201.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-202.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-203.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-204.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-205.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-206.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-207.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-208.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-209.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-21.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-210.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-211.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-212.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-213.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-214.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-215.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-216.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-217.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-218.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-219.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-22.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-220.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-221.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-222.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-223.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-224.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-225.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-226.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-227.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-228.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-229.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-23.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-230.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-231.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-232.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-233.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-234.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-235.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-236.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-237.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-238.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-239.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-24.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-240.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-241.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-242.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-243.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-244.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-245.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-246.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-247.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-248.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-249.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-25.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-250.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-251.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-252.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-253.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-254.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-255.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-256.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-257.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-258.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-259.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-26.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-260.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-261.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-262.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-263.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-264.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-265.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-266.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-267.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-268.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-269.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-27.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-270.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-271.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-272.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-273.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-274.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-275.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-276.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-277.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-278.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-279.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-28.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-280.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-281.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-282.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-283.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-284.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-285.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-286.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-287.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-288.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-289.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-29.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-290.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-291.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-292.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-293.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-294.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-295.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-296.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-297.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-298.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-299.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-3.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-30.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-300.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-301.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-302.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-303.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-304.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-305.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-306.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-307.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-308.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-309.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-31.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-310.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-311.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-312.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-313.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-314.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-315.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-316.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-317.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-318.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-319.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-32.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-320.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-321.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-322.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-323.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-324.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-325.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-326.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-327.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-328.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-329.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-33.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-330.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-331.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-332.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-333.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-334.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-335.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-336.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-337.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-338.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-339.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-34.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-340.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-341.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-342.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-343.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-344.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-345.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-346.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-347.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-348.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-349.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-35.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-350.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-351.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-352.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-353.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-354.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-355.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-356.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-357.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-358.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-359.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-36.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-360.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-361.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-362.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-363.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-364.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-365.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-366.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-367.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-368.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-369.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-37.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-370.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-371.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-372.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-373.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-374.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-375.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-376.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-377.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-378.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-379.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-38.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-380.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-381.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-382.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-383.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-384.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-385.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-386.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-387.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-388.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-389.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-39.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-390.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-391.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-392.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-393.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-394.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-395.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-396.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-397.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-398.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-399.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-4.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-40.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-400.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-401.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-402.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-403.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-404.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-405.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-406.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-407.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-408.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-409.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-41.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-410.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-411.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-412.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-413.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-414.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-415.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-416.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-417.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-418.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-419.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-42.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-420.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-421.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-422.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-423.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-424.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-425.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-426.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-427.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-428.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-429.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-43.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-430.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-431.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-432.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-433.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-434.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-435.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-436.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-437.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-438.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-439.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-44.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-440.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-441.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-442.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-443.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-444.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-445.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-446.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-447.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-448.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-449.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-45.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-450.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-451.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-452.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-453.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-454.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-455.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-456.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-457.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-458.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-459.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-46.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-460.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-461.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-462.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-463.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-464.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-465.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-466.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-467.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-468.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-469.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-47.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-470.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-471.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-472.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-473.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-474.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-475.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-476.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-477.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-478.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-479.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-48.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-480.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-481.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-482.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-483.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-484.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-485.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-486.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-487.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-488.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-489.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-49.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-490.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-491.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-492.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-493.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-494.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-495.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-496.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-497.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-498.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-499.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-5.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-50.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-500.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-501.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-502.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-503.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-504.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-505.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-506.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-507.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-508.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-509.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-51.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-510.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-511.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-512.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-513.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-514.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-515.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-516.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-517.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-518.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-519.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-52.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-520.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-521.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-522.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-523.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-524.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-525.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-526.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-527.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-528.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-529.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-53.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-530.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-531.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-532.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-533.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-534.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-535.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-536.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-537.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-538.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-539.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-54.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-540.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-541.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-542.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-543.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-544.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-545.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-546.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-547.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-548.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-549.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-55.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-550.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-551.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-552.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-553.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-554.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-555.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-556.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-557.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-558.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-559.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-56.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-560.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-561.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-562.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-563.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-564.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-565.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-566.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-567.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-568.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-569.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-57.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-570.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-571.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-572.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-573.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-574.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-575.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-576.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-577.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-578.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-579.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-58.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-580.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-581.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-582.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-583.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-584.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-585.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-586.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-587.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-588.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-589.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-59.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-590.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-591.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-592.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-593.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-594.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-595.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-596.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-597.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-598.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-599.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-6.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-60.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-600.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-601.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-602.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-603.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-604.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-605.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-606.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-607.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-608.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-609.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-61.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-610.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-611.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-612.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-613.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-614.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-615.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-616.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-617.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-618.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-619.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-62.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-620.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-621.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-622.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-623.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-624.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-625.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-626.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-627.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-628.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-629.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-63.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-630.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-631.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-632.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-633.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-634.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-635.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-636.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-637.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-638.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-639.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-64.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-640.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-641.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-642.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-643.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-644.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-645.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-646.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-647.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-648.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-649.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-65.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-650.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-651.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-652.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-653.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-654.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-655.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-656.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-657.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-658.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-659.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-66.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-660.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-661.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-662.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-663.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-664.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-665.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-666.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-667.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-668.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-669.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-67.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-670.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-671.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-672.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-673.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-674.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-675.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-676.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-677.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-678.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-679.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-68.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-680.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-681.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-682.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-683.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-684.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-685.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-686.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-687.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-688.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-689.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-69.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-690.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-691.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-692.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-693.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-694.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-695.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-696.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-697.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-698.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-699.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-7.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-70.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-700.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-701.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-702.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-703.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-704.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-705.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-706.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-707.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-708.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-709.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-71.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-710.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-711.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-712.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-713.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-714.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-715.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-716.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-717.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-718.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-719.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-72.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-720.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-721.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-722.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-723.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-724.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-725.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-726.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-727.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-728.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-729.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-73.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-730.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-731.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-732.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-733.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-734.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-735.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-736.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-737.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-738.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-739.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-74.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-740.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-741.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-742.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-743.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-744.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-745.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-746.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-747.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-748.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-749.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-75.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-750.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-751.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-752.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-753.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-754.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-755.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-756.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-757.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-758.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-759.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-76.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-760.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-761.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-762.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-763.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-764.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-765.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-766.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-767.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-768.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-769.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-77.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-770.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-771.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-772.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-773.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-774.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-775.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-776.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-777.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-778.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-779.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-78.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-780.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-781.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-782.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-783.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-784.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-785.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-786.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-787.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-788.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-789.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-79.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-790.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-791.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-792.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-793.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-794.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-795.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-796.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-797.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-798.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-799.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-8.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-80.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-800.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-801.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-802.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-803.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-804.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-805.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-806.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-807.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-808.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-809.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-81.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-810.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-811.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-812.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-813.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-814.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-815.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-816.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-817.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-818.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-819.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-82.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-820.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-821.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-822.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-823.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-824.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-825.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-826.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-827.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-828.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-829.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-83.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-830.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-831.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-832.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-833.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-834.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-835.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-836.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-837.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-838.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-839.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-84.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-840.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-841.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-842.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-843.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-844.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-845.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-846.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-847.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-848.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-849.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-85.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-850.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-851.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-852.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-853.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-854.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-855.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-856.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-857.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-858.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-859.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-86.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-860.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-861.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-862.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-863.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-864.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-865.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-866.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-867.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-868.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-869.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-87.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-870.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-871.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-872.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-873.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-874.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-875.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-876.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-877.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-878.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-879.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-88.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-880.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-881.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-882.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-883.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-884.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-885.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-886.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-887.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-888.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-889.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-89.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-890.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-891.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-892.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-893.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-894.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-895.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-896.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-897.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-898.bar.com",
- "sslPassthrough": true,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-kubernetes-443",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": true
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-899.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-9.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-90.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-900.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-901.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-902.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-903.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-904.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-905.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-906.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-907.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-908.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-909.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-91.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-910.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-911.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-912.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-913.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-914.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-915.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-916.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-917.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-918.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-919.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-92.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-920.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-921.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-922.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-923.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-924.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-925.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-926.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-927.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-928.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-929.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-93.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-930.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-931.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-932.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-933.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-934.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-935.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-936.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-937.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-938.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-939.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-94.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-940.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-941.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-942.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-943.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-944.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-945.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-946.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-947.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-948.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-949.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-95.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-950.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-951.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-952.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-953.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-954.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-955.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-956.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-957.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-958.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-959.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-96.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-960.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-961.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-962.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-963.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-964.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-965.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-966.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-967.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-968.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-969.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-97.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-970.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-971.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-972.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-973.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-974.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-975.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-976.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-977.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-978.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-979.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-98.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-980.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-981.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-982.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-983.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-984.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-985.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-986.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-987.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-988.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-989.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-99.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-990.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-991.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-992.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": true
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "default/aledbf-ca-secret",
- "certFilename": "/ingress-controller/ssl/default-aledbf-ca-secret.pem",
- "keyFilename": "",
- "caFilename": "/ingress-controller/ssl/ca-default-aledbf-ca-secret.pem",
- "pemSha": "69d055bd017208111377c971ba5ee0987fecee65"
- }
- }]
- }, {
- "hostname": "foo-993.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-994.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-995.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-996.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-997.bar.com",
- "sslPassthrough": true,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": true
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo-998.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "https://httpbun.com/basic-auth/user/passwd",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": true
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/foo",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }, {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo2.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-xtp-echo-port",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": true
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foo3.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-xtp-echo-port",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "foos.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": true
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "jenkins.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/jenkins",
- "isDefBackend": false,
- "backend": "default-jenkins-8080",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "default_jenkins_conn",
- "limit": 2,
- "burst": 10,
- "sharedSize": 5
- },
- "rps": {
- "name": "default_jenkins_rps",
- "limit": 0,
- "burst": 10,
- "sharedSize": 5
- }
- },
- "redirect": {
- "target": "/",
- "addBaseUrl": true,
- "sslRedirect": true
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }, {
- "path": "/",
- "isDefBackend": true,
- "backend": "upstream-default-backend",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": null
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "kubernetes.foo-bar.com",
- "sslPassthrough": true,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-kubernetes-443",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": true
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "no-root.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/api",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }, {
- "path": "/",
- "isDefBackend": true,
- "backend": "upstream-default-backend",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": null
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "rewrite.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/something",
- "isDefBackend": false,
- "backend": "default-echoheaders-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "/",
- "addBaseUrl": false,
- "sslRedirect": true
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }, {
- "path": "/",
- "isDefBackend": true,
- "backend": "upstream-default-backend",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": null
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "whitelist.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": true
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }, {
- "hostname": "with-root.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [{
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }]
- }],
- "sslDHParam": "",
- "tcpBackends": [],
- "udpBackends": [],
- "backends": [{
- "name": "default-echoheaders-80",
- "secure": false,
- "endpoints": [{
- "address": "10.2.3.2",
- "port": "8080",
- "maxFails": 0,
- "failTimeout": 0
- }, {
- "address": "10.2.3.5",
- "port": "8080",
- "maxFails": 0,
- "failTimeout": 0
- }]
- }, {
- "name": "default-echoheaders-x-80",
- "secure": false,
- "endpoints": [{
- "address": "10.2.3.4",
- "port": "8080",
- "maxFails": 0,
- "failTimeout": 0
- }]
- }, {
- "name": "default-echoheaders-xtp-echo-port",
- "secure": false,
- "endpoints": [{
- "address": "127.0.0.1",
- "port": "8181",
- "maxFails": 0,
- "failTimeout": 0
- }]
- }, {
- "name": "default-echoheaders-y-80",
- "secure": false,
- "endpoints": [{
- "address": "10.2.3.4",
- "port": "8080",
- "maxFails": 0,
- "failTimeout": 0
- }]
- }, {
- "name": "default-jenkins-8080",
- "secure": false,
- "endpoints": [{
- "address": "127.0.0.1",
- "port": "8181",
- "maxFails": 0,
- "failTimeout": 0
- }]
- }, {
- "name": "default-kubernetes-443",
- "secure": false,
- "endpoints": [{
- "address": "172.17.4.99",
- "port": "443",
- "maxFails": 0,
- "failTimeout": 0
- }]
- }, {
- "name": "upstream-default-backend",
- "secure": false,
- "endpoints": [{
- "address": "10.2.3.11",
- "port": "8080",
- "maxFails": 0,
- "failTimeout": 0
- }]
- }]
+ "backlogSize": 32768,
+ "isIPV6Enabled": true,
+ "cfg": {
+ "disable-ipv6": false,
+ "bind-address-ipv4": ["1.1.1.1", "2.2.2.2"],
+ "bind-address-ipv6": [
+ "[2001:db8:a0b:12f0::1]",
+ "[3731:54:65fe:2::a7]",
+ "[33:33:33::33::33]"
+ ],
+ "backend": {
+ "custom-http-errors": [404],
+ "proxy-buffers-number": "4",
+ "proxy-buffer-size": "4k",
+ "proxy-connect-timeout": 5,
+ "proxy-read-timeout": 60,
+ "proxy-send-timeout": 60,
+ "skip-access-log-urls": ["~*health-check", "~*info"],
+ "ssl-redirect": true,
+ "upstream-fail-timeout": 0,
+ "upstream-max-fails": 0,
+ "upstream-hash-by": "$request_uri",
+ "whitelist-source-range": null
+ },
+ "bodySize": "1m",
+ "enableSpdy": false,
+ "errorLogLevel": "notice",
+ "gzipTypes": "application/atom+xml application/javascript application/x-javascript application/json application/rss+xml application/vnd.ms-fontobject application/x-font-ttf application/x-web-app-manifest+json application/xhtml+xml application/xml font/opentype image/svg+xml image/x-icon text/css text/javascript text/plain text/x-component",
+ "hsts": true,
+ "hstsIncludeSubdomains": true,
+ "hstsMaxAge": "31536000",
+ "keepAlive": 75,
+ "mapHashBucketSize": 64,
+ "maxWorkerConnections": 16384,
+ "nginxStatusIpv4Whitelist": "127.0.0.1",
+ "nginxStatusIpv6Whitelist": "::1",
+ "proxyRealIpCidr": "0.0.0.0/0",
+ "retryNonIdempotent": false,
+ "serverNameHashBucketSize": 64,
+ "serverNameHashMaxSize": 16384,
+ "sslBufferSize": "4k",
+ "sslCiphers": "ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA",
+ "sslProtocols": "TLSv1.2",
+ "sslSessionCache": true,
+ "sslSessionCacheSize": "10m",
+ "sslSessionTickets": true,
+ "sslSessionTimeout": "10m",
+ "useGzip": true,
+ "useHttp2": true,
+ "proxyStreamTimeout": "600s",
+ "workerProcesses": 1,
+ "limitConnZoneVariable": "$remote_addr"
+ },
+ "customErrors": true,
+ "defResolver": "",
+ "healthzURI": "/healthz",
+ "passthroughBackends": [
+ {
+ "namespace": "default-kubernetes-443",
+ "hostname": "foo-898.bar.com"
+ },
+ {
+ "namespace": "default-echoheaders-x-80",
+ "hostname": "foo-997.bar.com"
+ },
+ {
+ "namespace": "default-kubernetes-443",
+ "hostname": "kubernetes.foo-bar.com"
+ }
+ ],
+ "servers": [
+ {
+ "hostname": "_",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/testpath",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": true
+ },
+ "denylist": {
+ "cidr": ["1.1.1.1"]
+ },
+ "whitelist": {
+ "cidr": ["1.1.1.1"]
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ },
+ {
+ "path": "/",
+ "isDefBackend": true,
+ "backend": "upstream-default-backend",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": ["1.1.1.1"]
+ },
+ "whitelist": {
+ "cidr": ["1.1.1.1"]
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "bar.baz.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/foo",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ },
+ {
+ "path": "/bar",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-y-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ },
+ {
+ "path": "/",
+ "isDefBackend": true,
+ "backend": "upstream-default-backend",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": null
+ },
+ "whitelist": {
+ "cidr": null
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "default-backend.sample.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": true,
+ "backend": "default-echoheaders-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": null
+ },
+ "whitelist": {
+ "cidr": null
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "external-auth-01.sample.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "https://httpbun.com/basic-auth/user/passwd",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": true
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-1.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-10.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-100.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-1000.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-101.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-102.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-103.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-104.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-105.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-106.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-107.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-108.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-109.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-11.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-110.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-111.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-112.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-113.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-114.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-115.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-116.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-117.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-118.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-119.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-12.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-120.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-121.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-122.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-123.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-124.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-125.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-126.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-127.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-128.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-129.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-13.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-130.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-131.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-132.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-133.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-134.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-135.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-136.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-137.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-138.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-139.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-14.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-140.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-141.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-142.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-143.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-144.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-145.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-146.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-147.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-148.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-149.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-15.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-150.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-151.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-152.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-153.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-154.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-155.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-156.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-157.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-158.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-159.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-16.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-160.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-161.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-162.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-163.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-164.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-165.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-166.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-167.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-168.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-169.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-17.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-170.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-171.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-172.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-173.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-174.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-175.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-176.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-177.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-178.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-179.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-18.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-180.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-181.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-182.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-183.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-184.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-185.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-186.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-187.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-188.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-189.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-19.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-190.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-191.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-192.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-193.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-194.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-195.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-196.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-197.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-198.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-199.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-2.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-20.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-200.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-201.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-202.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-203.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-204.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-205.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-206.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-207.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-208.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-209.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-21.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-210.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-211.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-212.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-213.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-214.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-215.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-216.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-217.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-218.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-219.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-22.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-220.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-221.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-222.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-223.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-224.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-225.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-226.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-227.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-228.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-229.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-23.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-230.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-231.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-232.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-233.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-234.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-235.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-236.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-237.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-238.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-239.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-24.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-240.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-241.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-242.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-243.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-244.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-245.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-246.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-247.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-248.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-249.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-25.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-250.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-251.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-252.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-253.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-254.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-255.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-256.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-257.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-258.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-259.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-26.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-260.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-261.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-262.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-263.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-264.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-265.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-266.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-267.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-268.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-269.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-27.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-270.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-271.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-272.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-273.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-274.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-275.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-276.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-277.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-278.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-279.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-28.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-280.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-281.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-282.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-283.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-284.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-285.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-286.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-287.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-288.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-289.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-29.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-290.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-291.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-292.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-293.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-294.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-295.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-296.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-297.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-298.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-299.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-3.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-30.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-300.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-301.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-302.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-303.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-304.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-305.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-306.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-307.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-308.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-309.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-31.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-310.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-311.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-312.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-313.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-314.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-315.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-316.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-317.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-318.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-319.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-32.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-320.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-321.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-322.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-323.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-324.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-325.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-326.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-327.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-328.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-329.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-33.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-330.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-331.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-332.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-333.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-334.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-335.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-336.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-337.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-338.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-339.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-34.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-340.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-341.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-342.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-343.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-344.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-345.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-346.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-347.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-348.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-349.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-35.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-350.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-351.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-352.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-353.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-354.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-355.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-356.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-357.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-358.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-359.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-36.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-360.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-361.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-362.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-363.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-364.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-365.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-366.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-367.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-368.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-369.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-37.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-370.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-371.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-372.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-373.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-374.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-375.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-376.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-377.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-378.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-379.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-38.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-380.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-381.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-382.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-383.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-384.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-385.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-386.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-387.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-388.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-389.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-39.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-390.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-391.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-392.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-393.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-394.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-395.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-396.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-397.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-398.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-399.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-4.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-40.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-400.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-401.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-402.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-403.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-404.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-405.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-406.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-407.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-408.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-409.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-41.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-410.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-411.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-412.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-413.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-414.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-415.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-416.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-417.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-418.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-419.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-42.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-420.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-421.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-422.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-423.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-424.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-425.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-426.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-427.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-428.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-429.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-43.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-430.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-431.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-432.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-433.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-434.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-435.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-436.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-437.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-438.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-439.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-44.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-440.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-441.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-442.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-443.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-444.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-445.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-446.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-447.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-448.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-449.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-45.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-450.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-451.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-452.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-453.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-454.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-455.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-456.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-457.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-458.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-459.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-46.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-460.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-461.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-462.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-463.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-464.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-465.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-466.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-467.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-468.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-469.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-47.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-470.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-471.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-472.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-473.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-474.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-475.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-476.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-477.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-478.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-479.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-48.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-480.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-481.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-482.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-483.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-484.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-485.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-486.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-487.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-488.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-489.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-49.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-490.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-491.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-492.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-493.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-494.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-495.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-496.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-497.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-498.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-499.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-5.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-50.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-500.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-501.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-502.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-503.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-504.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-505.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-506.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-507.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-508.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-509.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-51.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-510.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-511.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-512.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-513.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-514.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-515.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-516.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-517.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-518.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-519.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-52.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-520.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-521.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-522.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-523.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-524.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-525.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-526.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-527.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-528.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-529.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-53.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-530.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-531.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-532.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-533.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-534.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-535.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-536.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-537.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-538.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-539.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-54.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-540.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-541.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-542.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-543.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-544.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-545.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-546.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-547.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-548.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-549.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-55.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-550.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-551.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-552.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-553.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-554.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-555.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-556.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-557.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-558.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-559.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-56.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-560.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-561.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-562.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-563.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-564.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-565.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-566.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-567.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-568.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-569.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-57.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-570.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-571.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-572.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-573.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-574.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-575.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-576.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-577.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-578.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-579.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-58.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-580.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-581.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-582.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-583.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-584.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-585.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-586.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-587.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-588.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-589.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-59.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-590.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-591.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-592.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-593.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-594.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-595.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-596.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-597.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-598.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-599.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-6.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-60.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-600.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-601.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-602.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-603.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-604.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-605.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-606.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-607.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-608.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-609.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-61.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-610.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-611.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-612.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-613.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-614.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-615.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-616.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-617.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-618.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-619.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-62.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-620.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-621.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-622.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-623.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-624.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-625.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-626.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-627.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-628.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-629.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-63.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-630.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-631.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-632.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-633.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-634.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-635.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-636.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-637.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-638.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-639.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-64.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-640.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-641.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-642.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-643.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-644.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-645.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-646.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-647.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-648.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-649.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-65.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-650.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-651.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-652.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-653.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-654.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-655.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-656.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-657.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-658.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-659.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-66.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-660.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-661.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-662.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-663.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-664.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-665.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-666.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-667.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-668.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-669.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-67.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-670.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-671.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-672.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-673.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-674.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-675.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-676.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-677.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-678.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-679.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-68.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-680.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-681.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-682.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-683.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-684.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-685.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-686.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-687.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-688.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-689.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-69.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-690.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-691.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-692.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-693.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-694.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-695.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-696.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-697.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-698.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-699.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-7.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-70.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-700.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-701.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-702.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-703.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-704.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-705.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-706.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-707.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-708.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-709.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-71.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-710.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-711.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-712.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-713.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-714.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-715.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-716.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-717.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-718.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-719.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-72.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-720.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-721.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-722.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-723.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-724.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-725.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-726.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-727.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-728.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-729.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-73.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-730.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-731.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-732.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-733.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-734.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-735.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-736.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-737.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-738.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-739.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-74.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-740.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-741.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-742.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-743.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-744.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-745.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-746.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-747.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-748.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-749.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-75.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-750.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-751.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-752.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-753.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-754.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-755.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-756.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-757.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-758.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-759.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-76.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-760.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-761.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-762.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-763.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-764.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-765.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-766.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-767.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-768.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-769.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-77.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-770.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-771.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-772.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-773.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-774.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-775.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-776.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-777.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-778.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-779.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-78.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-780.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-781.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-782.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-783.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-784.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-785.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-786.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-787.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-788.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-789.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-79.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-790.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-791.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-792.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-793.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-794.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-795.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-796.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-797.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-798.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-799.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-8.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-80.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-800.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-801.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-802.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-803.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-804.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-805.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-806.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-807.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-808.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-809.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-81.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-810.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-811.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-812.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-813.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-814.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-815.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-816.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-817.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-818.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-819.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-82.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-820.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-821.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-822.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-823.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-824.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-825.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-826.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-827.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-828.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-829.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-83.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-830.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-831.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-832.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-833.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-834.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-835.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-836.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-837.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-838.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-839.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-84.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-840.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-841.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-842.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-843.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-844.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-845.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-846.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-847.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-848.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-849.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-85.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-850.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-851.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-852.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-853.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-854.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-855.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-856.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-857.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-858.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-859.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-86.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-860.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-861.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-862.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-863.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-864.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-865.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-866.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-867.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-868.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-869.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-87.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-870.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-871.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-872.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-873.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-874.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-875.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-876.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-877.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-878.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-879.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-88.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-880.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-881.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-882.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-883.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-884.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-885.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-886.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-887.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-888.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-889.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-89.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-890.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-891.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-892.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-893.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-894.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-895.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-896.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-897.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-898.bar.com",
+ "sslPassthrough": true,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-kubernetes-443",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": true
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-899.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-9.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-90.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-900.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-901.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-902.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-903.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-904.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-905.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-906.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-907.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-908.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-909.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-91.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-910.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-911.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-912.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-913.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-914.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-915.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-916.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-917.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-918.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-919.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-92.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-920.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-921.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-922.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-923.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-924.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-925.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-926.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-927.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-928.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-929.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-93.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-930.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-931.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-932.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-933.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-934.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-935.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-936.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-937.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-938.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-939.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-94.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-940.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-941.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-942.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-943.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-944.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-945.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-946.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-947.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-948.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-949.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-95.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-950.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-951.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-952.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-953.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-954.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-955.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-956.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-957.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-958.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-959.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-96.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-960.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-961.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-962.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-963.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-964.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-965.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-966.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-967.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-968.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-969.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-97.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-970.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-971.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-972.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-973.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-974.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-975.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-976.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-977.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-978.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-979.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-98.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-980.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-981.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-982.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-983.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-984.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-985.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-986.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-987.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-988.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-989.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-99.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-990.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-991.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-992.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": true
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "default/aledbf-ca-secret",
+ "certFilename": "/ingress-controller/ssl/default-aledbf-ca-secret.pem",
+ "keyFilename": "",
+ "caFilename": "/ingress-controller/ssl/ca-default-aledbf-ca-secret.pem",
+ "pemSha": "69d055bd017208111377c971ba5ee0987fecee65"
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-993.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-994.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-995.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-996.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-997.bar.com",
+ "sslPassthrough": true,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": true
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo-998.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "https://httpbun.com/basic-auth/user/passwd",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": true
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/foo",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ },
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo2.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-xtp-echo-port",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": true
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foo3.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-xtp-echo-port",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "foos.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": true
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "jenkins.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/jenkins",
+ "isDefBackend": false,
+ "backend": "default-jenkins-8080",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "default_jenkins_conn",
+ "limit": 2,
+ "burst": 10,
+ "sharedSize": 5
+ },
+ "rps": {
+ "name": "default_jenkins_rps",
+ "limit": 0,
+ "burst": 10,
+ "sharedSize": 5
+ }
+ },
+ "redirect": {
+ "target": "/",
+ "addBaseUrl": true,
+ "sslRedirect": true
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ },
+ {
+ "path": "/",
+ "isDefBackend": true,
+ "backend": "upstream-default-backend",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": null
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "kubernetes.foo-bar.com",
+ "sslPassthrough": true,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-kubernetes-443",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": true
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "no-root.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/api",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ },
+ {
+ "path": "/",
+ "isDefBackend": true,
+ "backend": "upstream-default-backend",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": null
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "rewrite.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/something",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "/",
+ "addBaseUrl": false,
+ "sslRedirect": true
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ },
+ {
+ "path": "/",
+ "isDefBackend": true,
+ "backend": "upstream-default-backend",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": null
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "whitelist.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": true
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ },
+ {
+ "hostname": "with-root.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [
+ {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }
+ ]
+ }
+ ],
+ "sslDHParam": "",
+ "tcpBackends": [],
+ "udpBackends": [],
+ "backends": [
+ {
+ "name": "default-echoheaders-80",
+ "secure": false,
+ "endpoints": [
+ {
+ "address": "10.2.3.2",
+ "port": "8080",
+ "maxFails": 0,
+ "failTimeout": 0
+ },
+ {
+ "address": "10.2.3.5",
+ "port": "8080",
+ "maxFails": 0,
+ "failTimeout": 0
+ }
+ ]
+ },
+ {
+ "name": "default-echoheaders-x-80",
+ "secure": false,
+ "endpoints": [
+ {
+ "address": "10.2.3.4",
+ "port": "8080",
+ "maxFails": 0,
+ "failTimeout": 0
+ }
+ ]
+ },
+ {
+ "name": "default-echoheaders-xtp-echo-port",
+ "secure": false,
+ "endpoints": [
+ {
+ "address": "127.0.0.1",
+ "port": "8181",
+ "maxFails": 0,
+ "failTimeout": 0
+ }
+ ]
+ },
+ {
+ "name": "default-echoheaders-y-80",
+ "secure": false,
+ "endpoints": [
+ {
+ "address": "10.2.3.4",
+ "port": "8080",
+ "maxFails": 0,
+ "failTimeout": 0
+ }
+ ]
+ },
+ {
+ "name": "default-jenkins-8080",
+ "secure": false,
+ "endpoints": [
+ {
+ "address": "127.0.0.1",
+ "port": "8181",
+ "maxFails": 0,
+ "failTimeout": 0
+ }
+ ]
+ },
+ {
+ "name": "default-kubernetes-443",
+ "secure": false,
+ "endpoints": [
+ {
+ "address": "172.17.4.99",
+ "port": "443",
+ "maxFails": 0,
+ "failTimeout": 0
+ }
+ ]
+ },
+ {
+ "name": "upstream-default-backend",
+ "secure": false,
+ "endpoints": [
+ {
+ "address": "10.2.3.11",
+ "port": "8080",
+ "maxFails": 0,
+ "failTimeout": 0
+ }
+ ]
+ }
+ ]
}
diff --git a/test/e2e/annotations/proxyssl.go b/test/e2e/annotations/proxyssl.go
index 989d681c1..898cbed48 100644
--- a/test/e2e/annotations/proxyssl.go
+++ b/test/e2e/annotations/proxyssl.go
@@ -47,7 +47,7 @@ var _ = framework.DescribeAnnotation("proxy-ssl-*", func() {
ing := framework.NewSingleIngressWithTLS(host, "/", host, []string{host}, f.Namespace, framework.EchoService, 80, annotations)
f.EnsureIngress(ing)
- assertProxySSL(f, host, "", "DEFAULT", "TLSv1 TLSv1.1 TLSv1.2", "off", 1, "")
+ assertProxySSL(f, host, "", "DEFAULT", "TLSv1.2", "off", 1, "")
f.HTTPTestClient().
GET("/").
@@ -77,7 +77,7 @@ var _ = framework.DescribeAnnotation("proxy-ssl-*", func() {
ing := framework.NewSingleIngressWithTLS(host, "/", host, []string{host}, f.Namespace, framework.EchoService, 80, annotations)
f.EnsureIngress(ing)
- assertProxySSL(f, host, "", "DEFAULT", "TLSv1 TLSv1.1 TLSv1.2", "on", 2, "on")
+ assertProxySSL(f, host, "", "DEFAULT", "TLSv1.2", "on", 2, "on")
f.HTTPTestClient().
GET("/").
@@ -105,7 +105,7 @@ var _ = framework.DescribeAnnotation("proxy-ssl-*", func() {
ing := framework.NewSingleIngressWithTLS(host, "/", host, []string{host}, f.Namespace, framework.EchoService, 80, annotations)
f.EnsureIngress(ing)
- assertProxySSL(f, host, "", "HIGH:!AES", "TLSv1 TLSv1.1 TLSv1.2", "off", 1, "")
+ assertProxySSL(f, host, "", "HIGH:!AES", "TLSv1.2", "off", 1, "")
f.HTTPTestClient().
GET("/").
@@ -171,7 +171,7 @@ var _ = framework.DescribeAnnotation("proxy-ssl-*", func() {
wlValue := "true"
f.UpdateNginxConfigMapData(wlKey, wlValue)
- assertProxySSL(f, host, secretName, "DEFAULT", "TLSv1 TLSv1.1 TLSv1.2", "on", 1, "on")
+ assertProxySSL(f, host, secretName, "DEFAULT", "TLSv1.2", "on", 1, "on")
f.WaitForNginxCustomConfiguration("## start server proxyssl.com", "location ", func(server string) bool {
return (!strings.Contains(server, "proxy_ssl_trusted_certificate") &&
From 8f4f15f8e38ee8b4e53819f34034f2b423609283 Mon Sep 17 00:00:00 2001
From: Long Wu Yuan
Date: Wed, 29 May 2024 13:11:45 +0530
Subject: [PATCH 072/283] added multiplecontrollers-howto to faq (#11389)
---
docs/faq.md | 60 +++++++++++++++++++++++++++-
docs/user-guide/k8s-122-migration.md | 51 -----------------------
2 files changed, 59 insertions(+), 52 deletions(-)
diff --git a/docs/faq.md b/docs/faq.md
index a210c221b..bd1d26718 100644
--- a/docs/faq.md
+++ b/docs/faq.md
@@ -1,6 +1,64 @@
# FAQ
+## How can I easily install multiple instances of the ingress-nginx controller in the same cluster?
+
+You can install them in different namespaces.
+
+- Create a new namespace
+
+ ```
+ kubectl create namespace ingress-nginx-2
+ ```
+
+- Use Helm to install the additional instance of the ingress controller
+- Ensure you have Helm working (refer to the [Helm documentation](https://helm.sh/docs/))
+- We have to assume that you have the helm repo for the ingress-nginx controller already added to your Helm config.
+ But, if you have not added the helm repo then you can do this to add the repo to your helm config;
+
+ ```
+ helm repo add ingress-nginx https://kubernetes.github.io/ingress-nginx
+ ```
+
+- Make sure you have updated the helm repo data;
+
+ ```
+ helm repo update
+ ```
+
+- Now, install an additional instance of the ingress-nginx controller like this:
+
+ ```
+ helm install ingress-nginx-2 ingress-nginx/ingress-nginx \
+ --namespace ingress-nginx-2 \
+ --set controller.ingressClassResource.name=nginx-two \
+ --set controller.ingressClass=nginx-two \
+ --set controller.ingressClassResource.controllerValue="example.com/ingress-nginx-2" \
+ --set controller.ingressClassResource.enabled=true \
+ --set controller.ingressClassByName=true
+ ```
+
+If you need to install yet another instance, then repeat the procedure to create a new namespace,
+change the values such as names & namespaces (for example from "-2" to "-3"), or anything else that meets your needs.
+
+Note that `controller.ingressClassResource.name` and `controller.ingressClass` have to be set correctly.
+The first is to create the IngressClass object and the other is to modify the deployment of the actual ingress controller pod.
+
+### I can't use multiple namespaces, what should I do?
+
+If you need to install all instances in the same namespace, then you need to specify a different **election id**, like this:
+
+```
+helm install ingress-nginx-2 ingress-nginx/ingress-nginx \
+--namespace kube-system \
+--set controller.electionID=nginx-two-leader \
+--set controller.ingressClassResource.name=nginx-two \
+--set controller.ingressClass=nginx-two \
+--set controller.ingressClassResource.controllerValue="example.com/ingress-nginx-2" \
+--set controller.ingressClassResource.enabled=true \
+--set controller.ingressClassByName=true
+```
+
## Retaining Client IPAddress
Please read [Retain Client IPAddress Guide here](./user-guide/retaining-client-ipaddress.md).
@@ -11,7 +69,7 @@ If you are using Ingress objects in your cluster (running Kubernetes older than
version 1.22), and you plan to upgrade your Kubernetes version to K8S 1.22 or
above, then please read [the migration guide here](./user-guide/k8s-122-migration.md).
-## Validation Of __`path`__
+## Validation Of **`path`**
- For improving security and also following desired standards on Kubernetes API
spec, the next release, scheduled for v1.8.0, will include a new & optional
diff --git a/docs/user-guide/k8s-122-migration.md b/docs/user-guide/k8s-122-migration.md
index 9a1ca081d..0880f020e 100644
--- a/docs/user-guide/k8s-122-migration.md
+++ b/docs/user-guide/k8s-122-migration.md
@@ -192,54 +192,3 @@ Bear in mind that if you start Ingress-Nginx B with the command line argument `-
It is highly likely that you will also see the name of the ingress resource in the same error message.
This error message has been observed on use the deprecated annotation (`kubernetes.io/ingress.class`) in an Ingress resource manifest.
It is recommended to use the `.spec.ingressClassName` field of the Ingress resource, to specify the name of the IngressClass of the Ingress you are defining.
-
-## How can I easily install multiple instances of the ingress-nginx controller in the same cluster?
-
-You can install them in different namespaces.
-
-- Create a new namespace
- ```
- kubectl create namespace ingress-nginx-2
- ```
-- Use Helm to install the additional instance of the ingress controller
-- Ensure you have Helm working (refer to the [Helm documentation](https://helm.sh/docs/))
-- We have to assume that you have the helm repo for the ingress-nginx controller already added to your Helm config.
- But, if you have not added the helm repo then you can do this to add the repo to your helm config;
- ```
- helm repo add ingress-nginx https://kubernetes.github.io/ingress-nginx
- ```
-- Make sure you have updated the helm repo data;
- ```
- helm repo update
- ```
-- Now, install an additional instance of the ingress-nginx controller like this:
- ```
- helm install ingress-nginx-2 ingress-nginx/ingress-nginx \
- --namespace ingress-nginx-2 \
- --set controller.ingressClassResource.name=nginx-two \
- --set controller.ingressClass=nginx-two \
- --set controller.ingressClassResource.controllerValue="example.com/ingress-nginx-2" \
- --set controller.ingressClassResource.enabled=true \
- --set controller.ingressClassByName=true
- ```
-
-If you need to install yet another instance, then repeat the procedure to create a new namespace,
-change the values such as names & namespaces (for example from "-2" to "-3"), or anything else that meets your needs.
-
-Note that `controller.ingressClassResource.name` and `controller.ingressClass` have to be set correctly.
-The first is to create the IngressClass object and the other is to modify the deployment of the actual ingress controller pod.
-
-### I can't use multiple namespaces, what should I do?
-
-If you need to install all instances in the same namespace, then you need to specify a different **election id**, like this:
-
-```
-helm install ingress-nginx-2 ingress-nginx/ingress-nginx \
---namespace kube-system \
---set controller.electionID=nginx-two-leader \
---set controller.ingressClassResource.name=nginx-two \
---set controller.ingressClass=nginx-two \
---set controller.ingressClassResource.controllerValue="example.com/ingress-nginx-2" \
---set controller.ingressClassResource.enabled=true \
---set controller.ingressClassByName=true
-```
From 5fea717bdbf8dd7417b8e3743cca41319dc31bb3 Mon Sep 17 00:00:00 2001
From: Long Wu Yuan
Date: Wed, 29 May 2024 13:54:22 +0530
Subject: [PATCH 073/283] added info for aws helm install (#11390)
---
docs/deploy/index.md | 125 ++++++++++++++++++++++++-------------------
1 file changed, 71 insertions(+), 54 deletions(-)
diff --git a/docs/deploy/index.md b/docs/deploy/index.md
index 7232b6ffd..70bd48f4f 100644
--- a/docs/deploy/index.md
+++ b/docs/deploy/index.md
@@ -6,10 +6,10 @@ There are multiple ways to install the Ingress-Nginx Controller:
- with `kubectl apply`, using YAML manifests;
- with specific addons (e.g. for [minikube](#minikube) or [MicroK8s](#microk8s)).
-On most Kubernetes clusters, the ingress controller will work without requiring any extra configuration. If you want to
-get started as fast as possible, you can check the [quick start](#quick-start) instructions. However, in many
-environments, you can improve the performance or get better logs by enabling extra features. We recommend that you
-check the [environment-specific instructions](#environment-specific-instructions) for details about optimizing the
+On most Kubernetes clusters, the ingress controller will work without requiring any extra configuration. If you want to
+get started as fast as possible, you can check the [quick start](#quick-start) instructions. However, in many
+environments, you can improve the performance or get better logs by enabling extra features. We recommend that you
+check the [environment-specific instructions](#environment-specific-instructions) for details about optimizing the
ingress controller for your particular environment or cloud provider.
## Contents
@@ -72,7 +72,7 @@ kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/cont
```
!!! info
- The YAML manifest in the command above was generated with `helm template`, so you will end up with almost the same
+ The YAML manifest in the command above was generated with `helm template`, so you will end up with almost the same
resources as if you had used Helm to install the controller.
!!! attention
@@ -83,6 +83,7 @@ kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/cont
### Firewall configuration
To check which ports are used by your installation of ingress-nginx, look at the output of `kubectl -n ingress-nginx get pod -o yaml`. In general, you need:
+
- Port 8443 open between all hosts on which the kubernetes nodes are running. This is used for the ingress-nginx [admission controller](https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/).
- Port 80 (for HTTP) and/or 443 (for HTTPS) open to the public on the kubernetes nodes to which the DNS of your apps are pointing.
@@ -94,7 +95,7 @@ A few pods should start in the `ingress-nginx` namespace:
kubectl get pods --namespace=ingress-nginx
```
-After a while, they should all be running. The following command will wait for the ingress controller pod to be up,
+After a while, they should all be running. The following command will wait for the ingress controller pod to be up,
running, and ready:
```console
@@ -104,7 +105,6 @@ kubectl wait --namespace ingress-nginx \
--timeout=120s
```
-
### Local testing
Let's create a simple web server and the associated service:
@@ -135,6 +135,7 @@ kubectl port-forward --namespace=ingress-nginx service/ingress-nginx-controller
[This issue](https://github.com/kubernetes/ingress-nginx/issues/10014#issuecomment-1567791549described) shows a typical DNS problem and its solution.
At this point, you can access your deployment using curl ;
+
```console
curl --resolve demo.localdev.me:8080:127.0.0.1 http://demo.localdev.me:8080
```
@@ -143,7 +144,7 @@ You should see a HTML response containing text like **"It works!"**.
### Online testing
-If your Kubernetes cluster is a "real" cluster that supports services of type `LoadBalancer`, it will have allocated an
+If your Kubernetes cluster is a "real" cluster that supports services of type `LoadBalancer`, it will have allocated an
external IP address or FQDN to the ingress controller.
You can see that IP address or FQDN with the following command:
@@ -152,10 +153,10 @@ You can see that IP address or FQDN with the following command:
kubectl get service ingress-nginx-controller --namespace=ingress-nginx
```
-It will be the `EXTERNAL-IP` field. If that field shows ``, this means that your Kubernetes cluster wasn't
+It will be the `EXTERNAL-IP` field. If that field shows ``, this means that your Kubernetes cluster wasn't
able to provision the load balancer (generally, this is because it doesn't support services of type `LoadBalancer`).
-Once you have the external IP address (or FQDN), set up a DNS record pointing to it. Then you can create an ingress
+Once you have the external IP address (or FQDN), set up a DNS record pointing to it. Then you can create an ingress
resource. The following example assumes that you have set up a DNS record for `www.demo.io`:
```console
@@ -164,13 +165,13 @@ kubectl create ingress demo --class=nginx \
```
Alternatively, the above command can be rewritten as follows for the ```--rule``` command and below.
+
```console
kubectl create ingress demo --class=nginx \
--rule www.demo.io/=demo:80
```
-
-You should then be able to see the "It works!" page when you connect to http://www.demo.io/. Congratulations,
+You should then be able to see the "It works!" page when you connect to . Congratulations,
you are serving a public website hosted on a Kubernetes cluster! 🎉
## Environment-specific instructions
@@ -202,19 +203,19 @@ Kubernetes is available in Docker Desktop:
- Mac, from [version 18.06.0-ce](https://docs.docker.com/docker-for-mac/release-notes/#stable-releases-of-2018)
- Windows, from [version 18.06.0-ce](https://docs.docker.com/docker-for-windows/release-notes/#docker-community-edition-18060-ce-win70-2018-07-25)
-First, make sure that Kubernetes is enabled in the Docker settings. The command `kubectl get nodes` should show a
+First, make sure that Kubernetes is enabled in the Docker settings. The command `kubectl get nodes` should show a
single node called `docker-desktop`.
The ingress controller can be installed on Docker Desktop using the default [quick start](#quick-start) instructions.
-On most systems, if you don't have any other service of type `LoadBalancer` bound to port 80, the ingress controller
-will be assigned the `EXTERNAL-IP` of `localhost`, which means that it will be reachable on localhost:80. If that
-doesn't work, you might have to fall back to the `kubectl port-forward` method described in the
+On most systems, if you don't have any other service of type `LoadBalancer` bound to port 80, the ingress controller
+will be assigned the `EXTERNAL-IP` of `localhost`, which means that it will be reachable on localhost:80. If that
+doesn't work, you might have to fall back to the `kubectl port-forward` method described in the
[local testing section](#local-testing).
#### Rancher Desktop
-Rancher Desktop provides Kubernetes and Container Management on the desktop. Kubernetes is enabled by default in Rancher Desktop.
+Rancher Desktop provides Kubernetes and Container Management on the desktop. Kubernetes is enabled by default in Rancher Desktop.
Rancher Desktop uses K3s under the hood, which in turn uses Traefik as the default ingress controller for the Kubernetes cluster. To use Ingress-Nginx Controller in place of the default Traefik, disable Traefik from Preference > Kubernetes menu.
@@ -222,18 +223,18 @@ Once traefik is disabled, the Ingress-Nginx Controller can be installed on Ranch
### Cloud deployments
-If the load balancers of your cloud provider do active healthchecks on their backends (most do), you can change the
-`externalTrafficPolicy` of the ingress controller Service to `Local` (instead of the default `Cluster`) to save an
-extra hop in some cases. If you're installing with Helm, this can be done by adding
+If the load balancers of your cloud provider do active healthchecks on their backends (most do), you can change the
+`externalTrafficPolicy` of the ingress controller Service to `Local` (instead of the default `Cluster`) to save an
+extra hop in some cases. If you're installing with Helm, this can be done by adding
`--set controller.service.externalTrafficPolicy=Local` to the `helm install` or `helm upgrade` command.
-Furthermore, if the load balancers of your cloud provider support the PROXY protocol, you can enable it, and it will
-let the ingress controller see the real IP address of the clients. Otherwise, it will generally see the IP address of
-the upstream load balancer. This must be done both in the ingress controller
-(with e.g. `--set controller.config.use-proxy-protocol=true`) and in the cloud provider's load balancer configuration
+Furthermore, if the load balancers of your cloud provider support the PROXY protocol, you can enable it, and it will
+let the ingress controller see the real IP address of the clients. Otherwise, it will generally see the IP address of
+the upstream load balancer. This must be done both in the ingress controller
+(with e.g. `--set controller.config.use-proxy-protocol=true`) and in the cloud provider's load balancer configuration
to function correctly.
-In the following sections, we provide YAML manifests that enable these options when possible, using the specific
+In the following sections, we provide YAML manifests that enable these options when possible, using the specific
options of various cloud providers.
#### AWS
@@ -242,10 +243,22 @@ In AWS, we use a Network load balancer (NLB) to expose the Ingress-Nginx Control
!!! info
The provided templates illustrate the setup for legacy in-tree service load balancer for AWS NLB.
- AWS provides the documentation on how to use
- [Network load balancing on Amazon EKS](https://docs.aws.amazon.com/eks/latest/userguide/network-load-balancing.html)
+ AWS provides the documentation on how to use
+ [Network load balancing on Amazon EKS](https://docs.aws.amazon.com/eks/latest/userguide/network-load-balancing.html)
with [AWS Load Balancer Controller](https://github.com/kubernetes-sigs/aws-load-balancer-controller).
+!!! helm install on AWS
+ There have been too many attempts at using helm to install the controller on AWS recently.
+ The ingress-nginx-controller helm-chart is generic and not aimed at installing on AWS on any other infra provider.
+ There are annotations and configurations that are applicable only to AWS.
+ Please run `helm template` and compare with the static yaml manifests you see below.
+ A user is expected to use annotations for
+ (a) internal/external
+ (b) type - nlb
+ (c) sqcurity-groups
+ (d) and other such requirements
+ during their ``helm install`` process.
+
##### Network Load Balancer (NLB)
```console
@@ -254,7 +267,7 @@ kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/cont
##### TLS termination in AWS Load Balancer (NLB)
-By default, TLS is terminated in the ingress controller. But it is also possible to terminate TLS in the Load Balancer.
+By default, TLS is terminated in the ingress controller. But it is also possible to terminate TLS in the Load Balancer.
This section explains how to do that on AWS using an NLB.
1. Download the [deploy.yaml](https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.10.1/deploy/static/provider/aws/nlb-with-tls-termination/deploy.yaml) template
@@ -264,32 +277,35 @@ This section explains how to do that on AWS using an NLB.
```
2. Edit the file and change the VPC CIDR in use for the Kubernetes cluster:
+
```
proxy-real-ip-cidr: XXX.XXX.XXX/XX
```
3. Change the AWS Certificate Manager (ACM) ID as well:
+
```
arn:aws:acm:us-west-2:XXXXXXXX:certificate/XXXXXX-XXXXXXX-XXXXXXX-XXXXXXXX
```
4. Deploy the manifest:
+
```console
kubectl apply -f deploy.yaml
```
##### NLB Idle Timeouts
-Idle timeout value for TCP flows is 350 seconds and
+Idle timeout value for TCP flows is 350 seconds and
[cannot be modified](https://docs.aws.amazon.com/elasticloadbalancing/latest/network/network-load-balancers.html#connection-idle-timeout).
-For this reason, you need to ensure the
-[keepalive_timeout](https://nginx.org/en/docs/http/ngx_http_core_module.html#keepalive_timeout)
+For this reason, you need to ensure the
+[keepalive_timeout](https://nginx.org/en/docs/http/ngx_http_core_module.html#keepalive_timeout)
value is configured less than 350 seconds to work as expected.
By default, NGINX `keepalive_timeout` is set to `75s`.
-More information with regard to timeouts can be found in the
+More information with regard to timeouts can be found in the
[official AWS documentation](https://docs.aws.amazon.com/elasticloadbalancing/latest/network/network-load-balancers.html#connection-idle-timeout)
#### GCE-GKE
@@ -304,15 +320,14 @@ kubectl create clusterrolebinding cluster-admin-binding \
Then, the ingress controller can be installed like this:
-
```console
kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.10.1/deploy/static/provider/cloud/deploy.yaml
```
!!! warning
- For private clusters, you will need to either add a firewall rule that allows master nodes access to
- port `8443/tcp` on worker nodes, or change the existing rule that allows access to port `80/tcp`, `443/tcp` and
- `10254/tcp` to also allow access to port `8443/tcp`. More information can be found in the
+ For private clusters, you will need to either add a firewall rule that allows master nodes access to
+ port `8443/tcp` on worker nodes, or change the existing rule that allows access to port `80/tcp`, `443/tcp` and
+ `10254/tcp` to also allow access to port `8443/tcp`. More information can be found in the
[Official GCP Documentation](https://cloud.google.com/load-balancing/docs/tcp/setting-up-tcp#config-hc-firewall).
See the [GKE documentation](https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters#add_firewall_rules)
@@ -333,8 +348,8 @@ More information with regard to Azure annotations for ingress controller can be
```console
kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.10.1/deploy/static/provider/do/deploy.yaml
```
-- By default the service object of the ingress-nginx-controller for Digital-Ocean, only configures one annotation. Its this one `service.beta.kubernetes.io/do-loadbalancer-enable-proxy-protocol: "true"`. While this makes the service functional, it was reported that the Digital-Ocean LoadBalancer graphs shows `no data`, unless a few other annotations are also configured. Some of these other annotations require values that can not be generic and hence not forced in a out-of-the-box installation. These annotations and a discussion on them is well documented in [this issue](https://github.com/kubernetes/ingress-nginx/issues/8965). Please refer to the issue to add annotations, with values specific to user, to get graphs of the DO-LB populated with data.
+- By default the service object of the ingress-nginx-controller for Digital-Ocean, only configures one annotation. Its this one `service.beta.kubernetes.io/do-loadbalancer-enable-proxy-protocol: "true"`. While this makes the service functional, it was reported that the Digital-Ocean LoadBalancer graphs shows `no data`, unless a few other annotations are also configured. Some of these other annotations require values that can not be generic and hence not forced in a out-of-the-box installation. These annotations and a discussion on them is well documented in [this issue](https://github.com/kubernetes/ingress-nginx/issues/8965). Please refer to the issue to add annotations, with values specific to user, to get graphs of the DO-LB populated with data.
#### Scaleway
@@ -348,7 +363,7 @@ kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/cont
kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/main/deploy/static/provider/exoscale/deploy.yaml
```
-The full list of annotations supported by Exoscale is available in the Exoscale Cloud Controller Manager
+The full list of annotations supported by Exoscale is available in the Exoscale Cloud Controller Manager
[documentation](https://github.com/exoscale/exoscale-cloud-controller-manager/blob/master/docs/service-loadbalancer.md).
#### Oracle Cloud Infrastructure
@@ -357,8 +372,8 @@ The full list of annotations supported by Exoscale is available in the Exoscale
kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.10.1/deploy/static/provider/cloud/deploy.yaml
```
-A
-[complete list of available annotations for Oracle Cloud Infrastructure](https://github.com/oracle/oci-cloud-controller-manager/blob/master/docs/load-balancer-annotations.md)
+A
+[complete list of available annotations for Oracle Cloud Infrastructure](https://github.com/oracle/oci-cloud-controller-manager/blob/master/docs/load-balancer-annotations.md)
can be found in the [OCI Cloud Controller Manager](https://github.com/oracle/oci-cloud-controller-manager) documentation.
#### OVHcloud
@@ -373,11 +388,11 @@ You can find the [complete tutorial](https://docs.ovh.com/gb/en/kubernetes/insta
### Bare metal clusters
-This section is applicable to Kubernetes clusters deployed on bare metal servers, as well as "raw" VMs where Kubernetes
+This section is applicable to Kubernetes clusters deployed on bare metal servers, as well as "raw" VMs where Kubernetes
was installed manually, using generic Linux distros (like CentOS, Ubuntu...)
-For quick testing, you can use a
-[NodePort](https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport).
+For quick testing, you can use a
+[NodePort](https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport).
This should work on almost every cluster, but it will typically use a port in the range 30000-32767.
```console
@@ -401,20 +416,20 @@ kubectl exec $POD_NAME -n $POD_NAMESPACE -- /nginx-ingress-controller --version
### Scope
-By default, the controller watches Ingress objects from all namespaces. If you want to change this behavior,
-use the flag `--watch-namespace` or check the Helm chart value `controller.scope` to limit the controller to a single
+By default, the controller watches Ingress objects from all namespaces. If you want to change this behavior,
+use the flag `--watch-namespace` or check the Helm chart value `controller.scope` to limit the controller to a single
namespace.
-See also
-[“How to easily install multiple instances of the Ingress NGINX controller in the same cluster”](https://kubernetes.github.io/ingress-nginx/#how-to-easily-install-multiple-instances-of-the-ingress-nginx-controller-in-the-same-cluster)
+See also
+[“How to easily install multiple instances of the Ingress NGINX controller in the same cluster”](https://kubernetes.github.io/ingress-nginx/#how-to-easily-install-multiple-instances-of-the-ingress-nginx-controller-in-the-same-cluster)
for more details.
### Webhook network access
!!! warning
The controller uses an [admission webhook](https://kubernetes.io/docs/reference/access-authn-authz/extensible-admission-controllers/)
- to validate Ingress definitions. Make sure that you don't have
- [Network policies](https://kubernetes.io/docs/concepts/services-networking/network-policies/)
+ to validate Ingress definitions. Make sure that you don't have
+ [Network policies](https://kubernetes.io/docs/concepts/services-networking/network-policies/)
or additional firewalls preventing connections from the API server to the `ingress-nginx-controller-admission` service.
### Certificate generation
@@ -435,22 +450,24 @@ You can wait until it is ready to run the next command:
### Running on Kubernetes versions older than 1.19
-Ingress resources evolved over time. They started with `apiVersion: extensions/v1beta1`,
+Ingress resources evolved over time. They started with `apiVersion: extensions/v1beta1`,
then moved to `apiVersion: networking.k8s.io/v1beta1` and more recently to `apiVersion: networking.k8s.io/v1`.
Here is how these Ingress versions are supported in Kubernetes:
+
- before Kubernetes 1.19, only `v1beta1` Ingress resources are supported
- from Kubernetes 1.19 to 1.21, both `v1beta1` and `v1` Ingress resources are supported
- in Kubernetes 1.22 and above, only `v1` Ingress resources are supported
And here is how these Ingress versions are supported in Ingress-Nginx Controller:
+
- before version 1.0, only `v1beta1` Ingress resources are supported
- in version 1.0 and above, only `v1` Ingress resources are
-As a result, if you're running Kubernetes 1.19 or later, you should be able to use the latest version of the NGINX
-Ingress Controller; but if you're using an old version of Kubernetes (1.18 or earlier) you will have to use version 0.X
+As a result, if you're running Kubernetes 1.19 or later, you should be able to use the latest version of the NGINX
+Ingress Controller; but if you're using an old version of Kubernetes (1.18 or earlier) you will have to use version 0.X
of the Ingress-Nginx Controller (e.g. version 0.49).
-The Helm chart of the Ingress-Nginx Controller switched to version 1 in version 4 of the chart. In other words, if
-you're running Kubernetes 1.19 or earlier, you should use version 3.X of the chart (this can be done by adding
+The Helm chart of the Ingress-Nginx Controller switched to version 1 in version 4 of the chart. In other words, if
+you're running Kubernetes 1.19 or earlier, you should use version 3.X of the chart (this can be done by adding
`--version='<4'` to the `helm install` command ).
From f22d5b90e870d09b0bf0f8acde11e09dba681d1f Mon Sep 17 00:00:00 2001
From: Long Wu Yuan
Date: Wed, 29 May 2024 17:34:03 +0530
Subject: [PATCH 074/283] edited helm-install tips (#11393)
---
docs/deploy/index.md | 37 ++++++++++++++++++++++++++-----------
1 file changed, 26 insertions(+), 11 deletions(-)
diff --git a/docs/deploy/index.md b/docs/deploy/index.md
index 70bd48f4f..1cc01ba54 100644
--- a/docs/deploy/index.md
+++ b/docs/deploy/index.md
@@ -65,6 +65,32 @@ It will install the controller in the `ingress-nginx` namespace, creating that n
helm show values ingress-nginx --repo https://kubernetes.github.io/ingress-nginx
```
+!!! helm install on AWS/GCP/Azure/Other providers
+ There have been too many attempts at using helm to install the controller on the cloud infra like AWS/GCP/Azure/Other.
+ The ingress-nginx-controller helm-chart is a generic install out of the box.
+ The default set of helm values are not configured for installing on any infra provider.
+ The annotations that are applicable to the cloud provider must be customized by the users.
+ Link to AWS LB Constroller https://kubernetes-sigs.github.io/aws-load-balancer-controller/v2.2/guide/service/annotations/
+ Examples of some annotations needed for the service resource of --type LoadBalancer on AWS are below
+
+ annotations:
+ service.beta.kubernetes.io/aws-load-balancer-scheme: "internet-facing"
+ service.beta.kubernetes.io/aws-load-balancer-backend-protocol: tcp
+ service.beta.kubernetes.io/aws-load-balancer-cross-zone-load-balancing-enabled: "true"
+ service.beta.kubernetes.io/aws-load-balancer-nlb-target-type: "ip"
+ service.beta.kubernetes.io/aws-load-balancer-type: nlb
+ service.beta.kubernetes.io/aws-load-balancer-manage-backend-security-group-rules: "true"
+ service.beta.kubernetes.io/aws-load-balancer-access-log-enabled: "true"
+ service.beta.kubernetes.io/aws-load-balancer-security-groups: "sg-something1 sg-something2"
+ service.beta.kubernetes.io/aws-load-balancer-access-log-s3-bucket-name: "somebucket"
+ service.beta.kubernetes.io/aws-load-balancer-access-log-s3-bucket-prefix: "ingress-nginx"
+ service.beta.kubernetes.io/aws-load-balancer-access-log-emit-interval: "5"
+
+
+
+
+
+
**If you don't have Helm** or if you prefer to use a YAML manifest, you can run the following command instead:
```console
@@ -247,17 +273,6 @@ In AWS, we use a Network load balancer (NLB) to expose the Ingress-Nginx Control
[Network load balancing on Amazon EKS](https://docs.aws.amazon.com/eks/latest/userguide/network-load-balancing.html)
with [AWS Load Balancer Controller](https://github.com/kubernetes-sigs/aws-load-balancer-controller).
-!!! helm install on AWS
- There have been too many attempts at using helm to install the controller on AWS recently.
- The ingress-nginx-controller helm-chart is generic and not aimed at installing on AWS on any other infra provider.
- There are annotations and configurations that are applicable only to AWS.
- Please run `helm template` and compare with the static yaml manifests you see below.
- A user is expected to use annotations for
- (a) internal/external
- (b) type - nlb
- (c) sqcurity-groups
- (d) and other such requirements
- during their ``helm install`` process.
##### Network Load Balancer (NLB)
From 1d3493018086ef6a1643686781a5d11707beed6d Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?J=C3=A9r=C3=A9mie=20Tarot?=
Date: Wed, 29 May 2024 18:56:32 +0200
Subject: [PATCH 075/283] Fix helm install on cloud provider admonition block
(#11394)
* Fix helm install on cloud provider admonition block
* Add missing admonition type.
* Format link to AWS LB controller.
* Add nested YAML code block for annotations example
* Add a couple of line breaks for breathing and structure
* Fix admonition block title
* Another try
* Should be nice now
---
docs/deploy/index.md | 19 ++++++-------------
1 file changed, 6 insertions(+), 13 deletions(-)
diff --git a/docs/deploy/index.md b/docs/deploy/index.md
index 1cc01ba54..d8cc6f875 100644
--- a/docs/deploy/index.md
+++ b/docs/deploy/index.md
@@ -65,14 +65,11 @@ It will install the controller in the `ingress-nginx` namespace, creating that n
helm show values ingress-nginx --repo https://kubernetes.github.io/ingress-nginx
```
-!!! helm install on AWS/GCP/Azure/Other providers
- There have been too many attempts at using helm to install the controller on the cloud infra like AWS/GCP/Azure/Other.
- The ingress-nginx-controller helm-chart is a generic install out of the box.
- The default set of helm values are not configured for installing on any infra provider.
- The annotations that are applicable to the cloud provider must be customized by the users.
- Link to AWS LB Constroller https://kubernetes-sigs.github.io/aws-load-balancer-controller/v2.2/guide/service/annotations/
- Examples of some annotations needed for the service resource of --type LoadBalancer on AWS are below
-
+!!! attention "Helm install on AWS/GCP/Azure/Other providers"
+ The *ingress-nginx-controller helm-chart is a generic install out of the box*. The default set of helm values is **not** configured for installation on any infra provider. The annotations that are applicable to the cloud provider must be customized by the users.
+ See [AWS LB Constroller](https://kubernetes-sigs.github.io/aws-load-balancer-controller/v2.2/guide/service/annotations/).
+ Examples of some annotations needed for the service resource of `--type LoadBalancer` on AWS are below:
+ ```yaml
annotations:
service.beta.kubernetes.io/aws-load-balancer-scheme: "internet-facing"
service.beta.kubernetes.io/aws-load-balancer-backend-protocol: tcp
@@ -85,11 +82,7 @@ helm show values ingress-nginx --repo https://kubernetes.github.io/ingress-nginx
service.beta.kubernetes.io/aws-load-balancer-access-log-s3-bucket-name: "somebucket"
service.beta.kubernetes.io/aws-load-balancer-access-log-s3-bucket-prefix: "ingress-nginx"
service.beta.kubernetes.io/aws-load-balancer-access-log-emit-interval: "5"
-
-
-
-
-
+ ```
**If you don't have Helm** or if you prefer to use a YAML manifest, you can run the following command instead:
From 57d96128b10f8d24308f7055d8f5ed9b79903ffc Mon Sep 17 00:00:00 2001
From: Andrea Scarpino
Date: Thu, 30 May 2024 09:39:08 +0000
Subject: [PATCH 076/283] Rename variable to fix typo (#11395)
---
internal/ingress/controller/config/config.go | 6 +++---
internal/ingress/controller/template/template.go | 2 +-
2 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/internal/ingress/controller/config/config.go b/internal/ingress/controller/config/config.go
index 6349d6006..5e0ca2296 100644
--- a/internal/ingress/controller/config/config.go
+++ b/internal/ingress/controller/config/config.go
@@ -744,9 +744,9 @@ type Configuration struct {
// simultaneous connections.
GlobalRateLimitMemcachedPoolSize int `json:"global-rate-limit-memcached-pool-size"`
- // GlobalRateLimitStatucCode determines the HTTP status code to return
+ // GlobalRateLimitStatusCode determines the HTTP status code to return
// when limit is exceeding during global rate limiting.
- GlobalRateLimitStatucCode int `json:"global-rate-limit-status-code"`
+ GlobalRateLimitStatusCode int `json:"global-rate-limit-status-code"`
// DebugConnections Enables debugging log for selected client connections
// http://nginx.org/en/docs/ngx_core_module.html#debug_connection
@@ -927,7 +927,7 @@ func NewDefault() Configuration {
GlobalRateLimitMemcachedConnectTimeout: 50,
GlobalRateLimitMemcachedMaxIdleTimeout: 10000,
GlobalRateLimitMemcachedPoolSize: 50,
- GlobalRateLimitStatucCode: 429,
+ GlobalRateLimitStatusCode: 429,
DebugConnections: []string{},
StrictValidatePathType: false, // TODO: This will be true in future releases
GRPCBufferSizeKb: 0,
diff --git a/internal/ingress/controller/template/template.go b/internal/ingress/controller/template/template.go
index 7cd6a0604..c70406cf0 100644
--- a/internal/ingress/controller/template/template.go
+++ b/internal/ingress/controller/template/template.go
@@ -413,7 +413,7 @@ func configForLua(input interface{}) string {
all.Cfg.GlobalRateLimitMemcachedConnectTimeout,
all.Cfg.GlobalRateLimitMemcachedMaxIdleTimeout,
all.Cfg.GlobalRateLimitMemcachedPoolSize,
- all.Cfg.GlobalRateLimitStatucCode,
+ all.Cfg.GlobalRateLimitStatusCode,
)
}
From a02f5d2c40a4b53279741e47ba0da8e0ea921566 Mon Sep 17 00:00:00 2001
From: Roberto Devesa <15369573+Roberdvs@users.noreply.github.com>
Date: Sun, 2 Jun 2024 10:26:37 +0200
Subject: [PATCH 077/283] Adapt dashboards for Grafana 11 compatibility
(#11399)
---
deploy/grafana/dashboards/README.md | 4 +-
deploy/grafana/dashboards/nginx.json | 2646 ++++++++++-------
.../request-handling-performance.json | 1193 ++++----
3 files changed, 2157 insertions(+), 1686 deletions(-)
diff --git a/deploy/grafana/dashboards/README.md b/deploy/grafana/dashboards/README.md
index e16180c3b..fc1e35406 100644
--- a/deploy/grafana/dashboards/README.md
+++ b/deploy/grafana/dashboards/README.md
@@ -19,7 +19,7 @@ This folder contains two dashboards that you can import.
### Requirements
-- **Grafana v5.2.0** (or newer)
+- **Grafana v10.4.3** (or newer)
## 2. Request Handling Performance
@@ -36,4 +36,4 @@ This folder contains two dashboards that you can import.
### Requirements
-- **Grafana v6.6.0** (or newer)
+- **Grafana v10.4.3** (or newer)
diff --git a/deploy/grafana/dashboards/nginx.json b/deploy/grafana/dashboards/nginx.json
index 864d1dace..5ebc4ae6c 100644
--- a/deploy/grafana/dashboards/nginx.json
+++ b/deploy/grafana/dashboards/nginx.json
@@ -9,31 +9,53 @@
"pluginName": "Prometheus"
}
],
+ "__elements": {},
"__requires": [
{
"type": "grafana",
"id": "grafana",
"name": "Grafana",
- "version": "5.2.1"
+ "version": "10.4.3"
+ },
+ {
+ "type": "panel",
+ "id": "heatmap",
+ "name": "Heatmap",
+ "version": ""
},
{
"type": "datasource",
"id": "prometheus",
"name": "Prometheus",
- "version": "5.0.0"
+ "version": "1.0.0"
},
{
"type": "panel",
- "id": "singlestat",
- "name": "Singlestat",
- "version": "5.0.0"
+ "id": "stat",
+ "name": "Stat",
+ "version": ""
+ },
+ {
+ "type": "panel",
+ "id": "table",
+ "name": "Table",
+ "version": ""
+ },
+ {
+ "type": "panel",
+ "id": "timeseries",
+ "name": "Time series",
+ "version": ""
}
],
"annotations": {
"list": [
{
"builtIn": 1,
- "datasource": "-- Grafana --",
+ "datasource": {
+ "type": "datasource",
+ "uid": "grafana"
+ },
"enable": true,
"hide": true,
"iconColor": "rgba(0, 211, 255, 1)",
@@ -41,7 +63,10 @@
"type": "dashboard"
},
{
- "datasource": "${DS_PROMETHEUS}",
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
"enable": true,
"expr": "sum(changes(nginx_ingress_controller_config_last_reload_successful_timestamp_seconds{instance!=\"unknown\",controller_class=~\"$controller_class\",namespace=~\"$namespace\"}[30s])) by (controller_class)",
"hide": false,
@@ -58,72 +83,75 @@
]
},
"editable": true,
- "gnetId": null,
+ "fiscalYearStartMonth": 0,
"graphTooltip": 0,
- "iteration": 1534359654832,
+ "id": null,
"links": [],
"panels": [
{
- "cacheTimeout": null,
- "colorBackground": false,
- "colorValue": false,
- "colors": [
- "rgba(245, 54, 54, 0.9)",
- "rgba(237, 129, 40, 0.89)",
- "rgba(50, 172, 45, 0.97)"
- ],
- "datasource": "${DS_PROMETHEUS}",
- "format": "ops",
- "gauge": {
- "maxValue": 100,
- "minValue": 0,
- "show": false,
- "thresholdLabels": false,
- "thresholdMarkers": true
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
},
- "gridPos": {
- "h": 3,
- "w": 6,
- "x": 0,
- "y": 0
+ "fieldConfig": {
+ "defaults": {
+ "color": {
+ "fixedColor": "rgb(31, 120, 193)",
+ "mode": "fixed"
+ },
+ "mappings": [
+ {
+ "options": {
+ "match": "null",
+ "result": {
+ "text": "N/A"
+ }
+ },
+ "type": "special"
+ }
+ ],
+ "thresholds": {
+ "mode": "absolute",
+ "steps": [
+ {
+ "color": "green",
+ "value": null
+ },
+ {
+ "color": "red",
+ "value": 80
+ }
+ ]
+ },
+ "unit": "ops"
+ },
+ "overrides": []
},
"id": 20,
- "interval": null,
- "links": [],
- "mappingType": 1,
- "mappingTypes": [
- {
- "name": "value to text",
- "value": 1
- },
- {
- "name": "range to text",
- "value": 2
- }
- ],
"maxDataPoints": 100,
- "nullPointMode": "connected",
- "nullText": null,
- "postfix": "",
- "postfixFontSize": "50%",
- "prefix": "",
- "prefixFontSize": "50%",
- "rangeMaps": [
- {
- "from": "null",
- "text": "N/A",
- "to": "null"
- }
- ],
- "sparkline": {
- "fillColor": "rgba(31, 118, 189, 0.18)",
- "full": true,
- "lineColor": "rgb(31, 120, 193)",
- "show": true
+ "options": {
+ "colorMode": "none",
+ "graphMode": "area",
+ "justifyMode": "auto",
+ "orientation": "horizontal",
+ "reduceOptions": {
+ "calcs": [
+ "mean"
+ ],
+ "fields": "",
+ "values": false
+ },
+ "showPercentChange": false,
+ "textMode": "auto",
+ "wideLayout": true
},
- "tableColumn": "",
+ "pluginVersion": "10.4.3",
"targets": [
{
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
"expr": "round(sum(irate(nginx_ingress_controller_requests{controller_pod=~\"$controller\",controller_class=~\"$controller_class\",namespace=~\"$namespace\"}[2m])), 0.001)",
"format": "time_series",
"intervalFactor": 1,
@@ -131,37 +159,47 @@
"step": 4
}
],
- "thresholds": "",
"title": "Controller Request Volume",
- "transparent": false,
- "type": "singlestat",
- "valueFontSize": "80%",
- "valueMaps": [
- {
- "op": "=",
- "text": "N/A",
- "value": "null"
- }
- ],
- "valueName": "avg"
+ "type": "stat"
},
{
- "cacheTimeout": null,
- "colorBackground": false,
- "colorValue": false,
- "colors": [
- "rgba(245, 54, 54, 0.9)",
- "rgba(237, 129, 40, 0.89)",
- "rgba(50, 172, 45, 0.97)"
- ],
- "datasource": "${DS_PROMETHEUS}",
- "format": "none",
- "gauge": {
- "maxValue": 100,
- "minValue": 0,
- "show": false,
- "thresholdLabels": false,
- "thresholdMarkers": true
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
+ "fieldConfig": {
+ "defaults": {
+ "color": {
+ "fixedColor": "rgb(31, 120, 193)",
+ "mode": "fixed"
+ },
+ "mappings": [
+ {
+ "options": {
+ "match": "null",
+ "result": {
+ "text": "N/A"
+ }
+ },
+ "type": "special"
+ }
+ ],
+ "thresholds": {
+ "mode": "absolute",
+ "steps": [
+ {
+ "color": "green",
+ "value": null
+ },
+ {
+ "color": "red",
+ "value": 80
+ }
+ ]
+ },
+ "unit": "none"
+ },
+ "overrides": []
},
"gridPos": {
"h": 3,
@@ -170,42 +208,30 @@
"y": 0
},
"id": 82,
- "interval": null,
- "links": [],
- "mappingType": 1,
- "mappingTypes": [
- {
- "name": "value to text",
- "value": 1
- },
- {
- "name": "range to text",
- "value": 2
- }
- ],
"maxDataPoints": 100,
- "nullPointMode": "connected",
- "nullText": null,
- "postfix": "",
- "postfixFontSize": "50%",
- "prefix": "",
- "prefixFontSize": "50%",
- "rangeMaps": [
- {
- "from": "null",
- "text": "N/A",
- "to": "null"
- }
- ],
- "sparkline": {
- "fillColor": "rgba(31, 118, 189, 0.18)",
- "full": true,
- "lineColor": "rgb(31, 120, 193)",
- "show": true
+ "options": {
+ "colorMode": "none",
+ "graphMode": "area",
+ "justifyMode": "auto",
+ "orientation": "horizontal",
+ "reduceOptions": {
+ "calcs": [
+ "mean"
+ ],
+ "fields": "",
+ "values": false
+ },
+ "showPercentChange": false,
+ "textMode": "auto",
+ "wideLayout": true
},
- "tableColumn": "",
+ "pluginVersion": "10.4.3",
"targets": [
{
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
"expr": "sum(avg_over_time(nginx_ingress_controller_nginx_process_connections{controller_pod=~\"$controller\",controller_class=~\"$controller_class\",controller_namespace=~\"$namespace\",state=\"active\"}[2m]))",
"format": "time_series",
"instant": false,
@@ -214,37 +240,51 @@
"step": 4
}
],
- "thresholds": "",
"title": "Controller Connections",
- "transparent": false,
- "type": "singlestat",
- "valueFontSize": "80%",
- "valueMaps": [
- {
- "op": "=",
- "text": "N/A",
- "value": "null"
- }
- ],
- "valueName": "avg"
+ "type": "stat"
},
{
- "cacheTimeout": null,
- "colorBackground": false,
- "colorValue": false,
- "colors": [
- "rgba(245, 54, 54, 0.9)",
- "rgba(237, 129, 40, 0.89)",
- "rgba(50, 172, 45, 0.97)"
- ],
- "datasource": "${DS_PROMETHEUS}",
- "format": "percentunit",
- "gauge": {
- "maxValue": 100,
- "minValue": 80,
- "show": false,
- "thresholdLabels": false,
- "thresholdMarkers": false
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
+ "fieldConfig": {
+ "defaults": {
+ "color": {
+ "fixedColor": "rgb(31, 120, 193)",
+ "mode": "fixed"
+ },
+ "mappings": [
+ {
+ "options": {
+ "match": "null",
+ "result": {
+ "text": "N/A"
+ }
+ },
+ "type": "special"
+ }
+ ],
+ "thresholds": {
+ "mode": "absolute",
+ "steps": [
+ {
+ "color": "rgba(245, 54, 54, 0.9)",
+ "value": null
+ },
+ {
+ "color": "rgba(237, 129, 40, 0.89)",
+ "value": 95
+ },
+ {
+ "color": "rgba(50, 172, 45, 0.97)",
+ "value": 99
+ }
+ ]
+ },
+ "unit": "percentunit"
+ },
+ "overrides": []
},
"gridPos": {
"h": 3,
@@ -253,42 +293,30 @@
"y": 0
},
"id": 21,
- "interval": null,
- "links": [],
- "mappingType": 1,
- "mappingTypes": [
- {
- "name": "value to text",
- "value": 1
- },
- {
- "name": "range to text",
- "value": 2
- }
- ],
"maxDataPoints": 100,
- "nullPointMode": "connected",
- "nullText": null,
- "postfix": "",
- "postfixFontSize": "50%",
- "prefix": "",
- "prefixFontSize": "50%",
- "rangeMaps": [
- {
- "from": "null",
- "text": "N/A",
- "to": "null"
- }
- ],
- "sparkline": {
- "fillColor": "rgba(31, 118, 189, 0.18)",
- "full": true,
- "lineColor": "rgb(31, 120, 193)",
- "show": true
+ "options": {
+ "colorMode": "none",
+ "graphMode": "area",
+ "justifyMode": "auto",
+ "orientation": "horizontal",
+ "reduceOptions": {
+ "calcs": [
+ "mean"
+ ],
+ "fields": "",
+ "values": false
+ },
+ "showPercentChange": false,
+ "textMode": "auto",
+ "wideLayout": true
},
- "tableColumn": "",
+ "pluginVersion": "10.4.3",
"targets": [
{
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
"expr": "sum(rate(nginx_ingress_controller_requests{controller_pod=~\"$controller\",controller_class=~\"$controller_class\",namespace=~\"$namespace\",status!~\"[4-5].*\"}[2m])) / sum(rate(nginx_ingress_controller_requests{controller_pod=~\"$controller\",controller_class=~\"$controller_class\",namespace=~\"$namespace\"}[2m]))",
"format": "time_series",
"intervalFactor": 1,
@@ -296,38 +324,48 @@
"step": 4
}
],
- "thresholds": "95, 99, 99.5",
"title": "Controller Success Rate (non-4|5xx responses)",
- "transparent": false,
- "type": "singlestat",
- "valueFontSize": "80%",
- "valueMaps": [
- {
- "op": "=",
- "text": "N/A",
- "value": "null"
- }
- ],
- "valueName": "avg"
+ "type": "stat"
},
{
- "cacheTimeout": null,
- "colorBackground": false,
- "colorValue": false,
- "colors": [
- "rgba(245, 54, 54, 0.9)",
- "rgba(237, 129, 40, 0.89)",
- "rgba(50, 172, 45, 0.97)"
- ],
- "datasource": "${DS_PROMETHEUS}",
- "decimals": 0,
- "format": "none",
- "gauge": {
- "maxValue": 100,
- "minValue": 0,
- "show": false,
- "thresholdLabels": false,
- "thresholdMarkers": true
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
+ "fieldConfig": {
+ "defaults": {
+ "color": {
+ "fixedColor": "rgb(31, 120, 193)",
+ "mode": "fixed"
+ },
+ "decimals": 0,
+ "mappings": [
+ {
+ "options": {
+ "match": "null",
+ "result": {
+ "text": "N/A"
+ }
+ },
+ "type": "special"
+ }
+ ],
+ "thresholds": {
+ "mode": "absolute",
+ "steps": [
+ {
+ "color": "green",
+ "value": null
+ },
+ {
+ "color": "red",
+ "value": 80
+ }
+ ]
+ },
+ "unit": "none"
+ },
+ "overrides": []
},
"gridPos": {
"h": 3,
@@ -336,42 +374,30 @@
"y": 0
},
"id": 81,
- "interval": null,
- "links": [],
- "mappingType": 1,
- "mappingTypes": [
- {
- "name": "value to text",
- "value": 1
- },
- {
- "name": "range to text",
- "value": 2
- }
- ],
"maxDataPoints": 100,
- "nullPointMode": "connected",
- "nullText": null,
- "postfix": "",
- "postfixFontSize": "50%",
- "prefix": "",
- "prefixFontSize": "50%",
- "rangeMaps": [
- {
- "from": "null",
- "text": "N/A",
- "to": "null"
- }
- ],
- "sparkline": {
- "fillColor": "rgba(31, 118, 189, 0.18)",
- "full": true,
- "lineColor": "rgb(31, 120, 193)",
- "show": true
+ "options": {
+ "colorMode": "none",
+ "graphMode": "area",
+ "justifyMode": "auto",
+ "orientation": "horizontal",
+ "reduceOptions": {
+ "calcs": [
+ "sum"
+ ],
+ "fields": "",
+ "values": false
+ },
+ "showPercentChange": false,
+ "textMode": "auto",
+ "wideLayout": true
},
- "tableColumn": "",
+ "pluginVersion": "10.4.3",
"targets": [
{
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
"expr": "avg(irate(nginx_ingress_controller_success{controller_pod=~\"$controller\",controller_class=~\"$controller_class\",controller_namespace=~\"$namespace\"}[1m])) * 60",
"format": "time_series",
"instant": false,
@@ -380,38 +406,48 @@
"step": 4
}
],
- "thresholds": "",
"title": "Config Reloads",
- "transparent": false,
- "type": "singlestat",
- "valueFontSize": "80%",
- "valueMaps": [
- {
- "op": "=",
- "text": "N/A",
- "value": "null"
- }
- ],
- "valueName": "total"
+ "type": "stat"
},
{
- "cacheTimeout": null,
- "colorBackground": false,
- "colorValue": false,
- "colors": [
- "rgba(245, 54, 54, 0.9)",
- "rgba(237, 129, 40, 0.89)",
- "rgba(50, 172, 45, 0.97)"
- ],
- "datasource": "${DS_PROMETHEUS}",
- "decimals": 0,
- "format": "none",
- "gauge": {
- "maxValue": 100,
- "minValue": 0,
- "show": false,
- "thresholdLabels": false,
- "thresholdMarkers": true
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
+ "fieldConfig": {
+ "defaults": {
+ "color": {
+ "fixedColor": "rgb(31, 120, 193)",
+ "mode": "fixed"
+ },
+ "decimals": 0,
+ "mappings": [
+ {
+ "options": {
+ "match": "null",
+ "result": {
+ "text": "N/A"
+ }
+ },
+ "type": "special"
+ }
+ ],
+ "thresholds": {
+ "mode": "absolute",
+ "steps": [
+ {
+ "color": "green",
+ "value": null
+ },
+ {
+ "color": "red",
+ "value": 80
+ }
+ ]
+ },
+ "unit": "none"
+ },
+ "overrides": []
},
"gridPos": {
"h": 3,
@@ -420,42 +456,30 @@
"y": 0
},
"id": 83,
- "interval": null,
- "links": [],
- "mappingType": 1,
- "mappingTypes": [
- {
- "name": "value to text",
- "value": 1
- },
- {
- "name": "range to text",
- "value": 2
- }
- ],
"maxDataPoints": 100,
- "nullPointMode": "connected",
- "nullText": null,
- "postfix": "",
- "postfixFontSize": "50%",
- "prefix": "",
- "prefixFontSize": "50%",
- "rangeMaps": [
- {
- "from": "null",
- "text": "N/A",
- "to": "null"
- }
- ],
- "sparkline": {
- "fillColor": "rgba(31, 118, 189, 0.18)",
- "full": true,
- "lineColor": "rgb(31, 120, 193)",
- "show": true
+ "options": {
+ "colorMode": "none",
+ "graphMode": "area",
+ "justifyMode": "auto",
+ "orientation": "horizontal",
+ "reduceOptions": {
+ "calcs": [
+ "mean"
+ ],
+ "fields": "",
+ "values": false
+ },
+ "showPercentChange": false,
+ "textMode": "auto",
+ "wideLayout": true
},
- "tableColumn": "",
+ "pluginVersion": "10.4.3",
"targets": [
{
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
"expr": "count(nginx_ingress_controller_config_last_reload_successful{controller_pod=~\"$controller\",controller_namespace=~\"$namespace\"} == 0)",
"format": "time_series",
"instant": true,
@@ -464,72 +488,119 @@
"step": 4
}
],
- "thresholds": "",
"title": "Last Config Failed",
- "transparent": false,
- "type": "singlestat",
- "valueFontSize": "80%",
- "valueMaps": [
- {
- "op": "=",
- "text": "N/A",
- "value": "null"
- }
- ],
- "valueName": "avg"
+ "type": "stat"
},
{
- "aliasColors": {},
- "bars": false,
- "dashLength": 10,
- "dashes": false,
- "datasource": "${DS_PROMETHEUS}",
- "decimals": 2,
- "editable": true,
- "error": false,
- "fill": 1,
- "grid": {},
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
+ "fieldConfig": {
+ "defaults": {
+ "color": {
+ "mode": "palette-classic"
+ },
+ "custom": {
+ "axisBorderShow": false,
+ "axisCenteredZero": false,
+ "axisColorMode": "text",
+ "axisLabel": "",
+ "axisPlacement": "auto",
+ "barAlignment": 0,
+ "drawStyle": "line",
+ "fillOpacity": 10,
+ "gradientMode": "none",
+ "hideFrom": {
+ "legend": false,
+ "tooltip": false,
+ "viz": false
+ },
+ "insertNulls": false,
+ "lineInterpolation": "linear",
+ "lineWidth": 2,
+ "pointSize": 5,
+ "scaleDistribution": {
+ "type": "linear"
+ },
+ "showPoints": "never",
+ "spanNulls": true,
+ "stacking": {
+ "group": "A",
+ "mode": "none"
+ },
+ "thresholdsStyle": {
+ "mode": "off"
+ }
+ },
+ "mappings": [],
+ "thresholds": {
+ "mode": "absolute",
+ "steps": [
+ {
+ "color": "green",
+ "value": null
+ },
+ {
+ "color": "red",
+ "value": 80
+ }
+ ]
+ },
+ "unit": "reqps"
+ },
+ "overrides": [
+ {
+ "matcher": {
+ "id": "byValue",
+ "options": {
+ "op": "gte",
+ "reducer": "allIsZero",
+ "value": 0
+ }
+ },
+ "properties": [
+ {
+ "id": "custom.hideFrom",
+ "value": {
+ "legend": true,
+ "tooltip": true,
+ "viz": false
+ }
+ }
+ ]
+ }
+ ]
+ },
"gridPos": {
"h": 7,
"w": 12,
"x": 0,
"y": 3
},
- "height": "200px",
"id": 86,
- "isNew": true,
- "legend": {
- "alignAsTable": true,
- "avg": true,
- "current": false,
- "hideEmpty": false,
- "hideZero": true,
- "max": false,
- "min": false,
- "rightSide": true,
- "show": true,
- "sideWidth": 300,
- "sort": "current",
- "sortDesc": true,
- "total": false,
- "values": true
+ "options": {
+ "legend": {
+ "calcs": [
+ "mean"
+ ],
+ "displayMode": "table",
+ "placement": "right",
+ "showLegend": true
+ },
+ "tooltip": {
+ "mode": "multi",
+ "sort": "none"
+ }
},
- "lines": true,
- "linewidth": 2,
- "links": [],
- "nullPointMode": "connected",
- "percentage": false,
- "pointradius": 5,
- "points": false,
- "renderer": "flot",
- "repeat": null,
+ "pluginVersion": "10.4.3",
"repeatDirection": "h",
- "seriesOverrides": [],
- "spaceLength": 10,
- "stack": false,
- "steppedLine": false,
"targets": [
{
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
"expr": "round(sum(irate(nginx_ingress_controller_requests{controller_pod=~\"$controller\",controller_class=~\"$controller_class\",controller_namespace=~\"$namespace\",exported_namespace=~\"$exported_namespace\",ingress=~\"$ingress\"}[2m])) by (ingress), 0.001)",
"format": "time_series",
"hide": false,
@@ -542,706 +613,23 @@
"step": 10
}
],
- "thresholds": [],
- "timeFrom": null,
- "timeShift": null,
"title": "Ingress Request Volume",
- "tooltip": {
- "msResolution": false,
- "shared": true,
- "sort": 2,
- "value_type": "cumulative"
- },
- "transparent": false,
- "type": "graph",
- "xaxis": {
- "buckets": null,
- "mode": "time",
- "name": null,
- "show": true,
- "values": []
- },
- "yaxes": [
- {
- "format": "reqps",
- "label": null,
- "logBase": 1,
- "max": null,
- "min": null,
- "show": true
- },
- {
- "format": "Bps",
- "label": null,
- "logBase": 1,
- "max": null,
- "min": null,
- "show": false
- }
- ],
- "yaxis": {
- "align": false,
- "alignLevel": null
- }
+ "type": "timeseries"
},
{
- "aliasColors": {
- "max - istio-proxy": "#890f02",
- "max - master": "#bf1b00",
- "max - prometheus": "#bf1b00"
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
},
- "bars": false,
- "dashLength": 10,
- "dashes": false,
- "datasource": "${DS_PROMETHEUS}",
- "decimals": 2,
- "editable": false,
- "error": false,
- "fill": 0,
- "grid": {},
- "gridPos": {
- "h": 7,
- "w": 12,
- "x": 12,
- "y": 3
- },
- "id": 87,
- "isNew": true,
- "legend": {
- "alignAsTable": true,
- "avg": true,
- "current": false,
- "hideEmpty": true,
- "hideZero": false,
- "max": false,
- "min": false,
- "rightSide": true,
- "show": true,
- "sideWidth": 300,
- "sort": "avg",
- "sortDesc": true,
- "total": false,
- "values": true
- },
- "lines": true,
- "linewidth": 2,
- "links": [],
- "nullPointMode": "connected",
- "percentage": false,
- "pointradius": 5,
- "points": false,
- "renderer": "flot",
- "seriesOverrides": [],
- "spaceLength": 10,
- "stack": false,
- "steppedLine": false,
- "targets": [
- {
- "expr": "sum(rate(nginx_ingress_controller_requests{controller_pod=~\"$controller\",controller_class=~\"$controller_class\",namespace=~\"$namespace\",exported_namespace=~\"$exported_namespace\",ingress=~\"$ingress\",status!~\"[4-5].*\"}[2m])) by (ingress) / sum(rate(nginx_ingress_controller_requests{controller_pod=~\"$controller\",controller_class=~\"$controller_class\",namespace=~\"$namespace\",exported_namespace=~\"$exported_namespace\",ingress=~\"$ingress\"}[2m])) by (ingress)",
- "format": "time_series",
- "instant": false,
- "interval": "10s",
- "intervalFactor": 1,
- "legendFormat": "{{ ingress }}",
- "metric": "container_memory_usage:sort_desc",
- "refId": "A",
- "step": 10
- }
- ],
- "thresholds": [],
- "timeFrom": null,
- "timeShift": null,
- "title": "Ingress Success Rate (non-4|5xx responses)",
- "tooltip": {
- "msResolution": false,
- "shared": true,
- "sort": 1,
- "value_type": "cumulative"
- },
- "type": "graph",
- "xaxis": {
- "buckets": null,
- "mode": "time",
- "name": null,
- "show": true,
- "values": []
- },
- "yaxes": [
- {
- "format": "percentunit",
- "label": null,
- "logBase": 1,
- "max": null,
- "min": null,
- "show": true
- },
- {
- "format": "short",
- "label": null,
- "logBase": 1,
- "max": null,
- "min": null,
- "show": false
- }
- ],
- "yaxis": {
- "align": false,
- "alignLevel": null
- }
- },
- {
- "aliasColors": {},
- "bars": false,
- "dashLength": 10,
- "dashes": false,
- "datasource": "${DS_PROMETHEUS}",
- "decimals": 2,
- "editable": true,
- "error": false,
- "fill": 1,
- "grid": {},
- "gridPos": {
- "h": 6,
- "w": 8,
- "x": 0,
- "y": 10
- },
- "height": "200px",
- "id": 32,
- "isNew": true,
- "legend": {
- "alignAsTable": false,
- "avg": true,
- "current": true,
- "max": false,
- "min": false,
- "rightSide": false,
- "show": false,
- "sideWidth": 200,
- "sort": "current",
- "sortDesc": true,
- "total": false,
- "values": true
- },
- "lines": true,
- "linewidth": 2,
- "links": [],
- "nullPointMode": "connected",
- "percentage": false,
- "pointradius": 5,
- "points": false,
- "renderer": "flot",
- "seriesOverrides": [],
- "spaceLength": 10,
- "stack": false,
- "steppedLine": false,
- "targets": [
- {
- "expr": "sum (irate (nginx_ingress_controller_request_size_sum{controller_pod=~\"$controller\",controller_class=~\"$controller_class\",controller_namespace=~\"$namespace\"}[2m]))",
- "format": "time_series",
- "instant": false,
- "interval": "10s",
- "intervalFactor": 1,
- "legendFormat": "Received",
- "metric": "network",
- "refId": "A",
- "step": 10
- },
- {
- "expr": "- sum (irate (nginx_ingress_controller_response_size_sum{controller_pod=~\"$controller\",controller_class=~\"$controller_class\",controller_namespace=~\"$namespace\"}[2m]))",
- "format": "time_series",
- "hide": false,
- "interval": "10s",
- "intervalFactor": 1,
- "legendFormat": "Sent",
- "metric": "network",
- "refId": "B",
- "step": 10
- }
- ],
- "thresholds": [],
- "timeFrom": null,
- "timeShift": null,
- "title": "Network I/O pressure",
- "tooltip": {
- "msResolution": false,
- "shared": true,
- "sort": 0,
- "value_type": "cumulative"
- },
- "transparent": false,
- "type": "graph",
- "xaxis": {
- "buckets": null,
- "mode": "time",
- "name": null,
- "show": true,
- "values": []
- },
- "yaxes": [
- {
- "format": "Bps",
- "label": null,
- "logBase": 1,
- "max": null,
- "min": null,
- "show": true
- },
- {
- "format": "Bps",
- "label": null,
- "logBase": 1,
- "max": null,
- "min": null,
- "show": false
- }
- ],
- "yaxis": {
- "align": false,
- "alignLevel": null
- }
- },
- {
- "aliasColors": {
- "max - istio-proxy": "#890f02",
- "max - master": "#bf1b00",
- "max - prometheus": "#bf1b00"
- },
- "bars": false,
- "dashLength": 10,
- "dashes": false,
- "datasource": "${DS_PROMETHEUS}",
- "decimals": 2,
- "editable": false,
- "error": false,
- "fill": 0,
- "grid": {},
- "gridPos": {
- "h": 6,
- "w": 8,
- "x": 8,
- "y": 10
- },
- "id": 77,
- "isNew": true,
- "legend": {
- "alignAsTable": true,
- "avg": true,
- "current": true,
- "max": false,
- "min": false,
- "rightSide": false,
- "show": false,
- "sideWidth": 200,
- "sort": "current",
- "sortDesc": true,
- "total": false,
- "values": true
- },
- "lines": true,
- "linewidth": 2,
- "links": [],
- "nullPointMode": "connected",
- "percentage": false,
- "pointradius": 5,
- "points": false,
- "renderer": "flot",
- "seriesOverrides": [],
- "spaceLength": 10,
- "stack": false,
- "steppedLine": false,
- "targets": [
- {
- "expr": "avg(nginx_ingress_controller_nginx_process_resident_memory_bytes{controller_pod=~\"$controller\",controller_class=~\"$controller_class\",controller_namespace=~\"$namespace\"}) ",
- "format": "time_series",
- "instant": false,
- "interval": "10s",
- "intervalFactor": 1,
- "legendFormat": "nginx",
- "metric": "container_memory_usage:sort_desc",
- "refId": "A",
- "step": 10
- }
- ],
- "thresholds": [],
- "timeFrom": null,
- "timeShift": null,
- "title": "Average Memory Usage",
- "tooltip": {
- "msResolution": false,
- "shared": true,
- "sort": 2,
- "value_type": "cumulative"
- },
- "type": "graph",
- "xaxis": {
- "buckets": null,
- "mode": "time",
- "name": null,
- "show": true,
- "values": []
- },
- "yaxes": [
- {
- "format": "bytes",
- "label": null,
- "logBase": 1,
- "max": null,
- "min": null,
- "show": true
- },
- {
- "format": "short",
- "label": null,
- "logBase": 1,
- "max": null,
- "min": null,
- "show": false
- }
- ],
- "yaxis": {
- "align": false,
- "alignLevel": null
- }
- },
- {
- "aliasColors": {
- "max - istio-proxy": "#890f02",
- "max - master": "#bf1b00"
- },
- "bars": false,
- "dashLength": 10,
- "dashes": false,
- "datasource": "${DS_PROMETHEUS}",
- "decimals": 3,
- "editable": false,
- "error": false,
- "fill": 0,
- "grid": {},
- "gridPos": {
- "h": 6,
- "w": 8,
- "x": 16,
- "y": 10
- },
- "height": "",
- "id": 79,
- "isNew": true,
- "legend": {
- "alignAsTable": true,
- "avg": true,
- "current": true,
- "max": false,
- "min": false,
- "rightSide": false,
- "show": false,
- "sort": null,
- "sortDesc": null,
- "total": false,
- "values": true
- },
- "lines": true,
- "linewidth": 2,
- "links": [],
- "nullPointMode": "connected",
- "percentage": false,
- "pointradius": 5,
- "points": false,
- "renderer": "flot",
- "seriesOverrides": [],
- "spaceLength": 10,
- "stack": false,
- "steppedLine": false,
- "targets": [
- {
- "expr": "avg (rate (nginx_ingress_controller_nginx_process_cpu_seconds_total{controller_pod=~\"$controller\",controller_class=~\"$controller_class\",controller_namespace=~\"$namespace\"}[2m])) ",
- "format": "time_series",
- "interval": "10s",
- "intervalFactor": 1,
- "legendFormat": "nginx",
- "metric": "container_cpu",
- "refId": "A",
- "step": 10
- }
- ],
- "thresholds": [
- {
- "colorMode": "critical",
- "fill": true,
- "line": true,
- "op": "gt"
- }
- ],
- "timeFrom": null,
- "timeShift": null,
- "title": "Average CPU Usage",
- "tooltip": {
- "msResolution": true,
- "shared": true,
- "sort": 2,
- "value_type": "cumulative"
- },
- "transparent": false,
- "type": "graph",
- "xaxis": {
- "buckets": null,
- "mode": "time",
- "name": null,
- "show": true,
- "values": []
- },
- "yaxes": [
- {
- "format": "none",
- "label": "cores",
- "logBase": 1,
- "max": null,
- "min": null,
- "show": true
- },
- {
- "format": "short",
- "label": null,
- "logBase": 1,
- "max": null,
- "min": null,
- "show": true
- }
- ],
- "yaxis": {
- "align": false,
- "alignLevel": null
- }
- },
- {
- "columns": [],
- "datasource": "${DS_PROMETHEUS}",
- "description": "This data is real time, independent of dashboard time range",
- "fontSize": "100%",
- "gridPos": {
- "h": 8,
- "w": 24,
- "x": 0,
- "y": 16
- },
- "hideTimeOverride": false,
- "id": 75,
- "links": [],
- "pageSize": 7,
- "repeat": null,
- "repeatDirection": "h",
- "scroll": true,
- "showHeader": true,
- "sort": {
- "col": 1,
- "desc": true
- },
- "styles": [
- {
- "alias": "Ingress",
- "colorMode": null,
- "colors": [
- "rgba(245, 54, 54, 0.9)",
- "rgba(237, 129, 40, 0.89)",
- "rgba(50, 172, 45, 0.97)"
- ],
- "dateFormat": "YYYY-MM-DD HH:mm:ss",
- "decimals": 2,
- "pattern": "ingress",
- "preserveFormat": false,
- "sanitize": false,
- "thresholds": [],
- "type": "string",
- "unit": "short"
- },
- {
- "alias": "Requests",
- "colorMode": null,
- "colors": [
- "rgba(245, 54, 54, 0.9)",
- "rgba(237, 129, 40, 0.89)",
- "rgba(50, 172, 45, 0.97)"
- ],
- "dateFormat": "YYYY-MM-DD HH:mm:ss",
- "decimals": 2,
- "pattern": "Value #A",
- "thresholds": [
- ""
- ],
- "type": "number",
- "unit": "ops"
- },
- {
- "alias": "Errors",
- "colorMode": null,
- "colors": [
- "rgba(245, 54, 54, 0.9)",
- "rgba(237, 129, 40, 0.89)",
- "rgba(50, 172, 45, 0.97)"
- ],
- "dateFormat": "YYYY-MM-DD HH:mm:ss",
- "decimals": 2,
- "pattern": "Value #B",
- "thresholds": [],
- "type": "number",
- "unit": "ops"
- },
- {
- "alias": "P50 Latency",
- "colorMode": null,
- "colors": [
- "rgba(245, 54, 54, 0.9)",
- "rgba(237, 129, 40, 0.89)",
- "rgba(50, 172, 45, 0.97)"
- ],
- "dateFormat": "YYYY-MM-DD HH:mm:ss",
- "decimals": 0,
- "link": false,
- "pattern": "Value #C",
- "thresholds": [],
- "type": "number",
- "unit": "dtdurations"
- },
- {
- "alias": "P90 Latency",
- "colorMode": null,
- "colors": [
- "rgba(245, 54, 54, 0.9)",
- "rgba(237, 129, 40, 0.89)",
- "rgba(50, 172, 45, 0.97)"
- ],
- "dateFormat": "YYYY-MM-DD HH:mm:ss",
- "decimals": 0,
- "pattern": "Value #D",
- "thresholds": [],
- "type": "number",
- "unit": "dtdurations"
- },
- {
- "alias": "P99 Latency",
- "colorMode": null,
- "colors": [
- "rgba(245, 54, 54, 0.9)",
- "rgba(237, 129, 40, 0.89)",
- "rgba(50, 172, 45, 0.97)"
- ],
- "dateFormat": "YYYY-MM-DD HH:mm:ss",
- "decimals": 0,
- "pattern": "Value #E",
- "thresholds": [],
- "type": "number",
- "unit": "dtdurations"
- },
- {
- "alias": "IN",
- "colorMode": null,
- "colors": [
- "rgba(245, 54, 54, 0.9)",
- "rgba(237, 129, 40, 0.89)",
- "rgba(50, 172, 45, 0.97)"
- ],
- "dateFormat": "YYYY-MM-DD HH:mm:ss",
- "decimals": 2,
- "pattern": "Value #F",
- "thresholds": [
- ""
- ],
- "type": "number",
- "unit": "Bps"
- },
- {
- "alias": "",
- "colorMode": null,
- "colors": [
- "rgba(245, 54, 54, 0.9)",
- "rgba(237, 129, 40, 0.89)",
- "rgba(50, 172, 45, 0.97)"
- ],
- "dateFormat": "YYYY-MM-DD HH:mm:ss",
- "decimals": 2,
- "pattern": "Time",
- "thresholds": [],
- "type": "hidden",
- "unit": "short"
- },
- {
- "alias": "OUT",
- "colorMode": null,
- "colors": [
- "rgba(245, 54, 54, 0.9)",
- "rgba(237, 129, 40, 0.89)",
- "rgba(50, 172, 45, 0.97)"
- ],
- "dateFormat": "YYYY-MM-DD HH:mm:ss",
- "decimals": 2,
- "mappingType": 1,
- "pattern": "Value #G",
- "thresholds": [],
- "type": "number",
- "unit": "Bps"
- }
- ],
- "targets": [
- {
- "expr": "histogram_quantile(0.50, sum(rate(nginx_ingress_controller_request_duration_seconds_bucket{ingress!=\"\",controller_pod=~\"$controller\",controller_class=~\"$controller_class\",controller_namespace=~\"$namespace\",ingress=~\"$ingress\",exported_namespace=~\"$exported_namespace\"}[2m])) by (le, ingress))",
- "format": "table",
- "hide": false,
- "instant": true,
- "intervalFactor": 1,
- "legendFormat": "{{ ingress }}",
- "refId": "C"
- },
- {
- "expr": "histogram_quantile(0.90, sum(rate(nginx_ingress_controller_request_duration_seconds_bucket{ingress!=\"\",controller_pod=~\"$controller\",controller_class=~\"$controller_class\",controller_namespace=~\"$namespace\",ingress=~\"$ingress\",exported_namespace=~\"$exported_namespace\"}[2m])) by (le, ingress))",
- "format": "table",
- "hide": false,
- "instant": true,
- "intervalFactor": 1,
- "legendFormat": "{{ ingress }}",
- "refId": "D"
- },
- {
- "expr": "histogram_quantile(0.99, sum(rate(nginx_ingress_controller_request_duration_seconds_bucket{ingress!=\"\",controller_pod=~\"$controller\",controller_class=~\"$controller_class\",controller_namespace=~\"$namespace\",ingress=~\"$ingress\",exported_namespace=~\"$exported_namespace\"}[2m])) by (le, ingress))",
- "format": "table",
- "hide": false,
- "instant": true,
- "intervalFactor": 1,
- "legendFormat": "{{ destination_service }}",
- "refId": "E"
- },
- {
- "expr": "sum(irate(nginx_ingress_controller_request_size_sum{ingress!=\"\",controller_pod=~\"$controller\",controller_class=~\"$controller_class\",controller_namespace=~\"$namespace\",ingress=~\"$ingress\",exported_namespace=~\"$exported_namespace\"}[2m])) by (ingress)",
- "format": "table",
- "hide": false,
- "instant": true,
- "interval": "",
- "intervalFactor": 1,
- "legendFormat": "{{ ingress }}",
- "refId": "F"
- },
- {
- "expr": "sum(irate(nginx_ingress_controller_response_size_sum{ingress!=\"\",controller_pod=~\"$controller\",controller_class=~\"$controller_class\",controller_namespace=~\"$namespace\",ingress=~\"$ingress\",exported_namespace=~\"$exported_namespace\"}[2m])) by (ingress)",
- "format": "table",
- "instant": true,
- "intervalFactor": 1,
- "legendFormat": "{{ ingress }}",
- "refId": "G"
- }
- ],
- "timeFrom": null,
- "title": "Ingress Percentile Response Times and Transfer Rates",
- "transform": "table",
- "transparent": false,
- "type": "table"
- },
- {
- "datasource": "${DS_PROMETHEUS}",
"fieldConfig": {
"defaults": {
"color": {
"mode": "palette-classic"
},
"custom": {
+ "axisBorderShow": false,
+ "axisCenteredZero": false,
+ "axisColorMode": "text",
"axisLabel": "",
"axisPlacement": "auto",
"barAlignment": 0,
@@ -1253,6 +641,842 @@
"tooltip": false,
"viz": false
},
+ "insertNulls": false,
+ "lineInterpolation": "linear",
+ "lineWidth": 2,
+ "pointSize": 5,
+ "scaleDistribution": {
+ "type": "linear"
+ },
+ "showPoints": "never",
+ "spanNulls": true,
+ "stacking": {
+ "group": "A",
+ "mode": "none"
+ },
+ "thresholdsStyle": {
+ "mode": "off"
+ }
+ },
+ "mappings": [],
+ "thresholds": {
+ "mode": "absolute",
+ "steps": [
+ {
+ "color": "green",
+ "value": null
+ },
+ {
+ "color": "red",
+ "value": 80
+ }
+ ]
+ },
+ "unit": "percentunit"
+ },
+ "overrides": [
+ {
+ "matcher": {
+ "id": "byName",
+ "options": "max - istio-proxy"
+ },
+ "properties": [
+ {
+ "id": "color",
+ "value": {
+ "fixedColor": "#890f02",
+ "mode": "fixed"
+ }
+ }
+ ]
+ },
+ {
+ "matcher": {
+ "id": "byName",
+ "options": "max - master"
+ },
+ "properties": [
+ {
+ "id": "color",
+ "value": {
+ "fixedColor": "#bf1b00",
+ "mode": "fixed"
+ }
+ }
+ ]
+ },
+ {
+ "matcher": {
+ "id": "byName",
+ "options": "max - prometheus"
+ },
+ "properties": [
+ {
+ "id": "color",
+ "value": {
+ "fixedColor": "#bf1b00",
+ "mode": "fixed"
+ }
+ }
+ ]
+ },
+ {
+ "matcher": {
+ "id": "byValue",
+ "options": {
+ "op": "gte",
+ "reducer": "allIsNull",
+ "value": 0
+ }
+ },
+ "properties": [
+ {
+ "id": "custom.hideFrom",
+ "value": {
+ "legend": true,
+ "tooltip": true,
+ "viz": false
+ }
+ }
+ ]
+ }
+ ]
+ },
+ "gridPos": {
+ "h": 7,
+ "w": 12,
+ "x": 12,
+ "y": 3
+ },
+ "id": 87,
+ "options": {
+ "legend": {
+ "calcs": [
+ "mean"
+ ],
+ "displayMode": "table",
+ "placement": "right",
+ "showLegend": true
+ },
+ "tooltip": {
+ "mode": "multi",
+ "sort": "asc"
+ }
+ },
+ "pluginVersion": "10.4.3",
+ "targets": [
+ {
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
+ "expr": "sum(rate(nginx_ingress_controller_requests{controller_pod=~\"$controller\",controller_class=~\"$controller_class\",namespace=~\"$namespace\",exported_namespace=~\"$exported_namespace\",ingress=~\"$ingress\",status!~\"[4-5].*\"}[2m])) by (ingress) / sum(rate(nginx_ingress_controller_requests{controller_pod=~\"$controller\",controller_class=~\"$controller_class\",namespace=~\"$namespace\",exported_namespace=~\"$exported_namespace\",ingress=~\"$ingress\"}[2m])) by (ingress)",
+ "format": "time_series",
+ "instant": false,
+ "interval": "10s",
+ "intervalFactor": 1,
+ "legendFormat": "{{ ingress }}",
+ "metric": "container_memory_usage:sort_desc",
+ "refId": "A",
+ "step": 10
+ }
+ ],
+ "title": "Ingress Success Rate (non-4|5xx responses)",
+ "type": "timeseries"
+ },
+ {
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
+ "fieldConfig": {
+ "defaults": {
+ "color": {
+ "mode": "palette-classic"
+ },
+ "custom": {
+ "axisBorderShow": false,
+ "axisCenteredZero": false,
+ "axisColorMode": "text",
+ "axisLabel": "",
+ "axisPlacement": "auto",
+ "barAlignment": 0,
+ "drawStyle": "line",
+ "fillOpacity": 10,
+ "gradientMode": "none",
+ "hideFrom": {
+ "legend": false,
+ "tooltip": false,
+ "viz": false
+ },
+ "insertNulls": false,
+ "lineInterpolation": "linear",
+ "lineWidth": 2,
+ "pointSize": 5,
+ "scaleDistribution": {
+ "type": "linear"
+ },
+ "showPoints": "never",
+ "spanNulls": true,
+ "stacking": {
+ "group": "A",
+ "mode": "none"
+ },
+ "thresholdsStyle": {
+ "mode": "off"
+ }
+ },
+ "mappings": [],
+ "thresholds": {
+ "mode": "absolute",
+ "steps": [
+ {
+ "color": "green",
+ "value": null
+ },
+ {
+ "color": "red",
+ "value": 80
+ }
+ ]
+ },
+ "unit": "Bps"
+ },
+ "overrides": []
+ },
+ "gridPos": {
+ "h": 6,
+ "w": 8,
+ "x": 0,
+ "y": 10
+ },
+ "id": 32,
+ "options": {
+ "legend": {
+ "calcs": [
+ "mean",
+ "lastNotNull"
+ ],
+ "displayMode": "list",
+ "placement": "bottom",
+ "showLegend": false,
+ "width": 200
+ },
+ "tooltip": {
+ "mode": "multi",
+ "sort": "none"
+ }
+ },
+ "pluginVersion": "10.4.3",
+ "targets": [
+ {
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
+ "expr": "sum (irate (nginx_ingress_controller_request_size_sum{controller_pod=~\"$controller\",controller_class=~\"$controller_class\",controller_namespace=~\"$namespace\"}[2m]))",
+ "format": "time_series",
+ "instant": false,
+ "interval": "10s",
+ "intervalFactor": 1,
+ "legendFormat": "Received",
+ "metric": "network",
+ "refId": "A",
+ "step": 10
+ },
+ {
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
+ "expr": "- sum (irate (nginx_ingress_controller_response_size_sum{controller_pod=~\"$controller\",controller_class=~\"$controller_class\",controller_namespace=~\"$namespace\"}[2m]))",
+ "format": "time_series",
+ "hide": false,
+ "interval": "10s",
+ "intervalFactor": 1,
+ "legendFormat": "Sent",
+ "metric": "network",
+ "refId": "B",
+ "step": 10
+ }
+ ],
+ "title": "Network I/O pressure",
+ "type": "timeseries"
+ },
+ {
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
+ "fieldConfig": {
+ "defaults": {
+ "color": {
+ "mode": "palette-classic"
+ },
+ "custom": {
+ "axisBorderShow": false,
+ "axisCenteredZero": false,
+ "axisColorMode": "text",
+ "axisLabel": "",
+ "axisPlacement": "auto",
+ "barAlignment": 0,
+ "drawStyle": "line",
+ "fillOpacity": 0,
+ "gradientMode": "none",
+ "hideFrom": {
+ "legend": false,
+ "tooltip": false,
+ "viz": false
+ },
+ "insertNulls": false,
+ "lineInterpolation": "linear",
+ "lineWidth": 2,
+ "pointSize": 5,
+ "scaleDistribution": {
+ "type": "linear"
+ },
+ "showPoints": "never",
+ "spanNulls": true,
+ "stacking": {
+ "group": "A",
+ "mode": "none"
+ },
+ "thresholdsStyle": {
+ "mode": "off"
+ }
+ },
+ "mappings": [],
+ "thresholds": {
+ "mode": "absolute",
+ "steps": [
+ {
+ "color": "green",
+ "value": null
+ },
+ {
+ "color": "red",
+ "value": 80
+ }
+ ]
+ },
+ "unit": "bytes"
+ },
+ "overrides": [
+ {
+ "matcher": {
+ "id": "byName",
+ "options": "max - istio-proxy"
+ },
+ "properties": [
+ {
+ "id": "color",
+ "value": {
+ "fixedColor": "#890f02",
+ "mode": "fixed"
+ }
+ }
+ ]
+ },
+ {
+ "matcher": {
+ "id": "byName",
+ "options": "max - master"
+ },
+ "properties": [
+ {
+ "id": "color",
+ "value": {
+ "fixedColor": "#bf1b00",
+ "mode": "fixed"
+ }
+ }
+ ]
+ },
+ {
+ "matcher": {
+ "id": "byName",
+ "options": "max - prometheus"
+ },
+ "properties": [
+ {
+ "id": "color",
+ "value": {
+ "fixedColor": "#bf1b00",
+ "mode": "fixed"
+ }
+ }
+ ]
+ }
+ ]
+ },
+ "gridPos": {
+ "h": 6,
+ "w": 8,
+ "x": 8,
+ "y": 10
+ },
+ "id": 77,
+ "options": {
+ "legend": {
+ "calcs": [
+ "mean",
+ "lastNotNull"
+ ],
+ "displayMode": "list",
+ "placement": "bottom",
+ "showLegend": false,
+ "width": 200
+ },
+ "tooltip": {
+ "mode": "multi",
+ "sort": "desc"
+ }
+ },
+ "pluginVersion": "10.4.3",
+ "targets": [
+ {
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
+ "expr": "avg(nginx_ingress_controller_nginx_process_resident_memory_bytes{controller_pod=~\"$controller\",controller_class=~\"$controller_class\",controller_namespace=~\"$namespace\"}) ",
+ "format": "time_series",
+ "instant": false,
+ "interval": "10s",
+ "intervalFactor": 1,
+ "legendFormat": "nginx",
+ "metric": "container_memory_usage:sort_desc",
+ "refId": "A",
+ "step": 10
+ }
+ ],
+ "title": "Average Memory Usage",
+ "type": "timeseries"
+ },
+ {
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
+ "fieldConfig": {
+ "defaults": {
+ "color": {
+ "mode": "palette-classic"
+ },
+ "custom": {
+ "axisBorderShow": false,
+ "axisCenteredZero": false,
+ "axisColorMode": "text",
+ "axisLabel": "cores",
+ "axisPlacement": "auto",
+ "barAlignment": 0,
+ "drawStyle": "line",
+ "fillOpacity": 0,
+ "gradientMode": "none",
+ "hideFrom": {
+ "legend": false,
+ "tooltip": false,
+ "viz": false
+ },
+ "insertNulls": false,
+ "lineInterpolation": "linear",
+ "lineWidth": 2,
+ "pointSize": 5,
+ "scaleDistribution": {
+ "type": "linear"
+ },
+ "showPoints": "never",
+ "spanNulls": true,
+ "stacking": {
+ "group": "A",
+ "mode": "none"
+ },
+ "thresholdsStyle": {
+ "mode": "line+area"
+ }
+ },
+ "mappings": [],
+ "thresholds": {
+ "mode": "absolute",
+ "steps": [
+ {
+ "color": "transparent",
+ "value": null
+ }
+ ]
+ },
+ "unit": "none"
+ },
+ "overrides": []
+ },
+ "gridPos": {
+ "h": 6,
+ "w": 8,
+ "x": 16,
+ "y": 10
+ },
+ "id": 79,
+ "options": {
+ "legend": {
+ "calcs": [
+ "mean",
+ "lastNotNull"
+ ],
+ "displayMode": "list",
+ "placement": "bottom",
+ "showLegend": false
+ },
+ "tooltip": {
+ "mode": "multi",
+ "sort": "desc"
+ }
+ },
+ "pluginVersion": "10.4.3",
+ "targets": [
+ {
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
+ "expr": "avg (rate (nginx_ingress_controller_nginx_process_cpu_seconds_total{controller_pod=~\"$controller\",controller_class=~\"$controller_class\",controller_namespace=~\"$namespace\"}[2m])) ",
+ "format": "time_series",
+ "interval": "10s",
+ "intervalFactor": 1,
+ "legendFormat": "nginx",
+ "metric": "container_cpu",
+ "refId": "A",
+ "step": 10
+ }
+ ],
+ "title": "Average CPU Usage",
+ "type": "timeseries"
+ },
+ {
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
+ "description": "This data is real time, independent of dashboard time range",
+ "fieldConfig": {
+ "defaults": {
+ "color": {
+ "mode": "thresholds"
+ },
+ "custom": {
+ "align": "auto",
+ "cellOptions": {
+ "type": "auto"
+ },
+ "inspect": false
+ },
+ "mappings": [],
+ "thresholds": {
+ "mode": "absolute",
+ "steps": [
+ {
+ "color": "green",
+ "value": null
+ },
+ {
+ "color": "red",
+ "value": 80
+ }
+ ]
+ }
+ },
+ "overrides": [
+ {
+ "matcher": {
+ "id": "byName",
+ "options": "ingress"
+ },
+ "properties": [
+ {
+ "id": "displayName",
+ "value": "Ingress"
+ },
+ {
+ "id": "unit",
+ "value": "short"
+ },
+ {
+ "id": "decimals",
+ "value": 2
+ },
+ {
+ "id": "custom.align"
+ }
+ ]
+ },
+ {
+ "matcher": {
+ "id": "byName",
+ "options": "Value #A"
+ },
+ "properties": [
+ {
+ "id": "displayName",
+ "value": "P50 Latency"
+ },
+ {
+ "id": "unit",
+ "value": "dtdurations"
+ },
+ {
+ "id": "custom.align"
+ }
+ ]
+ },
+ {
+ "matcher": {
+ "id": "byName",
+ "options": "Value #B"
+ },
+ "properties": [
+ {
+ "id": "displayName",
+ "value": "P90 Latency"
+ },
+ {
+ "id": "unit",
+ "value": "dtdurations"
+ },
+ {
+ "id": "custom.align"
+ }
+ ]
+ },
+ {
+ "matcher": {
+ "id": "byName",
+ "options": "Value #C"
+ },
+ "properties": [
+ {
+ "id": "displayName",
+ "value": "P99 Latency"
+ },
+ {
+ "id": "unit",
+ "value": "dtdurations"
+ },
+ {
+ "id": "custom.align"
+ }
+ ]
+ },
+ {
+ "matcher": {
+ "id": "byName",
+ "options": "Value #D"
+ },
+ "properties": [
+ {
+ "id": "displayName",
+ "value": "IN"
+ },
+ {
+ "id": "unit",
+ "value": "Bps"
+ },
+ {
+ "id": "decimals",
+ "value": 2
+ },
+ {
+ "id": "custom.align"
+ },
+ {
+ "id": "thresholds",
+ "value": {
+ "mode": "absolute",
+ "steps": [
+ {
+ "color": "rgba(245, 54, 54, 0.9)",
+ "value": null
+ },
+ {
+ "color": "rgba(237, 129, 40, 0.89)"
+ }
+ ]
+ }
+ }
+ ]
+ },
+ {
+ "matcher": {
+ "id": "byName",
+ "options": "Time"
+ },
+ "properties": [
+ {
+ "id": "unit",
+ "value": "short"
+ },
+ {
+ "id": "decimals",
+ "value": 2
+ },
+ {
+ "id": "custom.align"
+ },
+ {
+ "id": "custom.hidden",
+ "value": true
+ }
+ ]
+ },
+ {
+ "matcher": {
+ "id": "byName",
+ "options": "Value #E"
+ },
+ "properties": [
+ {
+ "id": "displayName",
+ "value": "OUT"
+ },
+ {
+ "id": "unit",
+ "value": "Bps"
+ },
+ {
+ "id": "decimals",
+ "value": 2
+ },
+ {
+ "id": "custom.align"
+ }
+ ]
+ }
+ ]
+ },
+ "gridPos": {
+ "h": 8,
+ "w": 24,
+ "x": 0,
+ "y": 16
+ },
+ "hideTimeOverride": false,
+ "id": 75,
+ "options": {
+ "cellHeight": "sm",
+ "footer": {
+ "countRows": false,
+ "fields": "",
+ "reducer": [
+ "sum"
+ ],
+ "show": false
+ },
+ "showHeader": true
+ },
+ "pluginVersion": "10.4.3",
+ "repeatDirection": "h",
+ "targets": [
+ {
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
+ "expr": "histogram_quantile(0.50, sum(rate(nginx_ingress_controller_request_duration_seconds_bucket{ingress!=\"\",controller_pod=~\"$controller\",controller_class=~\"$controller_class\",controller_namespace=~\"$namespace\",ingress=~\"$ingress\",exported_namespace=~\"$exported_namespace\"}[2m])) by (le, ingress))",
+ "format": "table",
+ "hide": false,
+ "instant": true,
+ "intervalFactor": 1,
+ "legendFormat": "{{ ingress }}",
+ "refId": "A"
+ },
+ {
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
+ "expr": "histogram_quantile(0.90, sum(rate(nginx_ingress_controller_request_duration_seconds_bucket{ingress!=\"\",controller_pod=~\"$controller\",controller_class=~\"$controller_class\",controller_namespace=~\"$namespace\",ingress=~\"$ingress\",exported_namespace=~\"$exported_namespace\"}[2m])) by (le, ingress))",
+ "format": "table",
+ "hide": false,
+ "instant": true,
+ "intervalFactor": 1,
+ "legendFormat": "{{ ingress }}",
+ "refId": "B"
+ },
+ {
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
+ "expr": "histogram_quantile(0.99, sum(rate(nginx_ingress_controller_request_duration_seconds_bucket{ingress!=\"\",controller_pod=~\"$controller\",controller_class=~\"$controller_class\",controller_namespace=~\"$namespace\",ingress=~\"$ingress\",exported_namespace=~\"$exported_namespace\"}[2m])) by (le, ingress))",
+ "format": "table",
+ "hide": false,
+ "instant": true,
+ "intervalFactor": 1,
+ "legendFormat": "{{ destination_service }}",
+ "refId": "C"
+ },
+ {
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
+ "expr": "sum(irate(nginx_ingress_controller_request_size_sum{ingress!=\"\",controller_pod=~\"$controller\",controller_class=~\"$controller_class\",controller_namespace=~\"$namespace\",ingress=~\"$ingress\",exported_namespace=~\"$exported_namespace\"}[2m])) by (ingress)",
+ "format": "table",
+ "hide": false,
+ "instant": true,
+ "interval": "",
+ "intervalFactor": 1,
+ "legendFormat": "{{ ingress }}",
+ "refId": "D"
+ },
+ {
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
+ "expr": "sum(irate(nginx_ingress_controller_response_size_sum{ingress!=\"\",controller_pod=~\"$controller\",controller_class=~\"$controller_class\",controller_namespace=~\"$namespace\",ingress=~\"$ingress\",exported_namespace=~\"$exported_namespace\"}[2m])) by (ingress)",
+ "format": "table",
+ "instant": true,
+ "intervalFactor": 1,
+ "legendFormat": "{{ ingress }}",
+ "refId": "E"
+ }
+ ],
+ "title": "Ingress Percentile Response Times and Transfer Rates",
+ "transformations": [
+ {
+ "id": "merge",
+ "options": {
+ "reducers": []
+ }
+ }
+ ],
+ "type": "table"
+ },
+ {
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
+ "fieldConfig": {
+ "defaults": {
+ "color": {
+ "mode": "palette-classic"
+ },
+ "custom": {
+ "axisBorderShow": false,
+ "axisCenteredZero": false,
+ "axisColorMode": "text",
+ "axisLabel": "",
+ "axisPlacement": "auto",
+ "barAlignment": 0,
+ "drawStyle": "line",
+ "fillOpacity": 0,
+ "gradientMode": "none",
+ "hideFrom": {
+ "legend": false,
+ "tooltip": false,
+ "viz": false
+ },
+ "insertNulls": false,
"lineInterpolation": "linear",
"lineWidth": 1,
"pointSize": 5,
@@ -1295,12 +1519,12 @@
},
"hideTimeOverride": false,
"id": 91,
- "links": [],
"options": {
"legend": {
"calcs": [],
"displayMode": "list",
- "placement": "bottom"
+ "placement": "bottom",
+ "showLegend": true
},
"tooltip": {
"mode": "multi",
@@ -1311,6 +1535,10 @@
"repeatDirection": "h",
"targets": [
{
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
"exemplar": true,
"expr": "histogram_quantile(0.80, sum(rate(nginx_ingress_controller_request_duration_seconds_bucket{ingress!=\"\",controller_pod=~\"$controller\",controller_class=~\"$controller_class\",controller_namespace=~\"$namespace\",ingress=~\"$ingress\",exported_namespace=~\"$exported_namespace\"}[2m])) by (le))",
"format": "time_series",
@@ -1322,6 +1550,10 @@
"refId": "C"
},
{
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
"exemplar": true,
"expr": "histogram_quantile(0.90, sum(rate(nginx_ingress_controller_request_duration_seconds_bucket{ingress!=\"\",controller_pod=~\"$controller\",controller_class=~\"$controller_class\",controller_namespace=~\"$namespace\",ingress=~\"$ingress\",exported_namespace=~\"$exported_namespace\"}[2m])) by (le))",
"format": "time_series",
@@ -1333,6 +1565,10 @@
"refId": "D"
},
{
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
"editorMode": "code",
"exemplar": true,
"expr": "histogram_quantile(0.99, sum(rate(nginx_ingress_controller_request_duration_seconds_bucket{ingress!=\"\",controller_pod=~\"$controller\",controller_class=~\"$controller_class\",controller_namespace=~\"$namespace\",ingress=~\"$ingress\",exported_namespace=~\"$exported_namespace\"}[2m])) by (le))",
@@ -1358,8 +1594,26 @@
"mode": "spectrum"
},
"dataFormat": "tsbuckets",
- "datasource": "${DS_PROMETHEUS}",
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
"description": "",
+ "fieldConfig": {
+ "defaults": {
+ "custom": {
+ "hideFrom": {
+ "legend": false,
+ "tooltip": false,
+ "viz": false
+ },
+ "scaleDistribution": {
+ "type": "linear"
+ }
+ }
+ },
+ "overrides": []
+ },
"gridPos": {
"h": 7,
"w": 12,
@@ -1373,9 +1627,52 @@
"legend": {
"show": true
},
+ "options": {
+ "calculate": false,
+ "calculation": {},
+ "cellGap": 2,
+ "cellValues": {},
+ "color": {
+ "exponent": 0.5,
+ "fill": "#b4ff00",
+ "mode": "scheme",
+ "reverse": false,
+ "scale": "exponential",
+ "scheme": "Warm",
+ "steps": 128
+ },
+ "exemplars": {
+ "color": "rgba(255,0,255,0.7)"
+ },
+ "filterValues": {
+ "le": 1e-9
+ },
+ "legend": {
+ "show": true
+ },
+ "rowsFrame": {
+ "layout": "auto"
+ },
+ "showValue": "never",
+ "tooltip": {
+ "mode": "single",
+ "showColorScale": false,
+ "yHistogram": true
+ },
+ "yAxis": {
+ "axisPlacement": "left",
+ "reverse": false,
+ "unit": "s"
+ }
+ },
+ "pluginVersion": "10.4.3",
"reverseYBuckets": false,
"targets": [
{
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
"exemplar": true,
"expr": "sum(increase(nginx_ingress_controller_request_duration_seconds_bucket{ingress!=\"\",controller_pod=~\"$controller\",controller_class=~\"$controller_class\",controller_namespace=~\"$namespace\",ingress=~\"$ingress\",exported_namespace=~\"$exported_namespace\"}[2m])) by (le)",
"format": "heatmap",
@@ -1401,72 +1698,124 @@
"yBucketBound": "auto"
},
{
- "columns": [
- {
- "text": "Current",
- "value": "current"
- }
- ],
- "datasource": "${DS_PROMETHEUS}",
- "fontSize": "100%",
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
+ "fieldConfig": {
+ "defaults": {
+ "color": {
+ "mode": "thresholds"
+ },
+ "custom": {
+ "align": "auto",
+ "cellOptions": {
+ "type": "auto"
+ },
+ "inspect": false
+ },
+ "decimals": 2,
+ "displayName": "",
+ "mappings": [],
+ "thresholds": {
+ "mode": "absolute",
+ "steps": [
+ {
+ "color": "green",
+ "value": null
+ },
+ {
+ "color": "red",
+ "value": 80
+ }
+ ]
+ },
+ "unit": "short"
+ },
+ "overrides": [
+ {
+ "matcher": {
+ "id": "byName",
+ "options": "Last *"
+ },
+ "properties": [
+ {
+ "id": "displayName",
+ "value": "TTL"
+ },
+ {
+ "id": "unit",
+ "value": "s"
+ },
+ {
+ "id": "custom.cellOptions",
+ "value": {
+ "type": "color-background"
+ }
+ },
+ {
+ "id": "thresholds",
+ "value": {
+ "mode": "absolute",
+ "steps": [
+ {
+ "color": "rgba(245, 54, 54, 0.9)",
+ "value": null
+ },
+ {
+ "color": "rgba(237, 129, 40, 0.89)",
+ "value": 0
+ },
+ {
+ "color": "rgba(50, 172, 45, 0.97)",
+ "value": 691200
+ }
+ ]
+ }
+ }
+ ]
+ },
+ {
+ "matcher": {
+ "id": "byName",
+ "options": "Field"
+ },
+ "properties": [
+ {
+ "id": "displayName",
+ "value": "Host"
+ }
+ ]
+ }
+ ]
+ },
"gridPos": {
"h": 8,
"w": 24,
"x": 0,
"y": 31
},
- "height": "1024",
"id": 85,
- "links": [],
- "pageSize": 7,
- "scroll": true,
- "showHeader": true,
- "sort": {
- "col": 1,
- "desc": false
+ "options": {
+ "cellHeight": "sm",
+ "footer": {
+ "countRows": false,
+ "enablePagination": false,
+ "fields": "",
+ "reducer": [
+ "sum"
+ ],
+ "show": false
+ },
+ "showHeader": true
},
- "styles": [
- {
- "alias": "Time",
- "dateFormat": "YYYY-MM-DD HH:mm:ss",
- "pattern": "Time",
- "type": "date"
- },
- {
- "alias": "TTL",
- "colorMode": "cell",
- "colors": [
- "rgba(245, 54, 54, 0.9)",
- "rgba(237, 129, 40, 0.89)",
- "rgba(50, 172, 45, 0.97)"
- ],
- "dateFormat": "YYYY-MM-DD HH:mm:ss",
- "decimals": 0,
- "pattern": "Current",
- "thresholds": [
- "0",
- "691200"
- ],
- "type": "number",
- "unit": "s"
- },
- {
- "alias": "",
- "colorMode": null,
- "colors": [
- "rgba(245, 54, 54, 0.9)",
- "rgba(237, 129, 40, 0.89)",
- "rgba(50, 172, 45, 0.97)"
- ],
- "decimals": 2,
- "pattern": "/.*/",
- "thresholds": [],
- "type": "number",
- "unit": "short"
- }
- ],
+ "pluginVersion": "10.4.3",
"targets": [
{
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
"expr": "avg(nginx_ingress_controller_ssl_expire_time_seconds{kubernetes_pod_name=~\"$controller\",namespace=~\"$namespace\",ingress=~\"$ingress\"}) by (host) - time()",
"format": "time_series",
"intervalFactor": 1,
@@ -1477,35 +1826,55 @@
}
],
"title": "Ingress Certificate Expiry",
- "transform": "timeseries_aggregations",
+ "transformations": [
+ {
+ "id": "reduce",
+ "options": {
+ "includeTimeField": false,
+ "labelsToFields": false,
+ "reducers": [
+ "lastNotNull"
+ ]
+ }
+ }
+ ],
"type": "table"
}
],
"refresh": "5s",
- "schemaVersion": 16,
- "style": "dark",
+ "schemaVersion": 39,
"tags": [
"nginx"
],
"templating": {
"list": [
{
+ "current": {
+ "selected": false,
+ "text": "Prometheus",
+ "value": "${DS_PROMETHEUS}"
+ },
"hide": 0,
+ "includeAll": false,
"label": "datasource",
+ "multi": false,
"name": "DS_PROMETHEUS",
"options": [],
"query": "prometheus",
+ "queryValue": "",
"refresh": 1,
"regex": "",
+ "skipUrlSync": false,
"type": "datasource"
},
{
"allValue": ".*",
- "current": {
- "text": "All",
- "value": "$__all"
+ "current": {},
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
},
- "datasource": "${DS_PROMETHEUS}",
+ "definition": "",
"hide": 0,
"includeAll": true,
"label": "Namespace",
@@ -1515,20 +1884,21 @@
"query": "label_values(nginx_ingress_controller_config_hash, controller_namespace)",
"refresh": 1,
"regex": "",
+ "skipUrlSync": false,
"sort": 0,
"tagValuesQuery": "",
- "tags": [],
"tagsQuery": "",
"type": "query",
"useTags": false
},
{
"allValue": ".*",
- "current": {
- "text": "All",
- "value": "$__all"
+ "current": {},
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
},
- "datasource": "${DS_PROMETHEUS}",
+ "definition": "",
"hide": 0,
"includeAll": true,
"label": "Controller Class",
@@ -1538,20 +1908,21 @@
"query": "label_values(nginx_ingress_controller_config_hash{namespace=~\"$namespace\"}, controller_class) ",
"refresh": 1,
"regex": "",
+ "skipUrlSync": false,
"sort": 0,
"tagValuesQuery": "",
- "tags": [],
"tagsQuery": "",
"type": "query",
"useTags": false
},
{
"allValue": ".*",
- "current": {
- "text": "All",
- "value": "$__all"
+ "current": {},
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
},
- "datasource": "${DS_PROMETHEUS}",
+ "definition": "",
"hide": 0,
"includeAll": true,
"label": "Controller",
@@ -1561,21 +1932,21 @@
"query": "label_values(nginx_ingress_controller_config_hash{namespace=~\"$namespace\",controller_class=~\"$controller_class\"}, controller_pod) ",
"refresh": 1,
"regex": "",
+ "skipUrlSync": false,
"sort": 1,
"tagValuesQuery": "",
- "tags": [],
"tagsQuery": "",
"type": "query",
"useTags": false
},
{
"allValue": ".*",
- "current": {
- "tags": [],
- "text": "All",
- "value": "$__all"
+ "current": {},
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
},
- "datasource": "${DS_PROMETHEUS}",
+ "definition": "",
"hide": 0,
"includeAll": true,
"label": "Ingress Namespace",
@@ -1585,21 +1956,21 @@
"query": "label_values(nginx_ingress_controller_requests{namespace=~\"$namespace\",controller_class=~\"$controller_class\",controller_pod=~\"$controller\"}, exported_namespace) ",
"refresh": 1,
"regex": "",
+ "skipUrlSync": false,
"sort": 1,
"tagValuesQuery": "",
- "tags": [],
"tagsQuery": "",
"type": "query",
"useTags": false
},
{
"allValue": ".*",
- "current": {
- "tags": [],
- "text": "All",
- "value": "$__all"
+ "current": {},
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
},
- "datasource": "${DS_PROMETHEUS}",
+ "definition": "",
"hide": 0,
"includeAll": true,
"label": "Ingress",
@@ -1609,9 +1980,9 @@
"query": "label_values(nginx_ingress_controller_requests{namespace=~\"$namespace\",controller_class=~\"$controller_class\",controller_pod=~\"$controller\",exported_namespace=~\"$exported_namespace\"}, ingress) ",
"refresh": 1,
"regex": "",
+ "skipUrlSync": false,
"sort": 1,
"tagValuesQuery": "",
- "tags": [],
"tagsQuery": "",
"type": "query",
"useTags": false
@@ -1650,5 +2021,6 @@
"timezone": "browser",
"title": "NGINX Ingress controller",
"uid": "nginx",
- "version": 1
-}
+ "version": 1,
+ "weekStart": ""
+}
\ No newline at end of file
diff --git a/deploy/grafana/dashboards/request-handling-performance.json b/deploy/grafana/dashboards/request-handling-performance.json
index 1422336ae..61db983a6 100644
--- a/deploy/grafana/dashboards/request-handling-performance.json
+++ b/deploy/grafana/dashboards/request-handling-performance.json
@@ -9,32 +9,35 @@
"pluginName": "Prometheus"
}
],
- "__elements": [],
+ "__elements": {},
"__requires": [
{
"type": "grafana",
"id": "grafana",
"name": "Grafana",
- "version": "8.3.4"
- },
- {
- "type": "panel",
- "id": "graph",
- "name": "Graph (old)",
- "version": ""
+ "version": "10.4.3"
},
{
"type": "datasource",
"id": "prometheus",
"name": "Prometheus",
"version": "1.0.0"
+ },
+ {
+ "type": "panel",
+ "id": "timeseries",
+ "name": "Time series",
+ "version": ""
}
],
"annotations": {
"list": [
{
"builtIn": 1,
- "datasource": "-- Grafana --",
+ "datasource": {
+ "type": "datasource",
+ "uid": "grafana"
+ },
"enable": true,
"hide": true,
"iconColor": "rgba(0, 211, 255, 1)",
@@ -55,160 +58,214 @@
"gnetId": 9614,
"graphTooltip": 1,
"id": null,
- "iteration": 1646929474557,
"links": [],
"liveNow": false,
"panels": [
{
- "aliasColors": {},
- "bars": false,
- "dashLength": 10,
- "dashes": false,
"datasource": {
+ "type": "prometheus",
"uid": "${DS_PROMETHEUS}"
},
"description": "Total time for NGINX and upstream servers to process a request and send a response",
"fieldConfig": {
"defaults": {
- "links": []
+ "color": {
+ "mode": "palette-classic"
+ },
+ "custom": {
+ "axisBorderShow": false,
+ "axisCenteredZero": false,
+ "axisColorMode": "text",
+ "axisLabel": "",
+ "axisPlacement": "auto",
+ "barAlignment": 0,
+ "drawStyle": "line",
+ "fillOpacity": 10,
+ "gradientMode": "none",
+ "hideFrom": {
+ "legend": false,
+ "tooltip": false,
+ "viz": false
+ },
+ "insertNulls": false,
+ "lineInterpolation": "linear",
+ "lineWidth": 1,
+ "pointSize": 5,
+ "scaleDistribution": {
+ "type": "linear"
+ },
+ "showPoints": "never",
+ "spanNulls": false,
+ "stacking": {
+ "group": "A",
+ "mode": "none"
+ },
+ "thresholdsStyle": {
+ "mode": "off"
+ }
+ },
+ "links": [],
+ "mappings": [],
+ "thresholds": {
+ "mode": "absolute",
+ "steps": [
+ {
+ "color": "green",
+ "value": null
+ },
+ {
+ "color": "red",
+ "value": 80
+ }
+ ]
+ },
+ "unit": "s"
},
"overrides": []
},
- "fill": 1,
- "fillGradient": 0,
"gridPos": {
"h": 8,
"w": 12,
"x": 0,
"y": 0
},
- "hiddenSeries": false,
"id": 91,
- "legend": {
- "avg": false,
- "current": false,
- "max": false,
- "min": false,
- "show": true,
- "total": false,
- "values": false
- },
- "lines": true,
- "linewidth": 1,
- "nullPointMode": "null",
"options": {
- "alertThreshold": true
+ "legend": {
+ "calcs": [],
+ "displayMode": "list",
+ "placement": "bottom",
+ "showLegend": true
+ },
+ "tooltip": {
+ "mode": "multi",
+ "sort": "desc"
+ }
},
- "percentage": false,
- "pluginVersion": "8.3.4",
- "pointradius": 2,
- "points": false,
- "renderer": "flot",
- "seriesOverrides": [],
- "spaceLength": 10,
- "stack": false,
- "steppedLine": false,
+ "pluginVersion": "10.4.3",
"targets": [
{
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
"expr": "histogram_quantile(\n 0.5,\n sum by (le)(\n rate(\n nginx_ingress_controller_request_duration_seconds_bucket{\n ingress =~ \"$ingress\"\n }[5m]\n )\n )\n)",
"interval": "",
"legendFormat": ".5",
"refId": "D"
},
{
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
"expr": "histogram_quantile(\n 0.95,\n sum by (le)(\n rate(\n nginx_ingress_controller_request_duration_seconds_bucket{\n ingress =~ \"$ingress\"\n }[5m]\n )\n )\n)",
"interval": "",
"legendFormat": ".95",
"refId": "B"
},
{
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
"expr": "histogram_quantile(\n 0.99,\n sum by (le)(\n rate(\n nginx_ingress_controller_request_duration_seconds_bucket{\n ingress =~ \"$ingress\"\n }[5m]\n )\n )\n)",
"interval": "",
"legendFormat": ".99",
"refId": "A"
}
],
- "thresholds": [],
- "timeRegions": [],
"title": "Request Latency Percentiles",
- "tooltip": {
- "shared": true,
- "sort": 2,
- "value_type": "individual"
- },
- "type": "graph",
- "xaxis": {
- "mode": "time",
- "show": true,
- "values": []
- },
- "yaxes": [
- {
- "format": "s",
- "logBase": 1,
- "show": true
- },
- {
- "format": "short",
- "logBase": 1,
- "show": true
- }
- ],
- "yaxis": {
- "align": false
- }
+ "type": "timeseries"
},
{
- "aliasColors": {},
- "bars": false,
- "dashLength": 10,
- "dashes": false,
"datasource": {
+ "type": "prometheus",
"uid": "${DS_PROMETHEUS}"
},
"description": "The time spent on receiving the response from the upstream server",
"fieldConfig": {
"defaults": {
- "links": []
+ "color": {
+ "mode": "palette-classic"
+ },
+ "custom": {
+ "axisBorderShow": false,
+ "axisCenteredZero": false,
+ "axisColorMode": "text",
+ "axisLabel": "",
+ "axisPlacement": "auto",
+ "barAlignment": 0,
+ "drawStyle": "line",
+ "fillOpacity": 10,
+ "gradientMode": "none",
+ "hideFrom": {
+ "legend": false,
+ "tooltip": false,
+ "viz": false
+ },
+ "insertNulls": false,
+ "lineInterpolation": "linear",
+ "lineWidth": 1,
+ "pointSize": 5,
+ "scaleDistribution": {
+ "type": "linear"
+ },
+ "showPoints": "never",
+ "spanNulls": false,
+ "stacking": {
+ "group": "A",
+ "mode": "none"
+ },
+ "thresholdsStyle": {
+ "mode": "off"
+ }
+ },
+ "links": [],
+ "mappings": [],
+ "thresholds": {
+ "mode": "absolute",
+ "steps": [
+ {
+ "color": "green",
+ "value": null
+ },
+ {
+ "color": "red",
+ "value": 80
+ }
+ ]
+ },
+ "unit": "s"
},
"overrides": []
},
- "fill": 1,
- "fillGradient": 0,
"gridPos": {
"h": 8,
"w": 12,
"x": 12,
"y": 0
},
- "hiddenSeries": false,
"id": 94,
- "legend": {
- "avg": false,
- "current": false,
- "max": false,
- "min": false,
- "show": true,
- "total": false,
- "values": false
- },
- "lines": true,
- "linewidth": 1,
- "nullPointMode": "null",
"options": {
- "alertThreshold": true
+ "legend": {
+ "calcs": [],
+ "displayMode": "list",
+ "placement": "bottom",
+ "showLegend": true
+ },
+ "tooltip": {
+ "mode": "multi",
+ "sort": "desc"
+ }
},
- "percentage": false,
- "pluginVersion": "8.3.4",
- "pointradius": 2,
- "points": false,
- "renderer": "flot",
- "seriesOverrides": [],
- "spaceLength": 10,
- "stack": false,
- "steppedLine": false,
+ "pluginVersion": "10.4.3",
"targets": [
{
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
"expr": "histogram_quantile(\n 0.5,\n sum by (le)(\n rate(\n nginx_ingress_controller_response_duration_seconds_bucket{\n ingress =~ \"$ingress\"\n }[5m]\n )\n )\n)",
"instant": false,
"interval": "",
@@ -217,100 +274,116 @@
"refId": "D"
},
{
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
"expr": "histogram_quantile(\n 0.95,\n sum by (le)(\n rate(\n nginx_ingress_controller_response_duration_seconds_bucket{\n ingress =~ \"$ingress\"\n }[5m]\n )\n )\n)",
"interval": "",
"legendFormat": ".95",
"refId": "B"
},
{
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
"expr": "histogram_quantile(\n 0.99,\n sum by (le)(\n rate(\n nginx_ingress_controller_response_duration_seconds_bucket{\n ingress =~ \"$ingress\"\n }[5m]\n )\n )\n)",
"interval": "",
"legendFormat": ".99",
"refId": "A"
}
],
- "thresholds": [],
- "timeRegions": [],
"title": "Upstream Response Latency Percentiles",
- "tooltip": {
- "shared": true,
- "sort": 2,
- "value_type": "individual"
- },
- "type": "graph",
- "xaxis": {
- "mode": "time",
- "show": true,
- "values": []
- },
- "yaxes": [
- {
- "format": "s",
- "logBase": 1,
- "show": true
- },
- {
- "format": "short",
- "logBase": 1,
- "show": true
- }
- ],
- "yaxis": {
- "align": false
- }
+ "type": "timeseries"
},
{
- "aliasColors": {},
- "bars": false,
- "dashLength": 10,
- "dashes": false,
"datasource": {
+ "type": "prometheus",
"uid": "${DS_PROMETHEUS}"
},
"fieldConfig": {
"defaults": {
- "links": []
+ "color": {
+ "mode": "palette-classic"
+ },
+ "custom": {
+ "axisBorderShow": false,
+ "axisCenteredZero": false,
+ "axisColorMode": "text",
+ "axisLabel": "",
+ "axisPlacement": "auto",
+ "barAlignment": 0,
+ "drawStyle": "line",
+ "fillOpacity": 10,
+ "gradientMode": "none",
+ "hideFrom": {
+ "legend": false,
+ "tooltip": false,
+ "viz": false
+ },
+ "insertNulls": false,
+ "lineInterpolation": "linear",
+ "lineWidth": 1,
+ "pointSize": 5,
+ "scaleDistribution": {
+ "type": "linear"
+ },
+ "showPoints": "never",
+ "spanNulls": false,
+ "stacking": {
+ "group": "A",
+ "mode": "none"
+ },
+ "thresholdsStyle": {
+ "mode": "off"
+ }
+ },
+ "links": [],
+ "mappings": [],
+ "thresholds": {
+ "mode": "absolute",
+ "steps": [
+ {
+ "color": "green",
+ "value": null
+ },
+ {
+ "color": "red",
+ "value": 80
+ }
+ ]
+ },
+ "unit": "reqps"
},
"overrides": []
},
- "fill": 1,
- "fillGradient": 0,
"gridPos": {
"h": 8,
"w": 12,
"x": 0,
"y": 8
},
- "hiddenSeries": false,
"id": 93,
- "legend": {
- "alignAsTable": true,
- "avg": false,
- "current": false,
- "max": false,
- "min": false,
- "rightSide": true,
- "show": true,
- "total": false,
- "values": false
- },
- "lines": true,
- "linewidth": 1,
- "nullPointMode": "null",
"options": {
- "alertThreshold": true
+ "legend": {
+ "calcs": [],
+ "displayMode": "table",
+ "placement": "right",
+ "showLegend": true
+ },
+ "tooltip": {
+ "mode": "multi",
+ "sort": "desc"
+ }
},
- "percentage": false,
- "pluginVersion": "8.3.4",
- "pointradius": 2,
- "points": false,
- "renderer": "flot",
- "seriesOverrides": [],
- "spaceLength": 10,
- "stack": false,
- "steppedLine": false,
+ "pluginVersion": "10.4.3",
"targets": [
{
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
"expr": " sum by (method, host, path)(\n rate(\n nginx_ingress_controller_request_duration_seconds_count{\n ingress =~ \"$ingress\"\n }[5m]\n )\n )\n",
"interval": "",
"intervalFactor": 1,
@@ -318,89 +391,97 @@
"refId": "A"
}
],
- "thresholds": [],
- "timeRegions": [],
"title": "Request Rate by Method and Path",
- "tooltip": {
- "shared": true,
- "sort": 2,
- "value_type": "individual"
- },
- "type": "graph",
- "xaxis": {
- "mode": "time",
- "show": true,
- "values": []
- },
- "yaxes": [
- {
- "format": "reqps",
- "logBase": 1,
- "show": true
- },
- {
- "format": "short",
- "logBase": 1,
- "show": true
- }
- ],
- "yaxis": {
- "align": false
- }
+ "type": "timeseries"
},
{
- "aliasColors": {},
- "bars": false,
- "dashLength": 10,
- "dashes": false,
"datasource": {
+ "type": "prometheus",
"uid": "${DS_PROMETHEUS}"
},
"description": "For each path observed, its median upstream response time",
"fieldConfig": {
"defaults": {
- "links": []
+ "color": {
+ "mode": "palette-classic"
+ },
+ "custom": {
+ "axisBorderShow": false,
+ "axisCenteredZero": false,
+ "axisColorMode": "text",
+ "axisLabel": "",
+ "axisPlacement": "auto",
+ "barAlignment": 0,
+ "drawStyle": "line",
+ "fillOpacity": 10,
+ "gradientMode": "none",
+ "hideFrom": {
+ "legend": false,
+ "tooltip": false,
+ "viz": false
+ },
+ "insertNulls": false,
+ "lineInterpolation": "linear",
+ "lineWidth": 1,
+ "pointSize": 5,
+ "scaleDistribution": {
+ "type": "linear"
+ },
+ "showPoints": "never",
+ "spanNulls": false,
+ "stacking": {
+ "group": "A",
+ "mode": "none"
+ },
+ "thresholdsStyle": {
+ "mode": "off"
+ }
+ },
+ "links": [],
+ "mappings": [],
+ "thresholds": {
+ "mode": "absolute",
+ "steps": [
+ {
+ "color": "green",
+ "value": null
+ },
+ {
+ "color": "red",
+ "value": 80
+ }
+ ]
+ },
+ "unit": "s"
},
"overrides": []
},
- "fill": 1,
- "fillGradient": 0,
"gridPos": {
"h": 8,
"w": 12,
"x": 12,
"y": 8
},
- "hiddenSeries": false,
"id": 98,
- "legend": {
- "alignAsTable": true,
- "avg": false,
- "current": false,
- "max": false,
- "min": false,
- "rightSide": true,
- "show": true,
- "total": false,
- "values": false
- },
- "lines": true,
- "linewidth": 1,
- "nullPointMode": "null",
"options": {
- "alertThreshold": true
+ "legend": {
+ "calcs": [],
+ "displayMode": "table",
+ "placement": "right",
+ "showLegend": true
+ },
+ "tooltip": {
+ "mode": "multi",
+ "sort": "desc"
+ }
},
- "percentage": false,
- "pluginVersion": "8.3.4",
- "pointradius": 2,
- "points": false,
- "renderer": "flot",
- "seriesOverrides": [],
- "spaceLength": 10,
- "stack": false,
- "steppedLine": false,
+ "pluginVersion": "10.4.3",
"targets": [
{
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
"expr": "histogram_quantile(\n .5,\n sum by (le, method, host, path)(\n rate(\n nginx_ingress_controller_response_duration_seconds_bucket{\n ingress =~ \"$ingress\"\n }[5m]\n )\n )\n)",
"interval": "",
"intervalFactor": 1,
@@ -408,89 +489,97 @@
"refId": "A"
}
],
- "thresholds": [],
- "timeRegions": [],
"title": "Median Upstream Response Time by Method and Path",
- "tooltip": {
- "shared": true,
- "sort": 2,
- "value_type": "individual"
- },
- "type": "graph",
- "xaxis": {
- "mode": "time",
- "show": true,
- "values": []
- },
- "yaxes": [
- {
- "format": "s",
- "logBase": 1,
- "show": true
- },
- {
- "format": "short",
- "logBase": 1,
- "show": true
- }
- ],
- "yaxis": {
- "align": false
- }
+ "type": "timeseries"
},
{
- "aliasColors": {},
- "bars": false,
- "dashLength": 10,
- "dashes": false,
"datasource": {
+ "type": "prometheus",
"uid": "${DS_PROMETHEUS}"
},
"description": "Percentage of 4xx and 5xx responses among all responses.",
"fieldConfig": {
"defaults": {
- "links": []
+ "color": {
+ "mode": "palette-classic"
+ },
+ "custom": {
+ "axisBorderShow": false,
+ "axisCenteredZero": false,
+ "axisColorMode": "text",
+ "axisLabel": "",
+ "axisPlacement": "auto",
+ "barAlignment": 0,
+ "drawStyle": "line",
+ "fillOpacity": 10,
+ "gradientMode": "none",
+ "hideFrom": {
+ "legend": false,
+ "tooltip": false,
+ "viz": false
+ },
+ "insertNulls": false,
+ "lineInterpolation": "linear",
+ "lineWidth": 1,
+ "pointSize": 5,
+ "scaleDistribution": {
+ "type": "linear"
+ },
+ "showPoints": "never",
+ "spanNulls": false,
+ "stacking": {
+ "group": "A",
+ "mode": "none"
+ },
+ "thresholdsStyle": {
+ "mode": "off"
+ }
+ },
+ "links": [],
+ "mappings": [],
+ "thresholds": {
+ "mode": "absolute",
+ "steps": [
+ {
+ "color": "green",
+ "value": null
+ },
+ {
+ "color": "red",
+ "value": 80
+ }
+ ]
+ },
+ "unit": "percentunit"
},
"overrides": []
},
- "fill": 1,
- "fillGradient": 0,
"gridPos": {
"h": 8,
"w": 12,
"x": 0,
"y": 16
},
- "hiddenSeries": false,
"id": 100,
- "legend": {
- "alignAsTable": true,
- "avg": false,
- "current": false,
- "max": false,
- "min": false,
- "rightSide": true,
- "show": true,
- "total": false,
- "values": false
- },
- "lines": true,
- "linewidth": 1,
- "nullPointMode": "null as zero",
"options": {
- "alertThreshold": true
+ "legend": {
+ "calcs": [],
+ "displayMode": "table",
+ "placement": "right",
+ "showLegend": true
+ },
+ "tooltip": {
+ "mode": "multi",
+ "sort": "desc"
+ }
},
- "percentage": false,
- "pluginVersion": "8.3.4",
- "pointradius": 2,
- "points": false,
- "renderer": "flot",
- "seriesOverrides": [],
- "spaceLength": 10,
- "stack": false,
- "steppedLine": false,
+ "pluginVersion": "10.4.3",
"targets": [
{
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
"expr": "sum by (method, host, path) (rate(nginx_ingress_controller_request_duration_seconds_count{\n ingress =~ \"$ingress\",\n status =~ \"[4-5].*\"\n}[5m])) / sum by (method, host, path) (rate(nginx_ingress_controller_request_duration_seconds_count{\n ingress =~ \"$ingress\",\n}[5m]))",
"interval": "",
"intervalFactor": 1,
@@ -498,89 +587,97 @@
"refId": "A"
}
],
- "thresholds": [],
- "timeRegions": [],
"title": "Response Error Rate by Method and Path",
- "tooltip": {
- "shared": true,
- "sort": 2,
- "value_type": "individual"
- },
- "type": "graph",
- "xaxis": {
- "mode": "time",
- "show": true,
- "values": []
- },
- "yaxes": [
- {
- "format": "percentunit",
- "logBase": 1,
- "show": true
- },
- {
- "format": "short",
- "logBase": 1,
- "show": true
- }
- ],
- "yaxis": {
- "align": false
- }
+ "type": "timeseries"
},
{
- "aliasColors": {},
- "bars": false,
- "dashLength": 10,
- "dashes": false,
"datasource": {
+ "type": "prometheus",
"uid": "${DS_PROMETHEUS}"
},
"description": "For each path observed, the sum of upstream request time",
"fieldConfig": {
"defaults": {
- "links": []
+ "color": {
+ "mode": "palette-classic"
+ },
+ "custom": {
+ "axisBorderShow": false,
+ "axisCenteredZero": false,
+ "axisColorMode": "text",
+ "axisLabel": "",
+ "axisPlacement": "auto",
+ "barAlignment": 0,
+ "drawStyle": "line",
+ "fillOpacity": 10,
+ "gradientMode": "none",
+ "hideFrom": {
+ "legend": false,
+ "tooltip": false,
+ "viz": false
+ },
+ "insertNulls": false,
+ "lineInterpolation": "linear",
+ "lineWidth": 1,
+ "pointSize": 5,
+ "scaleDistribution": {
+ "type": "linear"
+ },
+ "showPoints": "never",
+ "spanNulls": false,
+ "stacking": {
+ "group": "A",
+ "mode": "none"
+ },
+ "thresholdsStyle": {
+ "mode": "off"
+ }
+ },
+ "links": [],
+ "mappings": [],
+ "thresholds": {
+ "mode": "absolute",
+ "steps": [
+ {
+ "color": "green",
+ "value": null
+ },
+ {
+ "color": "red",
+ "value": 80
+ }
+ ]
+ },
+ "unit": "s"
},
"overrides": []
},
- "fill": 1,
- "fillGradient": 0,
"gridPos": {
"h": 8,
"w": 12,
"x": 12,
"y": 16
},
- "hiddenSeries": false,
"id": 102,
- "legend": {
- "alignAsTable": true,
- "avg": false,
- "current": false,
- "max": false,
- "min": false,
- "rightSide": true,
- "show": true,
- "total": false,
- "values": false
- },
- "lines": true,
- "linewidth": 1,
- "nullPointMode": "null",
"options": {
- "alertThreshold": true
+ "legend": {
+ "calcs": [],
+ "displayMode": "table",
+ "placement": "right",
+ "showLegend": true
+ },
+ "tooltip": {
+ "mode": "multi",
+ "sort": "desc"
+ }
},
- "percentage": false,
- "pluginVersion": "8.3.4",
- "pointradius": 2,
- "points": false,
- "renderer": "flot",
- "seriesOverrides": [],
- "spaceLength": 10,
- "stack": false,
- "steppedLine": false,
+ "pluginVersion": "10.4.3",
"targets": [
{
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
"expr": "sum by (method, host, path) (rate(nginx_ingress_controller_response_duration_seconds_sum{ingress =~ \"$ingress\"}[5m]))",
"interval": "",
"intervalFactor": 1,
@@ -588,88 +685,96 @@
"refId": "A"
}
],
- "thresholds": [],
- "timeRegions": [],
"title": "Upstream Response Time by Method and Path",
- "tooltip": {
- "shared": true,
- "sort": 2,
- "value_type": "individual"
- },
- "type": "graph",
- "xaxis": {
- "mode": "time",
- "show": true,
- "values": []
- },
- "yaxes": [
- {
- "format": "s",
- "logBase": 1,
- "show": true
- },
- {
- "format": "short",
- "logBase": 1,
- "show": true
- }
- ],
- "yaxis": {
- "align": false
- }
+ "type": "timeseries"
},
{
- "aliasColors": {},
- "bars": false,
- "dashLength": 10,
- "dashes": false,
"datasource": {
+ "type": "prometheus",
"uid": "${DS_PROMETHEUS}"
},
"fieldConfig": {
"defaults": {
- "links": []
+ "color": {
+ "mode": "palette-classic"
+ },
+ "custom": {
+ "axisBorderShow": false,
+ "axisCenteredZero": false,
+ "axisColorMode": "text",
+ "axisLabel": "",
+ "axisPlacement": "auto",
+ "barAlignment": 0,
+ "drawStyle": "line",
+ "fillOpacity": 10,
+ "gradientMode": "none",
+ "hideFrom": {
+ "legend": false,
+ "tooltip": false,
+ "viz": false
+ },
+ "insertNulls": false,
+ "lineInterpolation": "linear",
+ "lineWidth": 1,
+ "pointSize": 5,
+ "scaleDistribution": {
+ "type": "linear"
+ },
+ "showPoints": "never",
+ "spanNulls": false,
+ "stacking": {
+ "group": "A",
+ "mode": "none"
+ },
+ "thresholdsStyle": {
+ "mode": "off"
+ }
+ },
+ "links": [],
+ "mappings": [],
+ "thresholds": {
+ "mode": "absolute",
+ "steps": [
+ {
+ "color": "green",
+ "value": null
+ },
+ {
+ "color": "red",
+ "value": 80
+ }
+ ]
+ },
+ "unit": "reqps"
},
"overrides": []
},
- "fill": 1,
- "fillGradient": 0,
"gridPos": {
"h": 8,
"w": 12,
"x": 0,
"y": 24
},
- "hiddenSeries": false,
"id": 101,
- "legend": {
- "alignAsTable": true,
- "avg": false,
- "current": false,
- "max": false,
- "min": false,
- "rightSide": true,
- "show": true,
- "total": false,
- "values": false
- },
- "lines": true,
- "linewidth": 1,
- "nullPointMode": "null",
"options": {
- "alertThreshold": true
+ "legend": {
+ "calcs": [],
+ "displayMode": "table",
+ "placement": "right",
+ "showLegend": true
+ },
+ "tooltip": {
+ "mode": "multi",
+ "sort": "desc"
+ }
},
- "percentage": false,
- "pluginVersion": "8.3.4",
- "pointradius": 2,
- "points": false,
- "renderer": "flot",
- "seriesOverrides": [],
- "spaceLength": 10,
- "stack": false,
- "steppedLine": false,
+ "pluginVersion": "10.4.3",
"targets": [
{
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
"expr": " sum (\n rate(\n nginx_ingress_controller_request_duration_seconds_count{\n ingress =~ \"$ingress\",\n status =~\"[4-5].*\",\n }[5m]\n )\n ) by(method, host, path, status)\n",
"interval": "",
"intervalFactor": 1,
@@ -677,88 +782,96 @@
"refId": "A"
}
],
- "thresholds": [],
- "timeRegions": [],
"title": "Response Error Rate by Method and Path",
- "tooltip": {
- "shared": true,
- "sort": 2,
- "value_type": "individual"
- },
- "type": "graph",
- "xaxis": {
- "mode": "time",
- "show": true,
- "values": []
- },
- "yaxes": [
- {
- "format": "reqps",
- "logBase": 1,
- "show": true
- },
- {
- "format": "short",
- "logBase": 1,
- "show": true
- }
- ],
- "yaxis": {
- "align": false
- }
+ "type": "timeseries"
},
{
- "aliasColors": {},
- "bars": false,
- "dashLength": 10,
- "dashes": false,
"datasource": {
+ "type": "prometheus",
"uid": "${DS_PROMETHEUS}"
},
"fieldConfig": {
"defaults": {
- "links": []
+ "color": {
+ "mode": "palette-classic"
+ },
+ "custom": {
+ "axisBorderShow": false,
+ "axisCenteredZero": false,
+ "axisColorMode": "text",
+ "axisLabel": "",
+ "axisPlacement": "auto",
+ "barAlignment": 0,
+ "drawStyle": "line",
+ "fillOpacity": 10,
+ "gradientMode": "none",
+ "hideFrom": {
+ "legend": false,
+ "tooltip": false,
+ "viz": false
+ },
+ "insertNulls": false,
+ "lineInterpolation": "linear",
+ "lineWidth": 1,
+ "pointSize": 5,
+ "scaleDistribution": {
+ "type": "linear"
+ },
+ "showPoints": "never",
+ "spanNulls": false,
+ "stacking": {
+ "group": "A",
+ "mode": "none"
+ },
+ "thresholdsStyle": {
+ "mode": "off"
+ }
+ },
+ "links": [],
+ "mappings": [],
+ "thresholds": {
+ "mode": "absolute",
+ "steps": [
+ {
+ "color": "green",
+ "value": null
+ },
+ {
+ "color": "red",
+ "value": 80
+ }
+ ]
+ },
+ "unit": "decbytes"
},
"overrides": []
},
- "fill": 1,
- "fillGradient": 0,
"gridPos": {
"h": 8,
"w": 12,
"x": 12,
"y": 24
},
- "hiddenSeries": false,
"id": 99,
- "legend": {
- "alignAsTable": true,
- "avg": false,
- "current": false,
- "max": false,
- "min": false,
- "rightSide": true,
- "show": true,
- "total": false,
- "values": false
- },
- "lines": true,
- "linewidth": 1,
- "nullPointMode": "null",
"options": {
- "alertThreshold": true
+ "legend": {
+ "calcs": [],
+ "displayMode": "table",
+ "placement": "right",
+ "showLegend": true
+ },
+ "tooltip": {
+ "mode": "multi",
+ "sort": "desc"
+ }
},
- "percentage": false,
- "pluginVersion": "8.3.4",
- "pointradius": 2,
- "points": false,
- "renderer": "flot",
- "seriesOverrides": [],
- "spaceLength": 10,
- "stack": false,
- "steppedLine": false,
+ "pluginVersion": "10.4.3",
"targets": [
{
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
"expr": "sum (\n rate (\n nginx_ingress_controller_response_size_sum {\n ingress =~ \"$ingress\",\n }[5m]\n )\n) by (method, host, path) / sum (\n rate(\n nginx_ingress_controller_response_size_count {\n ingress =~ \"$ingress\",\n }[5m]\n )\n) by (method, host, path)\n",
"hide": false,
"instant": false,
@@ -768,92 +881,105 @@
"refId": "D"
},
{
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
"expr": " sum (rate(nginx_ingress_controller_response_size_bucket{\n ingress =~ \"$ingress\",\n }[5m])) by (le)\n",
"hide": true,
"legendFormat": "{{le}}",
"refId": "A"
}
],
- "thresholds": [],
- "timeRegions": [],
"title": "Average Response Size by Method and Path",
- "tooltip": {
- "shared": true,
- "sort": 2,
- "value_type": "individual"
- },
- "type": "graph",
- "xaxis": {
- "mode": "time",
- "show": true,
- "values": []
- },
- "yaxes": [
- {
- "format": "decbytes",
- "logBase": 1,
- "show": true
- },
- {
- "format": "short",
- "logBase": 1,
- "show": true
- }
- ],
- "yaxis": {
- "align": false
- }
+ "type": "timeseries"
},
{
- "aliasColors": {},
- "bars": false,
- "dashLength": 10,
- "dashes": false,
"datasource": {
+ "type": "prometheus",
"uid": "${DS_PROMETHEUS}"
},
"fieldConfig": {
"defaults": {
- "links": []
+ "color": {
+ "mode": "palette-classic"
+ },
+ "custom": {
+ "axisBorderShow": false,
+ "axisCenteredZero": false,
+ "axisColorMode": "text",
+ "axisLabel": "",
+ "axisPlacement": "auto",
+ "barAlignment": 0,
+ "drawStyle": "line",
+ "fillOpacity": 10,
+ "gradientMode": "none",
+ "hideFrom": {
+ "legend": false,
+ "tooltip": false,
+ "viz": false
+ },
+ "insertNulls": false,
+ "lineInterpolation": "linear",
+ "lineWidth": 1,
+ "pointSize": 5,
+ "scaleDistribution": {
+ "type": "linear"
+ },
+ "showPoints": "never",
+ "spanNulls": false,
+ "stacking": {
+ "group": "A",
+ "mode": "none"
+ },
+ "thresholdsStyle": {
+ "mode": "off"
+ }
+ },
+ "links": [],
+ "mappings": [],
+ "thresholds": {
+ "mode": "absolute",
+ "steps": [
+ {
+ "color": "green"
+ },
+ {
+ "color": "red",
+ "value": 80
+ }
+ ]
+ },
+ "unit": "s"
},
"overrides": []
},
- "fill": 1,
- "fillGradient": 0,
"gridPos": {
"h": 8,
"w": 12,
"x": 0,
"y": 32
},
- "hiddenSeries": false,
"id": 96,
- "legend": {
- "avg": false,
- "current": false,
- "max": false,
- "min": false,
- "show": true,
- "total": false,
- "values": false
- },
- "lines": true,
- "linewidth": 1,
- "nullPointMode": "null",
"options": {
- "alertThreshold": true
+ "legend": {
+ "calcs": [],
+ "displayMode": "list",
+ "placement": "bottom",
+ "showLegend": true
+ },
+ "tooltip": {
+ "mode": "multi",
+ "sort": "desc"
+ }
},
- "percentage": false,
- "pluginVersion": "8.3.4",
- "pointradius": 2,
- "points": false,
- "renderer": "flot",
- "seriesOverrides": [],
- "spaceLength": 10,
- "stack": false,
- "steppedLine": false,
+ "pluginVersion": "10.4.3",
"targets": [
{
+ "datasource": {
+ "type": "prometheus",
+ "uid": "${DS_PROMETHEUS}"
+ },
"expr": "sum (\n rate(\n nginx_ingress_controller_ingress_upstream_latency_seconds_sum {\n ingress =~ \"$ingress\",\n }[5m]\n)) / sum (\n rate(\n nginx_ingress_controller_ingress_upstream_latency_seconds_count {\n ingress =~ \"$ingress\",\n }[5m]\n )\n)\n",
"hide": false,
"instant": false,
@@ -863,40 +989,12 @@
"refId": "B"
}
],
- "thresholds": [],
- "timeRegions": [],
"title": "Upstream Service Latency",
- "tooltip": {
- "shared": true,
- "sort": 2,
- "value_type": "individual"
- },
- "type": "graph",
- "xaxis": {
- "mode": "time",
- "show": true,
- "values": []
- },
- "yaxes": [
- {
- "format": "s",
- "logBase": 1,
- "show": true
- },
- {
- "format": "short",
- "logBase": 1,
- "show": true
- }
- ],
- "yaxis": {
- "align": false
- }
+ "type": "timeseries"
}
],
"refresh": "30s",
- "schemaVersion": 34,
- "style": "dark",
+ "schemaVersion": 39,
"tags": [
"nginx"
],
@@ -906,7 +1004,7 @@
"current": {
"selected": false,
"text": "Prometheus",
- "value": "Prometheus"
+ "value": "${DS_PROMETHEUS}"
},
"hide": 0,
"includeAll": false,
@@ -924,6 +1022,7 @@
"allValue": ".*",
"current": {},
"datasource": {
+ "type": "prometheus",
"uid": "${DS_PROMETHEUS}"
},
"definition": "label_values(nginx_ingress_controller_requests, ingress) ",
From 987039c0146cd1a90b10dc0fb5b2489ab6015b2c Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Mon, 3 Jun 2024 09:32:19 +0200
Subject: [PATCH 078/283] Chart: Remove `controller.enableWorkerSerialReloads`.
(#11400)
---
charts/ingress-nginx/README.md | 1 -
charts/ingress-nginx/templates/controller-configmap.yaml | 1 -
charts/ingress-nginx/values.yaml | 2 --
3 files changed, 4 deletions(-)
diff --git a/charts/ingress-nginx/README.md b/charts/ingress-nginx/README.md
index 8171d4e1d..be8376935 100644
--- a/charts/ingress-nginx/README.md
+++ b/charts/ingress-nginx/README.md
@@ -301,7 +301,6 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
| controller.enableAnnotationValidations | bool | `false` | |
| controller.enableMimalloc | bool | `true` | Enable mimalloc as a drop-in replacement for malloc. # ref: https://github.com/microsoft/mimalloc # |
| controller.enableTopologyAwareRouting | bool | `false` | This configuration enables Topology Aware Routing feature, used together with service annotation service.kubernetes.io/topology-mode="auto" Defaults to false |
-| controller.enableWorkerSerialReloads | bool | `false` | This configuration defines if NGINX workers should reload serially instead of concurrently when multiple changes that require reloads are queued |
| controller.existingPsp | string | `""` | Use an existing PSP instead of creating one |
| controller.extraArgs | object | `{}` | Additional command line arguments to pass to Ingress-Nginx Controller E.g. to specify the default SSL certificate you can use |
| controller.extraContainers | list | `[]` | Additional containers to be added to the controller pod. See https://github.com/lemonldap-ng-controller/lemonldap-ng-controller as example. |
diff --git a/charts/ingress-nginx/templates/controller-configmap.yaml b/charts/ingress-nginx/templates/controller-configmap.yaml
index 50ae824a8..22080d115 100644
--- a/charts/ingress-nginx/templates/controller-configmap.yaml
+++ b/charts/ingress-nginx/templates/controller-configmap.yaml
@@ -14,7 +14,6 @@ metadata:
namespace: {{ include "ingress-nginx.namespace" . }}
data:
allow-snippet-annotations: "{{ .Values.controller.allowSnippetAnnotations }}"
- enable-serial-reloads: "{{ .Values.controller.enableWorkerSerialReloads }}"
{{- if .Values.controller.addHeaders }}
add-headers: {{ include "ingress-nginx.namespace" . }}/{{ include "ingress-nginx.fullname" . }}-custom-add-headers
{{- end }}
diff --git a/charts/ingress-nginx/values.yaml b/charts/ingress-nginx/values.yaml
index 37aa0f73b..8db58ff2a 100644
--- a/charts/ingress-nginx/values.yaml
+++ b/charts/ingress-nginx/values.yaml
@@ -93,8 +93,6 @@ controller:
# when users add those annotations.
# Global snippets in ConfigMap are still respected
allowSnippetAnnotations: false
- # -- This configuration defines if NGINX workers should reload serially instead of concurrently when multiple changes that require reloads are queued
- enableWorkerSerialReloads: false
# -- Required for use with CNI based kubernetes installations (such as ones set up by kubeadm),
# since CNI and hostport don't mix yet. Can be deprecated once https://github.com/kubernetes/kubernetes/issues/23920
# is merged
From 82c4d78a2f11790caec7a753da50c520cd892ba1 Mon Sep 17 00:00:00 2001
From: k8s-infra-cherrypick-robot
<90416843+k8s-infra-cherrypick-robot@users.noreply.github.com>
Date: Mon, 3 Jun 2024 00:34:38 -0700
Subject: [PATCH 079/283] Merge pull request #11277 from strongjz/chart-1.10.1
(#11415)
release chart 4.10.1
Co-authored-by: James Strong
---
charts/ingress-nginx/Chart.yaml | 18 ++++++++++--------
charts/ingress-nginx/README.md | 8 ++++----
.../changelog/helm-chart-4.10.1.md | 11 +++++++++++
charts/ingress-nginx/values.yaml | 6 +++---
4 files changed, 28 insertions(+), 15 deletions(-)
create mode 100644 charts/ingress-nginx/changelog/helm-chart-4.10.1.md
diff --git a/charts/ingress-nginx/Chart.yaml b/charts/ingress-nginx/Chart.yaml
index f9bb890f8..70344515e 100644
--- a/charts/ingress-nginx/Chart.yaml
+++ b/charts/ingress-nginx/Chart.yaml
@@ -1,9 +1,11 @@
annotations:
artifacthub.io/changes: |-
- - "Update Ingress-Nginx version controller-v1.10.0"
+ - "update post submit helm ci and clean up (#11221)"
+ - "refactor helm ci tests part I (#11188)"
+ - "Update Ingress-Nginx version controller-v1.10.1"
artifacthub.io/prerelease: "false"
apiVersion: v2
-appVersion: 1.10.0
+appVersion: 1.10.1
description: Ingress controller for Kubernetes using NGINX as a reverse proxy and
load balancer
home: https://github.com/kubernetes/ingress-nginx
@@ -13,11 +15,11 @@ keywords:
- nginx
kubeVersion: '>=1.21.0-0'
maintainers:
- - name: Gacko
- - name: rikatz
- - name: strongjz
- - name: tao12345666333
+- name: Gacko
+- name: rikatz
+- name: strongjz
+- name: tao12345666333
name: ingress-nginx
sources:
- - https://github.com/kubernetes/ingress-nginx
-version: 4.10.0
+- https://github.com/kubernetes/ingress-nginx
+version: 4.10.1
diff --git a/charts/ingress-nginx/README.md b/charts/ingress-nginx/README.md
index be8376935..2141ef44c 100644
--- a/charts/ingress-nginx/README.md
+++ b/charts/ingress-nginx/README.md
@@ -2,7 +2,7 @@
[ingress-nginx](https://github.com/kubernetes/ingress-nginx) Ingress controller for Kubernetes using NGINX as a reverse proxy and load balancer
- 
+ 
To use, add `ingressClassName: nginx` spec field or the `kubernetes.io/ingress.class: nginx` annotation to your Ingress resources.
@@ -319,8 +319,8 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
| controller.hostname | object | `{}` | Optionally customize the pod hostname. |
| controller.image.allowPrivilegeEscalation | bool | `false` | |
| controller.image.chroot | bool | `false` | |
-| controller.image.digest | string | `"sha256:42b3f0e5d0846876b1791cd3afeb5f1cbbe4259d6f35651dcc1b5c980925379c"` | |
-| controller.image.digestChroot | string | `"sha256:7eb46ff733429e0e46892903c7394aff149ac6d284d92b3946f3baf7ff26a096"` | |
+| controller.image.digest | string | `"sha256:e24f39d3eed6bcc239a56f20098878845f62baa34b9f2be2fd2c38ce9fb0f29e"` | |
+| controller.image.digestChroot | string | `"sha256:c155954116b397163c88afcb3252462771bd7867017e8a17623e83601bab7ac7"` | |
| controller.image.image | string | `"ingress-nginx/controller"` | |
| controller.image.pullPolicy | string | `"IfNotPresent"` | |
| controller.image.readOnlyRootFilesystem | bool | `false` | |
@@ -328,7 +328,7 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
| controller.image.runAsNonRoot | bool | `true` | |
| controller.image.runAsUser | int | `101` | |
| controller.image.seccompProfile.type | string | `"RuntimeDefault"` | |
-| controller.image.tag | string | `"v1.10.0"` | |
+| controller.image.tag | string | `"v1.10.1"` | |
| controller.ingressClass | string | `"nginx"` | For backwards compatibility with ingress.class annotation, use ingressClass. Algorithm is as follows, first ingressClassName is considered, if not present, controller looks for ingress.class annotation |
| controller.ingressClassByName | bool | `false` | Process IngressClass per name (additionally as per spec.controller). |
| controller.ingressClassResource | object | `{"aliases":[],"annotations":{},"controllerValue":"k8s.io/ingress-nginx","default":false,"enabled":true,"name":"nginx","parameters":{}}` | This section refers to the creation of the IngressClass resource. IngressClasses are immutable and cannot be changed after creation. We do not support namespaced IngressClasses, yet, so a ClusterRole and a ClusterRoleBinding is required. |
diff --git a/charts/ingress-nginx/changelog/helm-chart-4.10.1.md b/charts/ingress-nginx/changelog/helm-chart-4.10.1.md
new file mode 100644
index 000000000..3a28de00c
--- /dev/null
+++ b/charts/ingress-nginx/changelog/helm-chart-4.10.1.md
@@ -0,0 +1,11 @@
+# Changelog
+
+This file documents all notable changes to [ingress-nginx](https://github.com/kubernetes/ingress-nginx) Helm Chart. The release numbering uses [semantic versioning](http://semver.org).
+
+### 4.10.1
+
+* - "update post submit helm ci and clean up (#11221)"
+* - "refactor helm ci tests part I (#11188)"
+* - "Update Ingress-Nginx version controller-v1.10.1"
+
+**Full Changelog**: https://github.com/kubernetes/ingress-nginx/compare/helm-chart-4.10.0...helm-chart-4.10.1
diff --git a/charts/ingress-nginx/values.yaml b/charts/ingress-nginx/values.yaml
index 8db58ff2a..0fd0ccc7b 100644
--- a/charts/ingress-nginx/values.yaml
+++ b/charts/ingress-nginx/values.yaml
@@ -26,9 +26,9 @@ controller:
## for backwards compatibility consider setting the full image url via the repository value below
## use *either* current default registry/image or repository format or installing chart by providing the values.yaml will fail
## repository:
- tag: "v1.10.0"
- digest: sha256:42b3f0e5d0846876b1791cd3afeb5f1cbbe4259d6f35651dcc1b5c980925379c
- digestChroot: sha256:7eb46ff733429e0e46892903c7394aff149ac6d284d92b3946f3baf7ff26a096
+ tag: "v1.10.1"
+ digest: sha256:e24f39d3eed6bcc239a56f20098878845f62baa34b9f2be2fd2c38ce9fb0f29e
+ digestChroot: sha256:c155954116b397163c88afcb3252462771bd7867017e8a17623e83601bab7ac7
pullPolicy: IfNotPresent
runAsNonRoot: true
# www-data -> uid 101
From 0c17748c4412b5f6ac8532586ed41accb0471c74 Mon Sep 17 00:00:00 2001
From: Reddysekhar Gaduputi
Date: Mon, 3 Jun 2024 14:47:23 +0530
Subject: [PATCH 080/283] Chart: Make admission webhook patch job RBAC
configurable. (#11376)
* Add an option to skip rbac resources creation in helm chart for admission-webhooks (#11375)
Signed-off-by: Reddysekhar Gaduputi
* Add an option to skip rbac resources creation in helm chart update README (#11375)
Signed-off-by: Reddysekhar Gaduputi
* Add an option to skip serviceAccount resources creation in helm chart for admission-webhooks (#11375)
Signed-off-by: Reddysekhar Gaduputi
* Add helm chart tests for admission-webhooks (#11375)
Signed-off-by: Reddysekhar Gaduputi
* Chart make admission webhook patch job RBAC configurable (#11375)
Signed-off-by: Reddysekhar Gaduputi
* Update charts/ingress-nginx/tests/admission-webhooks/job-patch/clusterrole_test.yaml
Co-authored-by: Marco Ebert
* Update charts/ingress-nginx/tests/admission-webhooks/job-patch/clusterrolebinding_test.yaml
Co-authored-by: Marco Ebert
* Update charts/ingress-nginx/tests/admission-webhooks/job-patch/role_test.yaml
Co-authored-by: Marco Ebert
* Update charts/ingress-nginx/tests/admission-webhooks/job-patch/rolebinding_test.yaml
Co-authored-by: Marco Ebert
* Update charts/ingress-nginx/tests/admission-webhooks/job-patch/serviceaccount_test.yaml
Co-authored-by: Marco Ebert
---------
Signed-off-by: Reddysekhar Gaduputi
Co-authored-by: Marco Ebert
---
charts/ingress-nginx/README.md | 6 +++
charts/ingress-nginx/templates/_helpers.tpl | 11 +++++
.../job-patch/clusterrole.yaml | 2 +-
.../job-patch/clusterrolebinding.yaml | 4 +-
.../job-patch/job-createSecret.yaml | 2 +-
.../job-patch/job-patchWebhook.yaml | 2 +-
.../admission-webhooks/job-patch/role.yaml | 2 +-
.../job-patch/rolebinding.yaml | 4 +-
.../job-patch/serviceaccount.yaml | 5 +-
.../job-patch/clusterrole_test.yaml | 11 +++++
.../job-patch/clusterrolebinding_test.yaml | 11 +++++
.../job-patch/role_test.yaml | 11 +++++
.../job-patch/rolebinding_test.yaml | 11 +++++
.../job-patch/serviceaccount_test.yaml | 47 +++++++++++++++++++
charts/ingress-nginx/values.yaml | 12 +++++
15 files changed, 131 insertions(+), 10 deletions(-)
create mode 100644 charts/ingress-nginx/tests/admission-webhooks/job-patch/clusterrole_test.yaml
create mode 100644 charts/ingress-nginx/tests/admission-webhooks/job-patch/clusterrolebinding_test.yaml
create mode 100644 charts/ingress-nginx/tests/admission-webhooks/job-patch/role_test.yaml
create mode 100644 charts/ingress-nginx/tests/admission-webhooks/job-patch/rolebinding_test.yaml
create mode 100644 charts/ingress-nginx/tests/admission-webhooks/job-patch/serviceaccount_test.yaml
diff --git a/charts/ingress-nginx/README.md b/charts/ingress-nginx/README.md
index 2141ef44c..d73a50114 100644
--- a/charts/ingress-nginx/README.md
+++ b/charts/ingress-nginx/README.md
@@ -263,7 +263,13 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
| controller.admissionWebhooks.patch.nodeSelector."kubernetes.io/os" | string | `"linux"` | |
| controller.admissionWebhooks.patch.podAnnotations | object | `{}` | |
| controller.admissionWebhooks.patch.priorityClassName | string | `""` | Provide a priority class name to the webhook patching job # |
+| controller.admissionWebhooks.patch.rbac | object | `{"create":true}` | Admission webhook patch job RBAC |
+| controller.admissionWebhooks.patch.rbac.create | bool | `true` | Create RBAC or not |
| controller.admissionWebhooks.patch.securityContext | object | `{}` | Security context for secret creation & webhook patch pods |
+| controller.admissionWebhooks.patch.serviceAccount | object | `{"automountServiceAccountToken":true,"create":true,"name":""}` | Admission webhook patch job service account |
+| controller.admissionWebhooks.patch.serviceAccount.automountServiceAccountToken | bool | `true` | Auto-mount service account token or not |
+| controller.admissionWebhooks.patch.serviceAccount.create | bool | `true` | Create a service account or not |
+| controller.admissionWebhooks.patch.serviceAccount.name | string | `""` | Custom service account name |
| controller.admissionWebhooks.patch.tolerations | list | `[]` | |
| controller.admissionWebhooks.patchWebhookJob.name | string | `"patch"` | |
| controller.admissionWebhooks.patchWebhookJob.resources | object | `{}` | |
diff --git a/charts/ingress-nginx/templates/_helpers.tpl b/charts/ingress-nginx/templates/_helpers.tpl
index 9ac2dc569..0c6a3e207 100644
--- a/charts/ingress-nginx/templates/_helpers.tpl
+++ b/charts/ingress-nginx/templates/_helpers.tpl
@@ -167,6 +167,17 @@ We truncate at 63 chars because some Kubernetes name fields are limited to this
{{- printf "%s-%s" (include "ingress-nginx.fullname" .) .Values.controller.admissionWebhooks.name | trunc 63 | trimSuffix "-" -}}
{{- end -}}
+{{/*
+Create the name of the admission webhook patch job service account to use
+*/}}
+{{- define "ingress-nginx.admissionWebhooks.patch.serviceAccountName" -}}
+{{- if .Values.controller.admissionWebhooks.patch.serviceAccount.create -}}
+ {{ default (include "ingress-nginx.admissionWebhooks.fullname" .) .Values.controller.admissionWebhooks.patch.serviceAccount.name }}
+{{- else -}}
+ {{ default "default" .Values.controller.admissionWebhooks.patch.serviceAccount.name }}
+{{- end -}}
+{{- end -}}
+
{{/*
Create a default fully qualified admission webhook secret creation job name.
We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec).
diff --git a/charts/ingress-nginx/templates/admission-webhooks/job-patch/clusterrole.yaml b/charts/ingress-nginx/templates/admission-webhooks/job-patch/clusterrole.yaml
index 8271dc404..a21848201 100644
--- a/charts/ingress-nginx/templates/admission-webhooks/job-patch/clusterrole.yaml
+++ b/charts/ingress-nginx/templates/admission-webhooks/job-patch/clusterrole.yaml
@@ -1,4 +1,4 @@
-{{- if and .Values.controller.admissionWebhooks.enabled .Values.controller.admissionWebhooks.patch.enabled (not .Values.controller.admissionWebhooks.certManager.enabled) -}}
+{{- if and .Values.controller.admissionWebhooks.enabled .Values.controller.admissionWebhooks.patch.enabled .Values.controller.admissionWebhooks.patch.rbac.create (not .Values.controller.admissionWebhooks.certManager.enabled) -}}
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
diff --git a/charts/ingress-nginx/templates/admission-webhooks/job-patch/clusterrolebinding.yaml b/charts/ingress-nginx/templates/admission-webhooks/job-patch/clusterrolebinding.yaml
index 3fe842d1f..b89388433 100644
--- a/charts/ingress-nginx/templates/admission-webhooks/job-patch/clusterrolebinding.yaml
+++ b/charts/ingress-nginx/templates/admission-webhooks/job-patch/clusterrolebinding.yaml
@@ -1,4 +1,4 @@
-{{- if and .Values.controller.admissionWebhooks.enabled .Values.controller.admissionWebhooks.patch.enabled (not .Values.controller.admissionWebhooks.certManager.enabled) -}}
+{{- if and .Values.controller.admissionWebhooks.enabled .Values.controller.admissionWebhooks.patch.enabled .Values.controller.admissionWebhooks.patch.rbac.create (not .Values.controller.admissionWebhooks.certManager.enabled) -}}
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
@@ -18,6 +18,6 @@ roleRef:
name: {{ include "ingress-nginx.admissionWebhooks.fullname" . }}
subjects:
- kind: ServiceAccount
- name: {{ include "ingress-nginx.admissionWebhooks.fullname" . }}
+ name: {{ include "ingress-nginx.admissionWebhooks.patch.serviceAccountName" . }}
namespace: {{ include "ingress-nginx.namespace" . }}
{{- end }}
diff --git a/charts/ingress-nginx/templates/admission-webhooks/job-patch/job-createSecret.yaml b/charts/ingress-nginx/templates/admission-webhooks/job-patch/job-createSecret.yaml
index 0a21f856a..176616467 100644
--- a/charts/ingress-nginx/templates/admission-webhooks/job-patch/job-createSecret.yaml
+++ b/charts/ingress-nginx/templates/admission-webhooks/job-patch/job-createSecret.yaml
@@ -66,7 +66,7 @@ spec:
resources: {{ toYaml .Values.controller.admissionWebhooks.createSecretJob.resources | nindent 12 }}
{{- end }}
restartPolicy: OnFailure
- serviceAccountName: {{ include "ingress-nginx.admissionWebhooks.fullname" . }}
+ serviceAccountName: {{ include "ingress-nginx.admissionWebhooks.patch.serviceAccountName" . }}
{{- if .Values.controller.admissionWebhooks.patch.nodeSelector }}
nodeSelector: {{ toYaml .Values.controller.admissionWebhooks.patch.nodeSelector | nindent 8 }}
{{- end }}
diff --git a/charts/ingress-nginx/templates/admission-webhooks/job-patch/job-patchWebhook.yaml b/charts/ingress-nginx/templates/admission-webhooks/job-patch/job-patchWebhook.yaml
index ce9985aa5..f7d44a24d 100644
--- a/charts/ingress-nginx/templates/admission-webhooks/job-patch/job-patchWebhook.yaml
+++ b/charts/ingress-nginx/templates/admission-webhooks/job-patch/job-patchWebhook.yaml
@@ -68,7 +68,7 @@ spec:
resources: {{ toYaml .Values.controller.admissionWebhooks.patchWebhookJob.resources | nindent 12 }}
{{- end }}
restartPolicy: OnFailure
- serviceAccountName: {{ include "ingress-nginx.admissionWebhooks.fullname" . }}
+ serviceAccountName: {{ include "ingress-nginx.admissionWebhooks.patch.serviceAccountName" . }}
{{- if .Values.controller.admissionWebhooks.patch.nodeSelector }}
nodeSelector: {{ toYaml .Values.controller.admissionWebhooks.patch.nodeSelector | nindent 8 }}
{{- end }}
diff --git a/charts/ingress-nginx/templates/admission-webhooks/job-patch/role.yaml b/charts/ingress-nginx/templates/admission-webhooks/job-patch/role.yaml
index 5b05d9b00..c4b23aa08 100644
--- a/charts/ingress-nginx/templates/admission-webhooks/job-patch/role.yaml
+++ b/charts/ingress-nginx/templates/admission-webhooks/job-patch/role.yaml
@@ -1,4 +1,4 @@
-{{- if and .Values.controller.admissionWebhooks.enabled .Values.controller.admissionWebhooks.patch.enabled (not .Values.controller.admissionWebhooks.certManager.enabled) -}}
+{{- if and .Values.controller.admissionWebhooks.enabled .Values.controller.admissionWebhooks.patch.enabled .Values.controller.admissionWebhooks.patch.rbac.create (not .Values.controller.admissionWebhooks.certManager.enabled) -}}
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
diff --git a/charts/ingress-nginx/templates/admission-webhooks/job-patch/rolebinding.yaml b/charts/ingress-nginx/templates/admission-webhooks/job-patch/rolebinding.yaml
index 48a175566..425e8d821 100644
--- a/charts/ingress-nginx/templates/admission-webhooks/job-patch/rolebinding.yaml
+++ b/charts/ingress-nginx/templates/admission-webhooks/job-patch/rolebinding.yaml
@@ -1,4 +1,4 @@
-{{- if and .Values.controller.admissionWebhooks.enabled .Values.controller.admissionWebhooks.patch.enabled (not .Values.controller.admissionWebhooks.certManager.enabled) -}}
+{{- if and .Values.controller.admissionWebhooks.enabled .Values.controller.admissionWebhooks.patch.enabled .Values.controller.admissionWebhooks.patch.rbac.create (not .Values.controller.admissionWebhooks.certManager.enabled) -}}
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
@@ -19,6 +19,6 @@ roleRef:
name: {{ include "ingress-nginx.admissionWebhooks.fullname" . }}
subjects:
- kind: ServiceAccount
- name: {{ include "ingress-nginx.admissionWebhooks.fullname" . }}
+ name: {{ include "ingress-nginx.admissionWebhooks.patch.serviceAccountName" . }}
namespace: {{ include "ingress-nginx.namespace" . }}
{{- end }}
diff --git a/charts/ingress-nginx/templates/admission-webhooks/job-patch/serviceaccount.yaml b/charts/ingress-nginx/templates/admission-webhooks/job-patch/serviceaccount.yaml
index 91bbf22bb..52f94dcce 100644
--- a/charts/ingress-nginx/templates/admission-webhooks/job-patch/serviceaccount.yaml
+++ b/charts/ingress-nginx/templates/admission-webhooks/job-patch/serviceaccount.yaml
@@ -1,8 +1,8 @@
-{{- if and .Values.controller.admissionWebhooks.enabled .Values.controller.admissionWebhooks.patch.enabled (not .Values.controller.admissionWebhooks.certManager.enabled) -}}
+{{- if and .Values.controller.admissionWebhooks.enabled .Values.controller.admissionWebhooks.patch.enabled .Values.controller.admissionWebhooks.patch.serviceAccount.create (not .Values.controller.admissionWebhooks.certManager.enabled) -}}
apiVersion: v1
kind: ServiceAccount
metadata:
- name: {{ include "ingress-nginx.admissionWebhooks.fullname" . }}
+ name: {{ include "ingress-nginx.admissionWebhooks.patch.serviceAccountName" . }}
namespace: {{ include "ingress-nginx.namespace" . }}
annotations:
"helm.sh/hook": pre-install,pre-upgrade,post-install,post-upgrade
@@ -13,4 +13,5 @@ metadata:
{{- with .Values.controller.admissionWebhooks.patch.labels }}
{{- toYaml . | nindent 4 }}
{{- end }}
+automountServiceAccountToken: {{ .Values.controller.admissionWebhooks.patch.serviceAccount.automountServiceAccountToken }}
{{- end }}
diff --git a/charts/ingress-nginx/tests/admission-webhooks/job-patch/clusterrole_test.yaml b/charts/ingress-nginx/tests/admission-webhooks/job-patch/clusterrole_test.yaml
new file mode 100644
index 000000000..d7a8b8852
--- /dev/null
+++ b/charts/ingress-nginx/tests/admission-webhooks/job-patch/clusterrole_test.yaml
@@ -0,0 +1,11 @@
+suite: Admission Webhooks > Patch Job > ClusterRole
+templates:
+ - admission-webhooks/job-patch/clusterrole.yaml
+
+tests:
+ - it: should not create a ClusterRole if `controller.admissionWebhooks.patch.rbac.create` is false
+ set:
+ controller.admissionWebhooks.patch.rbac.create: false
+ asserts:
+ - hasDocuments:
+ count: 0
diff --git a/charts/ingress-nginx/tests/admission-webhooks/job-patch/clusterrolebinding_test.yaml b/charts/ingress-nginx/tests/admission-webhooks/job-patch/clusterrolebinding_test.yaml
new file mode 100644
index 000000000..d7c3266d2
--- /dev/null
+++ b/charts/ingress-nginx/tests/admission-webhooks/job-patch/clusterrolebinding_test.yaml
@@ -0,0 +1,11 @@
+suite: Admission Webhooks > Patch Job > ClusterRoleBinding
+templates:
+ - admission-webhooks/job-patch/clusterrolebinding.yaml
+
+tests:
+ - it: should not create a ClusterRoleBinding if `controller.admissionWebhooks.patch.rbac.create` is false
+ set:
+ controller.admissionWebhooks.patch.rbac.create: false
+ asserts:
+ - hasDocuments:
+ count: 0
diff --git a/charts/ingress-nginx/tests/admission-webhooks/job-patch/role_test.yaml b/charts/ingress-nginx/tests/admission-webhooks/job-patch/role_test.yaml
new file mode 100644
index 000000000..a236f3d7b
--- /dev/null
+++ b/charts/ingress-nginx/tests/admission-webhooks/job-patch/role_test.yaml
@@ -0,0 +1,11 @@
+suite: Admission Webhooks > Patch Job > Role
+templates:
+ - admission-webhooks/job-patch/role.yaml
+
+tests:
+ - it: should not create a Role if `controller.admissionWebhooks.patch.rbac.create` is false
+ set:
+ controller.admissionWebhooks.patch.rbac.create: false
+ asserts:
+ - hasDocuments:
+ count: 0
diff --git a/charts/ingress-nginx/tests/admission-webhooks/job-patch/rolebinding_test.yaml b/charts/ingress-nginx/tests/admission-webhooks/job-patch/rolebinding_test.yaml
new file mode 100644
index 000000000..74abaa163
--- /dev/null
+++ b/charts/ingress-nginx/tests/admission-webhooks/job-patch/rolebinding_test.yaml
@@ -0,0 +1,11 @@
+suite: Admission Webhooks > Patch Job > RoleBinding
+templates:
+ - admission-webhooks/job-patch/rolebinding.yaml
+
+tests:
+ - it: should not create a RoleBinding if `controller.admissionWebhooks.patch.rbac.create` is false
+ set:
+ controller.admissionWebhooks.patch.rbac.create: false
+ asserts:
+ - hasDocuments:
+ count: 0
diff --git a/charts/ingress-nginx/tests/admission-webhooks/job-patch/serviceaccount_test.yaml b/charts/ingress-nginx/tests/admission-webhooks/job-patch/serviceaccount_test.yaml
new file mode 100644
index 000000000..7c30d1e66
--- /dev/null
+++ b/charts/ingress-nginx/tests/admission-webhooks/job-patch/serviceaccount_test.yaml
@@ -0,0 +1,47 @@
+suite: Admission Webhooks > Patch Job > ServiceAccount
+templates:
+ - admission-webhooks/job-patch/serviceaccount.yaml
+
+tests:
+ - it: should not create a ServiceAccount if `controller.admissionWebhooks.patch.serviceAccount.create` is false
+ set:
+ controller.admissionWebhooks.patch.serviceAccount.create: false
+ asserts:
+ - hasDocuments:
+ count: 0
+
+ - it: should create a ServiceAccount if `controller.admissionWebhooks.patch.serviceAccount.create` is true
+ set:
+ controller.admissionWebhooks.patch.serviceAccount.create: true
+ asserts:
+ - hasDocuments:
+ count: 1
+ - isKind:
+ of: ServiceAccount
+ - equal:
+ path: metadata.name
+ value: ingress-nginx-admission
+
+ - it: should create a ServiceAccount with specified name if `controller.admissionWebhooks.patch.serviceAccount.name` is set
+ set:
+ controller.admissionWebhooks.patch.serviceAccount.name: ingress-nginx-admission-test-sa
+ asserts:
+ - hasDocuments:
+ count: 1
+ - isKind:
+ of: ServiceAccount
+ - equal:
+ path: metadata.name
+ value: ingress-nginx-admission-test-sa
+
+ - it: should create a ServiceAccount with token auto-mounting disabled if `controller.admissionWebhooks.patch.serviceAccount.automountServiceAccountToken` is false
+ set:
+ controller.admissionWebhooks.patch.serviceAccount.automountServiceAccountToken: false
+ asserts:
+ - hasDocuments:
+ count: 1
+ - isKind:
+ of: ServiceAccount
+ - equal:
+ path: automountServiceAccountToken
+ value: false
diff --git a/charts/ingress-nginx/values.yaml b/charts/ingress-nginx/values.yaml
index 0fd0ccc7b..f09edbe74 100644
--- a/charts/ingress-nginx/values.yaml
+++ b/charts/ingress-nginx/values.yaml
@@ -822,6 +822,18 @@ controller:
labels: {}
# -- Security context for secret creation & webhook patch pods
securityContext: {}
+ # -- Admission webhook patch job RBAC
+ rbac:
+ # -- Create RBAC or not
+ create: true
+ # -- Admission webhook patch job service account
+ serviceAccount:
+ # -- Create a service account or not
+ create: true
+ # -- Custom service account name
+ name: ""
+ # -- Auto-mount service account token or not
+ automountServiceAccountToken: true
# Use certmanager to generate webhook certs
certManager:
enabled: false
From 90ef45852ca4bf0db53c508c098ff265f2f9fb03 Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Mon, 3 Jun 2024 12:12:58 +0200
Subject: [PATCH 081/283] Chart: Fix `IngressClass` annotations. (#11416)
---
.../controller-ingressclass-aliases.yaml | 3 +++
.../templates/controller-ingressclass.yaml | 4 +++-
.../controller-ingressclass-aliases_test.yaml | 18 ++++++++++++++++++
.../tests/controller-ingressclass_test.yaml | 16 ++++++++++++++++
4 files changed, 40 insertions(+), 1 deletion(-)
diff --git a/charts/ingress-nginx/templates/controller-ingressclass-aliases.yaml b/charts/ingress-nginx/templates/controller-ingressclass-aliases.yaml
index b4b20690e..ffe22310c 100644
--- a/charts/ingress-nginx/templates/controller-ingressclass-aliases.yaml
+++ b/charts/ingress-nginx/templates/controller-ingressclass-aliases.yaml
@@ -11,6 +11,9 @@ metadata:
{{- toYaml . | nindent 4 }}
{{- end }}
name: {{ . }}
+ {{- if $.Values.controller.ingressClassResource.annotations }}
+ annotations: {{ toYaml $.Values.controller.ingressClassResource.annotations | nindent 4 }}
+ {{- end }}
spec:
controller: {{ $.Values.controller.ingressClassResource.controllerValue }}
{{- with $.Values.controller.ingressClassResource.parameters }}
diff --git a/charts/ingress-nginx/templates/controller-ingressclass.yaml b/charts/ingress-nginx/templates/controller-ingressclass.yaml
index 18cace48c..98479a529 100644
--- a/charts/ingress-nginx/templates/controller-ingressclass.yaml
+++ b/charts/ingress-nginx/templates/controller-ingressclass.yaml
@@ -9,13 +9,15 @@ metadata:
{{- toYaml . | nindent 4 }}
{{- end }}
name: {{ .Values.controller.ingressClassResource.name }}
+ {{- if or .Values.controller.ingressClassResource.default .Values.controller.ingressClassResource.annotations }}
annotations:
{{- if .Values.controller.ingressClassResource.default }}
ingressclass.kubernetes.io/is-default-class: "true"
{{- end }}
{{- if .Values.controller.ingressClassResource.annotations }}
- {{- toYaml .Values.controller.ingressClassResource.annotations | nindent 4 }}
+ {{- toYaml .Values.controller.ingressClassResource.annotations | nindent 4 }}
{{- end }}
+ {{- end }}
spec:
controller: {{ .Values.controller.ingressClassResource.controllerValue }}
{{- with .Values.controller.ingressClassResource.parameters }}
diff --git a/charts/ingress-nginx/tests/controller-ingressclass-aliases_test.yaml b/charts/ingress-nginx/tests/controller-ingressclass-aliases_test.yaml
index ef0780d9c..9a4a576b7 100644
--- a/charts/ingress-nginx/tests/controller-ingressclass-aliases_test.yaml
+++ b/charts/ingress-nginx/tests/controller-ingressclass-aliases_test.yaml
@@ -37,6 +37,24 @@ tests:
- notExists:
path: metadata.annotations["ingressclass.kubernetes.io/is-default-class"]
+ - it: should create an IngressClass alias with annotations if `controller.ingressClassResource.annotations` is set
+ set:
+ controller.ingressClassResource.aliases:
+ - nginx-alias
+ controller.ingressClassResource.annotations:
+ my-fancy-annotation: has-a-value
+ asserts:
+ - hasDocuments:
+ count: 1
+ - isKind:
+ of: IngressClass
+ - equal:
+ path: metadata.name
+ value: nginx-alias
+ - equal:
+ path: metadata.annotations.my-fancy-annotation
+ value: has-a-value
+
- it: should create an IngressClass alias with controller "k8s.io/ingress-nginx-internal" if `controller.ingressClassResource.controllerValue` is "k8s.io/ingress-nginx-internal"
set:
controller.ingressClassResource.aliases:
diff --git a/charts/ingress-nginx/tests/controller-ingressclass_test.yaml b/charts/ingress-nginx/tests/controller-ingressclass_test.yaml
index f766f922e..b3384af32 100644
--- a/charts/ingress-nginx/tests/controller-ingressclass_test.yaml
+++ b/charts/ingress-nginx/tests/controller-ingressclass_test.yaml
@@ -40,6 +40,22 @@ tests:
path: metadata.annotations["ingressclass.kubernetes.io/is-default-class"]
value: "true"
+ - it: should create an IngressClass with annotations if `controller.ingressClassResource.annotations` is set
+ set:
+ controller.ingressClassResource.annotations:
+ my-fancy-annotation: has-a-value
+ asserts:
+ - hasDocuments:
+ count: 1
+ - isKind:
+ of: IngressClass
+ - equal:
+ path: metadata.name
+ value: nginx
+ - equal:
+ path: metadata.annotations.my-fancy-annotation
+ value: has-a-value
+
- it: should create an IngressClass with controller "k8s.io/ingress-nginx-internal" if `controller.ingressClassResource.controllerValue` is "k8s.io/ingress-nginx-internal"
set:
controller.ingressClassResource.controllerValue: k8s.io/ingress-nginx-internal
From 1ed04abc1d848f79582f7a3981cd6095f4ff8cbd Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 3 Jun 2024 05:07:02 -0700
Subject: [PATCH 082/283] Bump google.golang.org/grpc from 1.63.2 to 1.64.0
(#11417)
Bumps [google.golang.org/grpc](https://github.com/grpc/grpc-go) from 1.63.2 to 1.64.0.
- [Release notes](https://github.com/grpc/grpc-go/releases)
- [Commits](https://github.com/grpc/grpc-go/compare/v1.63.2...v1.64.0)
---
updated-dependencies:
- dependency-name: google.golang.org/grpc
dependency-type: direct:production
update-type: version-update:semver-minor
...
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 2 +-
go.sum | 4 ++--
2 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/go.mod b/go.mod
index cf17df231..55375a635 100644
--- a/go.mod
+++ b/go.mod
@@ -29,7 +29,7 @@ require (
github.com/zakjan/cert-chain-resolver v0.0.0-20221221105603-fcedb00c5b30
golang.org/x/crypto v0.23.0
golang.org/x/exp v0.0.0-20240416160154-fe59bbe5cc7f
- google.golang.org/grpc v1.63.2
+ google.golang.org/grpc v1.64.0
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab
gopkg.in/go-playground/pool.v3 v3.1.1
gopkg.in/mcuadros/go-syslog.v2 v2.3.0
diff --git a/go.sum b/go.sum
index eb6fcc026..04e7769ed 100644
--- a/go.sum
+++ b/go.sum
@@ -1846,8 +1846,8 @@ google.golang.org/grpc v1.52.0/go.mod h1:pu6fVzoFb+NBYNAvQL08ic+lvB2IojljRYuun5v
google.golang.org/grpc v1.53.0/go.mod h1:OnIrk0ipVdj4N5d9IUoFUx72/VlD7+jUsHwZgwSMQpw=
google.golang.org/grpc v1.54.0/go.mod h1:PUSEXI6iWghWaB6lXM4knEgpJNu2qUcKfDtNci3EC2g=
google.golang.org/grpc v1.55.0/go.mod h1:iYEXKGkEBhg1PjZQvoYEVPTDkHo1/bjTnfwTeGONTY8=
-google.golang.org/grpc v1.63.2 h1:MUeiw1B2maTVZthpU5xvASfTh3LDbxHd6IJ6QQVU+xM=
-google.golang.org/grpc v1.63.2/go.mod h1:WAX/8DgncnokcFUldAxq7GeB5DXHDbMF+lLvDomNkRA=
+google.golang.org/grpc v1.64.0 h1:KH3VH9y/MgNQg1dE7b3XfVK0GsPSIzJwdF617gUSbvY=
+google.golang.org/grpc v1.64.0/go.mod h1:oxjF8E3FBnjp+/gVFYdWacaLDx9na1aqy9oovLpxQYg=
google.golang.org/grpc/cmd/protoc-gen-go-grpc v1.1.0/go.mod h1:6Kw0yEErY5E/yWrBtf03jp27GLLJujG4z/JK95pnjjw=
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab h1:tg8hvIl5RmFBuXlcJMuL0h4Psh1gx5Q5xEMwzBZIzWA=
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab/go.mod h1:liVNnGuZDITxuksuZ+BBvdy7FcJfeNk+efF9qgqNUmc=
From 285cc433da959f46ec89e473057b93054ecc4e08 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 3 Jun 2024 05:10:38 -0700
Subject: [PATCH 083/283] Bump github.com/onsi/ginkgo/v2 from 2.17.2 to 2.19.0
(#11418)
Bumps [github.com/onsi/ginkgo/v2](https://github.com/onsi/ginkgo) from 2.17.2 to 2.19.0.
- [Release notes](https://github.com/onsi/ginkgo/releases)
- [Changelog](https://github.com/onsi/ginkgo/blob/master/CHANGELOG.md)
- [Commits](https://github.com/onsi/ginkgo/compare/v2.17.2...v2.19.0)
---
updated-dependencies:
- dependency-name: github.com/onsi/ginkgo/v2
dependency-type: direct:production
update-type: version-update:semver-minor
...
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 6 +++---
go.sum | 12 ++++++------
2 files changed, 9 insertions(+), 9 deletions(-)
diff --git a/go.mod b/go.mod
index 55375a635..86a32fc6b 100644
--- a/go.mod
+++ b/go.mod
@@ -16,7 +16,7 @@ require (
github.com/mitchellh/mapstructure v1.5.0
github.com/moul/pb v0.0.0-20220425114252-bca18df4138c
github.com/ncabatoff/process-exporter v0.7.11
- github.com/onsi/ginkgo/v2 v2.17.2
+ github.com/onsi/ginkgo/v2 v2.19.0
github.com/opencontainers/runc v1.1.12
github.com/pmezard/go-difflib v1.0.0
github.com/prometheus/client_golang v1.19.1
@@ -109,14 +109,14 @@ require (
go.starlark.net v0.0.0-20240123142251-f86470692795 // indirect
go.uber.org/zap v1.27.0 // indirect
golang.org/x/mod v0.17.0 // indirect
- golang.org/x/net v0.24.0 // indirect
+ golang.org/x/net v0.25.0 // indirect
golang.org/x/oauth2 v0.20.0 // indirect
golang.org/x/sync v0.7.0 // indirect
golang.org/x/sys v0.20.0 // indirect
golang.org/x/term v0.20.0 // indirect
golang.org/x/text v0.15.0 // indirect
golang.org/x/time v0.5.0 // indirect
- golang.org/x/tools v0.20.0 // indirect
+ golang.org/x/tools v0.21.0 // indirect
google.golang.org/genproto/googleapis/rpc v0.0.0-20240429193739-8cf5692501f6 // indirect
google.golang.org/protobuf v1.34.0 // indirect
gopkg.in/evanphx/json-patch.v5 v5.9.0 // indirect
diff --git a/go.sum b/go.sum
index 04e7769ed..e723adabe 100644
--- a/go.sum
+++ b/go.sum
@@ -986,8 +986,8 @@ github.com/onsi/ginkgo v1.6.0/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+W
github.com/onsi/ginkgo v1.12.1/go.mod h1:zj2OWP4+oCPe1qIXoGWkgMRwljMUYCdkwsT2108oapk=
github.com/onsi/ginkgo v1.16.5 h1:8xi0RTUf59SOSfEtZMvwTvXYMzG4gV23XVHOZiXNtnE=
github.com/onsi/ginkgo v1.16.5/go.mod h1:+E8gABHa3K6zRBolWtd+ROzc/U5bkGt0FwiG042wbpU=
-github.com/onsi/ginkgo/v2 v2.17.2 h1:7eMhcy3GimbsA3hEnVKdw/PQM9XN9krpKVXsZdph0/g=
-github.com/onsi/ginkgo/v2 v2.17.2/go.mod h1:nP2DPOQoNsQmsVyv5rDA8JkXQoCs6goXIvr/PRJ1eCc=
+github.com/onsi/ginkgo/v2 v2.19.0 h1:9Cnnf7UHo57Hy3k6/m5k3dRfGTMXGvxhHFvkDTCTpvA=
+github.com/onsi/ginkgo/v2 v2.19.0/go.mod h1:rlwLi9PilAFJ8jCg9UE1QP6VBpd6/xj3SRC0d6TU0To=
github.com/onsi/gomega v1.7.1/go.mod h1:XdKZgCCFLUoM/7CFJVPcG8C1xQ1AJ0vpAezJrB7JYyY=
github.com/onsi/gomega v1.10.1/go.mod h1:iN09h71vgCQne3DLsj+A5owkum+a2tYe+TOCB1ybHNo=
github.com/onsi/gomega v1.33.1 h1:dsYjIxxSR755MDmKVsaFQTE22ChNBcuuTWgkUDSubOk=
@@ -1298,8 +1298,8 @@ golang.org/x/net v0.17.0/go.mod h1:NxSsAGuq816PNPmqtQdLE42eU2Fs7NoRIZrHJAlaCOE=
golang.org/x/net v0.20.0/go.mod h1:z8BVo6PvndSri0LbOE3hAn0apkU+1YvI6E70E9jsnvY=
golang.org/x/net v0.21.0/go.mod h1:bIjVDfnllIU7BJ2DNgfnXvpSvtn8VRwhlsaeUTyUS44=
golang.org/x/net v0.22.0/go.mod h1:JKghWKKOSdJwpW2GEx0Ja7fmaKnMsbu+MWVZTokSYmg=
-golang.org/x/net v0.24.0 h1:1PcaxkF854Fu3+lvBIx5SYn9wRlBzzcnHZSiaFFAb0w=
-golang.org/x/net v0.24.0/go.mod h1:2Q7sJY5mzlzWjKtYUEXSlBWCdyaioyXzRB2RtU8KVE8=
+golang.org/x/net v0.25.0 h1:d/OCCoBEUq33pjydKrGQhw7IlUPI2Oylr+8qLx49kac=
+golang.org/x/net v0.25.0/go.mod h1:JkAGAh7GEvH74S6FOH42FLoXpXbE/aqXSrIQjXgsiwM=
golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U=
golang.org/x/oauth2 v0.0.0-20190226205417-e64efc72b421/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
golang.org/x/oauth2 v0.0.0-20190604053449-0f29369cfe45/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
@@ -1571,8 +1571,8 @@ golang.org/x/tools v0.1.12/go.mod h1:hNGJHUnrk76NpqgfD5Aqm5Crs+Hm0VOH/i9J2+nxYbc
golang.org/x/tools v0.3.0/go.mod h1:/rWhSS2+zyEVwoJf8YAX6L2f0ntZ7Kn/mGgAWcipA5k=
golang.org/x/tools v0.6.0/go.mod h1:Xwgl3UAJ/d3gWutnCtw505GrjyAbvKui8lOU390QaIU=
golang.org/x/tools v0.7.0/go.mod h1:4pg6aUX35JBAogB10C9AtvVL+qowtN4pT3CGSQex14s=
-golang.org/x/tools v0.20.0 h1:hz/CVckiOxybQvFw6h7b/q80NTr9IUQb4s1IIzW7KNY=
-golang.org/x/tools v0.20.0/go.mod h1:WvitBU7JJf6A4jOdg4S1tviW9bhUxkgeCui/0JHctQg=
+golang.org/x/tools v0.21.0 h1:qc0xYgIbsSDt9EyWz05J5wfa7LOVW0YTLOXrqdLAWIw=
+golang.org/x/tools v0.21.0/go.mod h1:aiJjzUbINMkxbQROHiO6hDPo2LHcIPhhQsa9DLh0yGk=
golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
From c8722b225d06bdeb8385114886549e021c453edd Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 3 Jun 2024 05:13:07 -0700
Subject: [PATCH 084/283] Bump the all group with 2 updates (#11419)
Bumps the all group with 2 updates: [docker/login-action](https://github.com/docker/login-action) and [github/codeql-action](https://github.com/github/codeql-action).
Updates `docker/login-action` from 3.1.0 to 3.2.0
- [Release notes](https://github.com/docker/login-action/releases)
- [Commits](https://github.com/docker/login-action/compare/e92390c5fb421da1463c202d546fed0ec5c39f20...0d4c9c5ea7693da7b068278f7b52bda2a190a446)
Updates `github/codeql-action` from 3.25.6 to 3.25.7
- [Release notes](https://github.com/github/codeql-action/releases)
- [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md)
- [Commits](https://github.com/github/codeql-action/compare/9fdb3e49720b44c48891d036bb502feb25684276...f079b8493333aace61c81488f8bd40919487bd9f)
---
updated-dependencies:
- dependency-name: docker/login-action
dependency-type: direct:production
update-type: version-update:semver-minor
dependency-group: all
- dependency-name: github/codeql-action
dependency-type: direct:production
update-type: version-update:semver-patch
dependency-group: all
...
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
.github/workflows/images.yaml | 2 +-
.github/workflows/scorecards.yml | 2 +-
.github/workflows/vulnerability-scans.yaml | 2 +-
.github/workflows/zz-tmpl-images.yaml | 2 +-
4 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/.github/workflows/images.yaml b/.github/workflows/images.yaml
index 18c09a570..cd63a376e 100644
--- a/.github/workflows/images.yaml
+++ b/.github/workflows/images.yaml
@@ -205,7 +205,7 @@ jobs:
version: latest
platforms: ${{ env.PLATFORMS }}
- name: Login to GitHub Container Registry
- uses: docker/login-action@e92390c5fb421da1463c202d546fed0ec5c39f20 # v3.1.0
+ uses: docker/login-action@0d4c9c5ea7693da7b068278f7b52bda2a190a446 # v3.2.0
with:
username: ${{ secrets.DOCKERHUB_USERNAME }}
password: ${{ secrets.DOCKERHUB_TOKEN }}
diff --git a/.github/workflows/scorecards.yml b/.github/workflows/scorecards.yml
index 75e12a95b..0cec67927 100644
--- a/.github/workflows/scorecards.yml
+++ b/.github/workflows/scorecards.yml
@@ -59,6 +59,6 @@ jobs:
# Upload the results to GitHub's code scanning dashboard.
- name: "Upload to code-scanning"
- uses: github/codeql-action/upload-sarif@9fdb3e49720b44c48891d036bb502feb25684276 # v3.25.6
+ uses: github/codeql-action/upload-sarif@f079b8493333aace61c81488f8bd40919487bd9f # v3.25.7
with:
sarif_file: results.sarif
diff --git a/.github/workflows/vulnerability-scans.yaml b/.github/workflows/vulnerability-scans.yaml
index c6f51a372..314f39ac8 100644
--- a/.github/workflows/vulnerability-scans.yaml
+++ b/.github/workflows/vulnerability-scans.yaml
@@ -75,7 +75,7 @@ jobs:
# This step checks out a copy of your repository.
- name: Upload SARIF file
- uses: github/codeql-action/upload-sarif@9fdb3e49720b44c48891d036bb502feb25684276 # v3.25.6
+ uses: github/codeql-action/upload-sarif@f079b8493333aace61c81488f8bd40919487bd9f # v3.25.7
with:
token: ${{ github.token }}
# Path to SARIF file relative to the root of the repository
diff --git a/.github/workflows/zz-tmpl-images.yaml b/.github/workflows/zz-tmpl-images.yaml
index 7d7f7a284..17425a468 100644
--- a/.github/workflows/zz-tmpl-images.yaml
+++ b/.github/workflows/zz-tmpl-images.yaml
@@ -70,7 +70,7 @@ jobs:
uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
- name: Login to GitHub Container Registry
- uses: docker/login-action@e92390c5fb421da1463c202d546fed0ec5c39f20 # v3.1.0
+ uses: docker/login-action@0d4c9c5ea7693da7b068278f7b52bda2a190a446 # v3.2.0
with:
username: ${{ secrets.DOCKERHUB_USERNAME }}
password: ${{ secrets.DOCKERHUB_TOKEN }}
From ac9e40a8cf85ec5bf436537110696cfaaa93fe5f Mon Sep 17 00:00:00 2001
From: James Strong
Date: Thu, 6 Jun 2024 07:23:55 -0400
Subject: [PATCH 085/283] update golang to 1.22.4 (#11427)
Signed-off-by: James Strong
---
GOLANG_VERSION | 2 +-
go.mod | 2 +-
go.work.sum | 4 +++-
3 files changed, 5 insertions(+), 3 deletions(-)
diff --git a/GOLANG_VERSION b/GOLANG_VERSION
index 8864ad297..be02b337a 100644
--- a/GOLANG_VERSION
+++ b/GOLANG_VERSION
@@ -1 +1 @@
-1.22.2
\ No newline at end of file
+1.22.4
\ No newline at end of file
diff --git a/go.mod b/go.mod
index 86a32fc6b..def9b0876 100644
--- a/go.mod
+++ b/go.mod
@@ -2,7 +2,7 @@ module k8s.io/ingress-nginx
go 1.22.0
-toolchain go1.22.2
+toolchain go1.22.4
require (
dario.cat/mergo v1.0.0
diff --git a/go.work.sum b/go.work.sum
index 51c6a3e66..0fd4fc8e2 100644
--- a/go.work.sum
+++ b/go.work.sum
@@ -779,6 +779,7 @@ github.com/mxk/go-flowrate v0.0.0-20140419014527-cca7078d478f/go.mod h1:ZdcZmHo+
github.com/ncabatoff/fakescraper v0.0.0-20201102132415-4b37ba603d65 h1:Og+dVkxEQNvRGU2vUKeOwYT2UJ+pEaDMWB6tIQnIh6A=
github.com/onsi/ginkgo/v2 v2.1.4/go.mod h1:um6tUpWM/cxCK3/FK8BXqEiUMUwRgSM4JXG47RKZmLU=
github.com/onsi/ginkgo/v2 v2.15.0/go.mod h1:HlxMHtYF57y6Dpf+mc5529KKmSq9h2FpCF+/ZkwUxKM=
+github.com/onsi/ginkgo/v2 v2.17.2/go.mod h1:nP2DPOQoNsQmsVyv5rDA8JkXQoCs6goXIvr/PRJ1eCc=
github.com/onsi/gomega v1.19.0/go.mod h1:LY+I3pBVzYsTBU1AnDwOSxaYi9WoWiqgwooUqq9yPro=
github.com/onsi/gomega v1.31.0/go.mod h1:DW9aCi7U6Yi40wNVAvT6kzFnEVEI5n3DloYBiKiT6zk=
github.com/onsi/gomega v1.33.0/go.mod h1:+925n5YtiFsLzzafLUHzVMBpvvRAzrydIBiSIxjX3wY=
@@ -796,7 +797,6 @@ github.com/pkg/sftp v1.13.1 h1:I2qBYMChEhIjOgazfJmV3/mZM256btk6wkCDRmW7JYs=
github.com/pquerna/cachecontrol v0.1.0 h1:yJMy84ti9h/+OEWa752kBTKv4XC30OtVVHYv/8cTqKc=
github.com/pquerna/cachecontrol v0.1.0/go.mod h1:NrUG3Z7Rdu85UNR3vm7SOsl1nFIeSiQnrHV5K9mBcUI=
github.com/prometheus/exporter-toolkit v0.11.0 h1:yNTsuZ0aNCNFQ3aFTD2uhPOvr4iD7fdBvKPAEGkNf+g=
-github.com/prometheus/procfs v0.13.0 h1:GqzLlQyfsPbaEHaQkO7tbDlriv/4o5Hudv6OXHGKX7o=
github.com/remyoudompheng/bigfft v0.0.0-20200410134404-eec4a21b6bb0 h1:OdAsTTz6OkFY5QxjkYwrChwuRruF69c169dPK26NUlk=
github.com/rogpeppe/fastuuid v1.2.0 h1:Ppwyp6VYCF1nvBTXL3trRso7mXMlRrw9ooo375wvi2s=
github.com/russross/blackfriday/v2 v2.1.0 h1:JIOH55/0cWyOuilr9/qlrm0BSXldqnqwMsf35Ld67mk=
@@ -903,6 +903,7 @@ golang.org/x/mod v0.14.0/go.mod h1:hTbmBsO62+eylJbnUtE2MGJUyE7QWk4xUqPFrRgJ+7c=
golang.org/x/net v0.14.0/go.mod h1:PpSgVXXLK0OxS0F31C1/tv6XNguvCrnXIDrFMspZIUI=
golang.org/x/net v0.16.0/go.mod h1:NxSsAGuq816PNPmqtQdLE42eU2Fs7NoRIZrHJAlaCOE=
golang.org/x/net v0.18.0/go.mod h1:/czyP5RqHAH4odGYxBJ1qz0+CE5WZ+2j1YgoEo8F2jQ=
+golang.org/x/net v0.24.0/go.mod h1:2Q7sJY5mzlzWjKtYUEXSlBWCdyaioyXzRB2RtU8KVE8=
golang.org/x/oauth2 v0.10.0/go.mod h1:kTpgurOux7LqtuxjuyZa4Gj2gdezIt/jQtGnNFfypQI=
golang.org/x/oauth2 v0.11.0/go.mod h1:LdF7O/8bLR/qWK9DrpXmbHLTouvRHK0SgJl0GmDBchk=
golang.org/x/oauth2 v0.13.0/go.mod h1:/JMhi4ZRXAf4HG9LiNmxvk+45+96RUlVThiH8FzNBn0=
@@ -921,6 +922,7 @@ golang.org/x/tools v0.4.0/go.mod h1:UE5sM2OK9E/d67R0ANs2xJizIymRP5gJU295PvKXxjQ=
golang.org/x/tools v0.12.0/go.mod h1:Sc0INKfu04TlqNoRA1hgpFZbhYXHPr4V5DzpSBTPqQM=
golang.org/x/tools v0.13.0/go.mod h1:HvlwmtVNQAhOuCjW7xxvovg8wbNq7LwfXh/k7wXUl58=
golang.org/x/tools v0.16.1/go.mod h1:kYVVN6I1mBNoB1OX+noeBjbRk4IUEPa7JJ+TJMEooJ0=
+golang.org/x/tools v0.20.0/go.mod h1:WvitBU7JJf6A4jOdg4S1tviW9bhUxkgeCui/0JHctQg=
golang.org/x/xerrors v0.0.0-20220907171357-04be3eba64a2 h1:H2TDz8ibqkAF6YGhCdN3jS9O0/s90v0rJh3X/OLHEUk=
golang.org/x/xerrors v0.0.0-20231012003039-104605ab7028/go.mod h1:NDW/Ps6MPRej6fsCIbMTohpP40sJ/P/vI1MoTEGwX90=
gonum.org/v1/gonum v0.11.0 h1:f1IJhK4Km5tBJmaiJXtk/PkL4cdVX6J+tGiM187uT5E=
From d49833be1d538e2083bd34d097832695eccb15c7 Mon Sep 17 00:00:00 2001
From: Vadim Bauer
Date: Sun, 9 Jun 2024 17:29:50 +0200
Subject: [PATCH 086/283] Update index.md (#11437)
add section about how to setup the proxy protocol for scaleway
---
docs/deploy/index.md | 2 ++
1 file changed, 2 insertions(+)
diff --git a/docs/deploy/index.md b/docs/deploy/index.md
index d8cc6f875..c70b932c9 100644
--- a/docs/deploy/index.md
+++ b/docs/deploy/index.md
@@ -364,6 +364,8 @@ kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/cont
```console
kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.10.1/deploy/static/provider/scw/deploy.yaml
```
+Refer to the [dedicated tutorial](https://www.scaleway.com/en/docs/tutorials/proxy-protocol-v2-load-balancer/#configuring-proxy-protocol-for-ingress-nginx) in the Scaleway documentation for configuring the proxy protocol for ingress-nginx with the Scaleway load balancer.
+
#### Exoscale
From ec296594c788659b8c1427dba0956cef71768efa Mon Sep 17 00:00:00 2001
From: Long Wu Yuan
Date: Mon, 10 Jun 2024 04:23:14 +0530
Subject: [PATCH 087/283] fix for docs issue 11432 (#11433)
---
docs/user-guide/nginx-configuration/annotations.md | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/docs/user-guide/nginx-configuration/annotations.md b/docs/user-guide/nginx-configuration/annotations.md
index 0ea54a29f..47ebd30e3 100755
--- a/docs/user-guide/nginx-configuration/annotations.md
+++ b/docs/user-guide/nginx-configuration/annotations.md
@@ -958,7 +958,7 @@ Enables a request to be mirrored to a mirror backend. Responses by mirror backen
The mirror backend can be set by applying:
```yaml
-nginx.ingress.kubernetes.io/mirror-target: https://test.env.com/$request_uri
+nginx.ingress.kubernetes.io/mirror-target: https://test.env.com$request_uri
```
By default the request-body is sent to the mirror backend, but can be turned off by applying:
@@ -970,7 +970,7 @@ nginx.ingress.kubernetes.io/mirror-request-body: "off"
Also by default header Host for mirrored requests will be set the same as a host part of uri in the "mirror-target" annotation. You can override it by "mirror-host" annotation:
```yaml
-nginx.ingress.kubernetes.io/mirror-target: https://1.2.3.4/$request_uri
+nginx.ingress.kubernetes.io/mirror-target: https://1.2.3.4$request_uri
nginx.ingress.kubernetes.io/mirror-host: "test.env.com"
```
From 0cf19948646bf14d7ef19a4c7e0b0598f32e8041 Mon Sep 17 00:00:00 2001
From: James Strong
Date: Sun, 9 Jun 2024 20:17:59 -0400
Subject: [PATCH 088/283] upgrade to alpine 3.20 (#11428)
Signed-off-by: James Strong
---
images/cfssl/rootfs/Dockerfile | 2 +-
images/nginx-1.25/rootfs/Dockerfile | 4 ++--
images/nginx/rootfs/Dockerfile | 4 ++--
images/opentelemetry/rootfs/Dockerfile | 2 +-
rootfs/Dockerfile-chroot | 2 +-
test/e2e-image/Dockerfile | 2 +-
6 files changed, 8 insertions(+), 8 deletions(-)
diff --git a/images/cfssl/rootfs/Dockerfile b/images/cfssl/rootfs/Dockerfile
index 2afc43c7a..c23f66d49 100644
--- a/images/cfssl/rootfs/Dockerfile
+++ b/images/cfssl/rootfs/Dockerfile
@@ -12,7 +12,7 @@
# See the License for the specific language governing permissions and
# limitations under the License.
-FROM alpine:3.19.1
+FROM alpine:3.20.0
RUN echo "@testing http://nl.alpinelinux.org/alpine/edge/testing" >> /etc/apk/repositories
RUN apk update \
diff --git a/images/nginx-1.25/rootfs/Dockerfile b/images/nginx-1.25/rootfs/Dockerfile
index 8327d99f2..13dcec33d 100644
--- a/images/nginx-1.25/rootfs/Dockerfile
+++ b/images/nginx-1.25/rootfs/Dockerfile
@@ -11,7 +11,7 @@
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
-FROM alpine:3.19.1 as builder
+FROM alpine:3.20.0 as builder
COPY . /
@@ -21,7 +21,7 @@ RUN apk update \
&& /build.sh
# Use a multi-stage build
-FROM alpine:3.19.1
+FROM alpine:3.20.0
ENV PATH=$PATH:/usr/local/luajit/bin:/usr/local/nginx/sbin:/usr/local/nginx/bin
diff --git a/images/nginx/rootfs/Dockerfile b/images/nginx/rootfs/Dockerfile
index 3dd841c6c..f3d61017e 100644
--- a/images/nginx/rootfs/Dockerfile
+++ b/images/nginx/rootfs/Dockerfile
@@ -11,7 +11,7 @@
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
-FROM alpine:3.19.1 as builder
+FROM alpine:3.20.0 as builder
COPY . /
@@ -21,7 +21,7 @@ RUN apk update \
&& /build.sh
# Use a multi-stage build
-FROM alpine:3.19.1
+FROM alpine:3.20.0
ENV PATH=$PATH:/usr/local/luajit/bin:/usr/local/nginx/sbin:/usr/local/nginx/bin
diff --git a/images/opentelemetry/rootfs/Dockerfile b/images/opentelemetry/rootfs/Dockerfile
index bb88ec760..eb951e5c4 100644
--- a/images/opentelemetry/rootfs/Dockerfile
+++ b/images/opentelemetry/rootfs/Dockerfile
@@ -13,7 +13,7 @@
# limitations under the License.
-FROM alpine:3.19.1 as base
+FROM alpine:3.20.0 as base
RUN mkdir -p /opt/third_party/install
COPY . /opt/third_party/
diff --git a/rootfs/Dockerfile-chroot b/rootfs/Dockerfile-chroot
index 98f078261..c06db2252 100644
--- a/rootfs/Dockerfile-chroot
+++ b/rootfs/Dockerfile-chroot
@@ -23,7 +23,7 @@ RUN apk update \
&& apk upgrade \
&& /chroot.sh
-FROM alpine:3.19.1
+FROM alpine:3.20.0
ARG TARGETARCH
ARG VERSION
diff --git a/test/e2e-image/Dockerfile b/test/e2e-image/Dockerfile
index 6c1fbefc6..0130ca09b 100644
--- a/test/e2e-image/Dockerfile
+++ b/test/e2e-image/Dockerfile
@@ -1,7 +1,7 @@
ARG E2E_BASE_IMAGE
FROM ${E2E_BASE_IMAGE} AS BASE
-FROM alpine:3.19.1
+FROM alpine:3.20.0
RUN apk update \
&& apk upgrade && apk add -U --no-cache \
From a68b1cf4786f68fe2d514227f7b27de9cc71fce3 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 10 Jun 2024 06:11:23 -0700
Subject: [PATCH 089/283] Bump github.com/prometheus/common from 0.53.0 to
0.54.0 (#11441)
Bumps [github.com/prometheus/common](https://github.com/prometheus/common) from 0.53.0 to 0.54.0.
- [Release notes](https://github.com/prometheus/common/releases)
- [Changelog](https://github.com/prometheus/common/blob/main/RELEASE.md)
- [Commits](https://github.com/prometheus/common/compare/v0.53.0...v0.54.0)
---
updated-dependencies:
- dependency-name: github.com/prometheus/common
dependency-type: direct:production
update-type: version-update:semver-minor
...
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 2 +-
go.sum | 4 ++--
2 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/go.mod b/go.mod
index def9b0876..c58b9032b 100644
--- a/go.mod
+++ b/go.mod
@@ -21,7 +21,7 @@ require (
github.com/pmezard/go-difflib v1.0.0
github.com/prometheus/client_golang v1.19.1
github.com/prometheus/client_model v0.6.1
- github.com/prometheus/common v0.53.0
+ github.com/prometheus/common v0.54.0
github.com/spf13/cobra v1.8.0
github.com/spf13/pflag v1.0.5
github.com/stretchr/testify v1.9.0
diff --git a/go.sum b/go.sum
index e723adabe..7da5996db 100644
--- a/go.sum
+++ b/go.sum
@@ -1044,8 +1044,8 @@ github.com/prometheus/common v0.44.0/go.mod h1:ofAIvZbQ1e/nugmZGz4/qCb9Ap1VoSTIO
github.com/prometheus/common v0.45.0/go.mod h1:YJmSTw9BoKxJplESWWxlbyttQR4uaEcGyv9MZjVOJsY=
github.com/prometheus/common v0.48.0/go.mod h1:0/KsvlIEfPQCQ5I2iNSAWKPZziNCvRs5EC6ILDTlAPc=
github.com/prometheus/common v0.52.3/go.mod h1:BrxBKv3FWBIGXw89Mg1AeBq7FSyRzXWI3l3e7W3RN5U=
-github.com/prometheus/common v0.53.0 h1:U2pL9w9nmJwJDa4qqLQ3ZaePJ6ZTwt7cMD3AG3+aLCE=
-github.com/prometheus/common v0.53.0/go.mod h1:BrxBKv3FWBIGXw89Mg1AeBq7FSyRzXWI3l3e7W3RN5U=
+github.com/prometheus/common v0.54.0 h1:ZlZy0BgJhTwVZUn7dLOkwCZHUkrAqd3WYtcFCWnM1D8=
+github.com/prometheus/common v0.54.0/go.mod h1:/TQgMJP5CuVYveyT7n/0Ix8yLNNXy9yRSkhnLTHPDIQ=
github.com/prometheus/exporter-toolkit v0.11.0/go.mod h1:BVnENhnNecpwoTLiABx7mrPB/OLRIgN74qlQbV+FK1Q=
github.com/prometheus/procfs v0.0.0-20181005140218-185b4288413d/go.mod h1:c3At6R/oaqEKCNdg8wHV1ftS6bRYblBhIjjI8uT2IGk=
github.com/prometheus/procfs v0.0.2/go.mod h1:TjEm7ze935MbeOT/UhFTIMYKhuLP4wbCsTZCD3I8kEA=
From 61c1afa57133bfe62802b3a55ca6293c684ce92e Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 10 Jun 2024 07:06:13 -0700
Subject: [PATCH 090/283] Bump goreleaser/goreleaser-action from 5.1.0 to 6.0.0
(#11444)
Bumps [goreleaser/goreleaser-action](https://github.com/goreleaser/goreleaser-action) from 5.1.0 to 6.0.0.
- [Release notes](https://github.com/goreleaser/goreleaser-action/releases)
- [Commits](https://github.com/goreleaser/goreleaser-action/compare/5742e2a039330cbb23ebf35f046f814d4c6ff811...286f3b13b1b49da4ac219696163fb8c1c93e1200)
---
updated-dependencies:
- dependency-name: goreleaser/goreleaser-action
dependency-type: direct:production
update-type: version-update:semver-major
...
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
.github/workflows/plugin.yaml | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/.github/workflows/plugin.yaml b/.github/workflows/plugin.yaml
index 137e1dccc..8274a6a99 100644
--- a/.github/workflows/plugin.yaml
+++ b/.github/workflows/plugin.yaml
@@ -27,7 +27,7 @@ jobs:
- name: Run GoReleaser Snapshot
if: ${{ ! startsWith(github.ref, 'refs/tags/') }}
- uses: goreleaser/goreleaser-action@5742e2a039330cbb23ebf35f046f814d4c6ff811 # v5.1.0
+ uses: goreleaser/goreleaser-action@286f3b13b1b49da4ac219696163fb8c1c93e1200 # v6.0.0
with:
version: latest
args: release --snapshot --clean
@@ -36,7 +36,7 @@ jobs:
- name: Run GoReleaser
if: ${{ startsWith(github.ref, 'refs/tags/') }}
- uses: goreleaser/goreleaser-action@5742e2a039330cbb23ebf35f046f814d4c6ff811 # v5.1.0
+ uses: goreleaser/goreleaser-action@286f3b13b1b49da4ac219696163fb8c1c93e1200 # v6.0.0
with:
version: latest
args: release --clean
From 38e7582109e2d2c9668365fefbf034ef8b696315 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 10 Jun 2024 07:10:56 -0700
Subject: [PATCH 091/283] Bump sigs.k8s.io/controller-runtime in the all group
(#11440)
Bumps the all group with 1 update: [sigs.k8s.io/controller-runtime](https://github.com/kubernetes-sigs/controller-runtime).
Updates `sigs.k8s.io/controller-runtime` from 0.18.3 to 0.18.4
- [Release notes](https://github.com/kubernetes-sigs/controller-runtime/releases)
- [Changelog](https://github.com/kubernetes-sigs/controller-runtime/blob/main/RELEASE.md)
- [Commits](https://github.com/kubernetes-sigs/controller-runtime/compare/v0.18.3...v0.18.4)
---
updated-dependencies:
- dependency-name: sigs.k8s.io/controller-runtime
dependency-type: direct:production
update-type: version-update:semver-patch
dependency-group: all
...
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 2 +-
go.sum | 4 ++--
2 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/go.mod b/go.mod
index c58b9032b..4ef8611cd 100644
--- a/go.mod
+++ b/go.mod
@@ -43,7 +43,7 @@ require (
k8s.io/component-base v0.30.1
k8s.io/klog/v2 v2.120.1
pault.ag/go/sniff v0.0.0-20200207005214-cf7e4d167732
- sigs.k8s.io/controller-runtime v0.18.3
+ sigs.k8s.io/controller-runtime v0.18.4
sigs.k8s.io/mdtoc v1.1.0
)
diff --git a/go.sum b/go.sum
index 7da5996db..205f07a7f 100644
--- a/go.sum
+++ b/go.sum
@@ -1977,8 +1977,8 @@ rsc.io/binaryregexp v0.2.0/go.mod h1:qTv7/COck+e2FymRvadv62gMdZztPaShugOCi3I+8D8
rsc.io/pdf v0.1.1/go.mod h1:n8OzWcQ6Sp37PL01nO98y4iUCRdTGarVfzxY20ICaU4=
rsc.io/quote/v3 v3.1.0/go.mod h1:yEA65RcK8LyAZtP9Kv3t0HmxON59tX3rD+tICJqUlj0=
rsc.io/sampler v1.3.0/go.mod h1:T1hPZKmBbMNahiBKFy5HrXp6adAjACjK9JXDnKaTXpA=
-sigs.k8s.io/controller-runtime v0.18.3 h1:B5Wmmo8WMWK7izei+2LlXLVDGzMwAHBNLX68lwtlSR4=
-sigs.k8s.io/controller-runtime v0.18.3/go.mod h1:TVoGrfdpbA9VRFaRnKgk9P5/atA0pMwq+f+msb9M8Sg=
+sigs.k8s.io/controller-runtime v0.18.4 h1:87+guW1zhvuPLh1PHybKdYFLU0YJp4FhJRmiHvm5BZw=
+sigs.k8s.io/controller-runtime v0.18.4/go.mod h1:TVoGrfdpbA9VRFaRnKgk9P5/atA0pMwq+f+msb9M8Sg=
sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd h1:EDPBXCAspyGV4jQlpZSudPeMmr1bNJefnuqLsRAsHZo=
sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd/go.mod h1:B8JuhiUyNFVKdsE8h686QcCxMaH6HrOAZj4vswFpcB0=
sigs.k8s.io/kustomize/api v0.16.0 h1:/zAR4FOQDCkgSDmVzV2uiFbuy9bhu3jEzthrHCuvm1g=
From 71d423851e133aec3c431f191aefb359d1b1e683 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 10 Jun 2024 07:14:19 -0700
Subject: [PATCH 092/283] Bump the all group with 3 updates (#11443)
Bumps the all group with 3 updates: [actions/dependency-review-action](https://github.com/actions/dependency-review-action), [github/codeql-action](https://github.com/github/codeql-action) and [aquasecurity/trivy-action](https://github.com/aquasecurity/trivy-action).
Updates `actions/dependency-review-action` from 4.3.2 to 4.3.3
- [Release notes](https://github.com/actions/dependency-review-action/releases)
- [Commits](https://github.com/actions/dependency-review-action/compare/0c155c5e8556a497adf53f2c18edabf945ed8e70...72eb03d02c7872a771aacd928f3123ac62ad6d3a)
Updates `github/codeql-action` from 3.25.7 to 3.25.8
- [Release notes](https://github.com/github/codeql-action/releases)
- [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md)
- [Commits](https://github.com/github/codeql-action/compare/f079b8493333aace61c81488f8bd40919487bd9f...2e230e8fe0ad3a14a340ad0815ddb96d599d2aff)
Updates `aquasecurity/trivy-action` from 0.21.0 to 0.22.0
- [Release notes](https://github.com/aquasecurity/trivy-action/releases)
- [Commits](https://github.com/aquasecurity/trivy-action/compare/fd25fed6972e341ff0007ddb61f77e88103953c2...595be6a0f6560a0a8fc419ddf630567fc623531d)
---
updated-dependencies:
- dependency-name: actions/dependency-review-action
dependency-type: direct:production
update-type: version-update:semver-patch
dependency-group: all
- dependency-name: github/codeql-action
dependency-type: direct:production
update-type: version-update:semver-patch
dependency-group: all
- dependency-name: aquasecurity/trivy-action
dependency-type: direct:production
update-type: version-update:semver-minor
dependency-group: all
...
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
.github/workflows/depreview.yaml | 2 +-
.github/workflows/scorecards.yml | 2 +-
.github/workflows/vulnerability-scans.yaml | 4 ++--
3 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/.github/workflows/depreview.yaml b/.github/workflows/depreview.yaml
index fea5a4e4e..2aacbd6cc 100644
--- a/.github/workflows/depreview.yaml
+++ b/.github/workflows/depreview.yaml
@@ -11,4 +11,4 @@ jobs:
- name: 'Checkout Repository'
uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
- name: 'Dependency Review'
- uses: actions/dependency-review-action@0c155c5e8556a497adf53f2c18edabf945ed8e70 # v4.3.2
+ uses: actions/dependency-review-action@72eb03d02c7872a771aacd928f3123ac62ad6d3a # v4.3.3
diff --git a/.github/workflows/scorecards.yml b/.github/workflows/scorecards.yml
index 0cec67927..89ee0b55b 100644
--- a/.github/workflows/scorecards.yml
+++ b/.github/workflows/scorecards.yml
@@ -59,6 +59,6 @@ jobs:
# Upload the results to GitHub's code scanning dashboard.
- name: "Upload to code-scanning"
- uses: github/codeql-action/upload-sarif@f079b8493333aace61c81488f8bd40919487bd9f # v3.25.7
+ uses: github/codeql-action/upload-sarif@2e230e8fe0ad3a14a340ad0815ddb96d599d2aff # v3.25.8
with:
sarif_file: results.sarif
diff --git a/.github/workflows/vulnerability-scans.yaml b/.github/workflows/vulnerability-scans.yaml
index 314f39ac8..19a66053f 100644
--- a/.github/workflows/vulnerability-scans.yaml
+++ b/.github/workflows/vulnerability-scans.yaml
@@ -60,7 +60,7 @@ jobs:
- name: Scan image with AquaSec/Trivy
id: scan
- uses: aquasecurity/trivy-action@fd25fed6972e341ff0007ddb61f77e88103953c2 # v0.21.0
+ uses: aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d # v0.22.0
with:
image-ref: registry.k8s.io/ingress-nginx/controller:${{ matrix.versions }}
format: 'sarif'
@@ -75,7 +75,7 @@ jobs:
# This step checks out a copy of your repository.
- name: Upload SARIF file
- uses: github/codeql-action/upload-sarif@f079b8493333aace61c81488f8bd40919487bd9f # v3.25.7
+ uses: github/codeql-action/upload-sarif@2e230e8fe0ad3a14a340ad0815ddb96d599d2aff # v3.25.8
with:
token: ${{ github.token }}
# Path to SARIF file relative to the root of the repository
From 4038211261e464a36296dee9d31c1868198236f5 Mon Sep 17 00:00:00 2001
From: Ali Afsharzadeh
Date: Mon, 10 Jun 2024 17:54:35 +0330
Subject: [PATCH 093/283] Remove unnecessary space character (#11434)
---
rootfs/nginx-chroot-wrapper.sh | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/rootfs/nginx-chroot-wrapper.sh b/rootfs/nginx-chroot-wrapper.sh
index f7318142f..0c8bdf3b7 100755
--- a/rootfs/nginx-chroot-wrapper.sh
+++ b/rootfs/nginx-chroot-wrapper.sh
@@ -15,4 +15,4 @@
# limitations under the License.
cat /etc/resolv.conf > /chroot/etc/resolv.conf
-unshare -S 101 -R /chroot nginx "$@"
+unshare -S 101 -R /chroot nginx "$@"
From 8ca27e7ee902ec6b77c7cfb1749254cdbab36c24 Mon Sep 17 00:00:00 2001
From: Long Wu Yuan
Date: Wed, 12 Jun 2024 13:08:56 +0530
Subject: [PATCH 094/283] fixed fastcgi userguide (#11454)
---
docs/user-guide/fcgi-services.md | 112 ++++++++++++++++++++++++++++---
1 file changed, 101 insertions(+), 11 deletions(-)
diff --git a/docs/user-guide/fcgi-services.md b/docs/user-guide/fcgi-services.md
index db4d9428b..836e9fbaa 100644
--- a/docs/user-guide/fcgi-services.md
+++ b/docs/user-guide/fcgi-services.md
@@ -1,5 +1,3 @@
-
-
# Exposing FastCGI Servers
> **FastCGI** is a [binary protocol](https://en.wikipedia.org/wiki/Binary_protocol "Binary protocol") for interfacing interactive programs with a [web server](https://en.wikipedia.org/wiki/Web_server "Web server"). [...] (It's) aim is to reduce the overhead related to interfacing between web server and CGI programs, allowing a server to handle more web page requests per unit of time.
@@ -8,10 +6,15 @@
The _ingress-nginx_ ingress controller can be used to directly expose [FastCGI](https://en.wikipedia.org/wiki/FastCGI) servers. Enabling FastCGI in your Ingress only requires setting the _backend-protocol_ annotation to `FCGI`, and with a couple more annotations you can customize the way _ingress-nginx_ handles the communication with your FastCGI _server_.
+For most practical use-cases, php applications are a good example. PHP is not HTML so a FastCGI server like php-fpm processes a index.php script for the response to a request. See a working example below.
-## Example Objects to Expose a FastCGI Pod
+This [post in a FactCGI feature issue](https://github.com/kubernetes/ingress-nginx/issues/8207#issuecomment-2161405468) describes a test for the FastCGI feature. The same test is described below here.
-The _Pod_ example object below exposes port `9000`, which is the conventional FastCGI port.
+## Example Objects to expose a FastCGI server pod
+
+### The FasctCGI server pod
+
+The _Pod_ object example below exposes port `9000`, which is the conventional FastCGI port.
```yaml
apiVersion: v1
@@ -23,12 +26,40 @@ labels:
spec:
containers:
- name: example-app
- image: example-app:1.0
+ image: php:fpm-alpine
ports:
- containerPort: 9000
name: fastcgi
```
+- For this example to work, a HTML response should be received from the FastCGI server being exposed
+- A HTTP request to the FastCGI server pod should be sent
+- The response should be generated by a php script as that is what we are demonstrating here
+
+The image we are using here `php:fpm-alpine` does not ship with a ready to use php script inside it. So we need to provide the image with a simple php-script for this example to work.
+
+- Use `kubectl exec` to get into the example-app pod
+- You will land at the path `/var/www/html`
+- Create a simple php script there at the path /var/www/html called index.php
+- Make the index.php file look like this
+
+```
+
+
+
+ PHP Test
+
+
+ FastCGI Test Worked!
'; ?>
+
+
+```
+
+- Save and exit from the shell in the pod
+- If you delete the pod, then you will have to recreate the file as this method is not persistent
+
+### The FastCGI service
+
The _Service_ object example below matches port `9000` from the _Pod_ object above.
```yaml
@@ -45,21 +76,41 @@ spec:
name: fastcgi
```
-And the _Ingress_ and _ConfigMap_ objects below demonstrates the supported _FastCGI_ specific annotations (NGINX actually has 50 FastCGI directives, all of which have not been exposed in the ingress yet), and matches the service `example-service`, and the port named `fastcgi` from above. The _ConfigMap_ **must** be created first for the _Ingress Controller_ to be able to find it when the _Ingress_ object is created, otherwise you will need to restart the _Ingress Controller_ pods.
+### The configMap object and the ingress object
+
+The _Ingress_ and _ConfigMap_ objects below demonstrate the supported _FastCGI_ specific annotations.
+
+!!! Important
+ NGINX actually has 50 [FastCGI directives](https://nginx.org/en/docs/http/ngx_http_fastcgi_module.html#directives)
+ All of the nginx directives have not been exposed in the ingress yet
+
+### The ConfigMap object
+
+This configMap object is required to set the parameters of [FastCGI directives](https://nginx.org/en/docs/http/ngx_http_fastcgi_module.html#directives)
+
+!!! Attention
+ - The _ConfigMap_ **must** be created before creating the ingress object
+
+- The _Ingress Controller_ needs to find the configMap when the _Ingress_ object with the FastCGI annotations is created
+- So create the configMap before the ingress
+- If the configMap is created after the ingress is created, then you will need to restart the _Ingress Controller_ pods.
```yaml
-# The ConfigMap MUST be created first for the ingress controller to be able to
-# find it when the Ingress object is created.
-
apiVersion: v1
kind: ConfigMap
metadata:
name: example-cm
data:
- SCRIPT_FILENAME: "/example/index.php"
+ SCRIPT_FILENAME: "/var/www/html/index.php"
----
+```
+### The ingress object
+
+- Do not create the ingress shown below until you have created the configMap seen above.
+- You can see that this ingress matches the service `example-service`, and the port named `fastcgi` from above.
+
+```
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
@@ -83,6 +134,44 @@ spec:
name: fastcgi
```
+## Send a request to the exposed FastCGI server
+
+You will have to look at the external-ip of the ingress or you have to send the HTTP request to the ClusterIP address of the ingress-nginx controller pod.
+
+```
+% curl 172.19.0.2 -H "Host: app.example.com" -vik
+* Trying 172.19.0.2:80...
+* Connected to 172.19.0.2 (172.19.0.2) port 80
+> GET / HTTP/1.1
+> Host: app.example.com
+> User-Agent: curl/8.6.0
+> Accept: */*
+>
+< HTTP/1.1 200 OK
+HTTP/1.1 200 OK
+< Date: Wed, 12 Jun 2024 07:11:59 GMT
+Date: Wed, 12 Jun 2024 07:11:59 GMT
+< Content-Type: text/html; charset=UTF-8
+Content-Type: text/html; charset=UTF-8
+< Transfer-Encoding: chunked
+Transfer-Encoding: chunked
+< Connection: keep-alive
+Connection: keep-alive
+< X-Powered-By: PHP/8.3.8
+X-Powered-By: PHP/8.3.8
+
+<
+
+
+
+ PHP Test
+
+
+ FastCGI Test Worked
+
+
+```
+
## FastCGI Ingress Annotations
To enable FastCGI, the `nginx.ingress.kubernetes.io/backend-protocol` annotation needs to be set to `FCGI`, which overrides the default `HTTP` value.
@@ -114,6 +203,7 @@ data:
SCRIPT_FILENAME: "/example/index.php"
HTTP_PROXY: ""
```
+
Using the _namespace/_ prefix is also supported, for example:
> `nginx.ingress.kubernetes.io/fastcgi-params-configmap: "example-namespace/example-configmap"`
From af9e5246ad09a304ef68d11f1467185dbd12fe72 Mon Sep 17 00:00:00 2001
From: TheRealNoob
Date: Fri, 14 Jun 2024 02:13:44 -0700
Subject: [PATCH 095/283] Chart: Make pod affinity templatable. (#11453)
* [helm] template pod affinity
* update README
* Apply suggestions from code review
Co-authored-by: Marco Ebert
* revert Chart.yaml version bump
* add unittests
* add docs defaultBackend.affinity
* add README section to values
* fix README syntax
* Apply suggestions from code review
Co-authored-by: Marco Ebert
* Update charts/ingress-nginx/values.yaml
Co-authored-by: Marco Ebert
* update formatting of unittests + add README examples
* fix affinity labels on default-backend
* Apply suggestions from code review
Co-authored-by: Marco Ebert
* remove double quotes on string
---------
Co-authored-by: Marco Ebert
---
charts/ingress-nginx/README.md | 2 +-
.../templates/controller-daemonset.yaml | 2 +-
.../templates/controller-deployment.yaml | 2 +-
.../templates/default-backend-deployment.yaml | 2 +-
.../tests/controller-daemonset_test.yaml | 43 +++++++++++++++
.../tests/controller-deployment_test.yaml | 42 +++++++++++++++
.../default-backend-deployment_test.yaml | 43 +++++++++++++++
charts/ingress-nginx/values.yaml | 52 +++++++++++++++++--
8 files changed, 179 insertions(+), 9 deletions(-)
diff --git a/charts/ingress-nginx/README.md b/charts/ingress-nginx/README.md
index d73a50114..e35da750a 100644
--- a/charts/ingress-nginx/README.md
+++ b/charts/ingress-nginx/README.md
@@ -485,7 +485,7 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
| controller.udp.configMapNamespace | string | `""` | Allows customization of the udp-services-configmap; defaults to $(POD_NAMESPACE) |
| controller.updateStrategy | object | `{}` | The update strategy to apply to the Deployment or DaemonSet # |
| controller.watchIngressWithoutClass | bool | `false` | Process Ingress objects without ingressClass annotation/ingressClassName field Overrides value for --watch-ingress-without-class flag of the controller binary Defaults to false |
-| defaultBackend.affinity | object | `{}` | |
+| defaultBackend.affinity | object | `{}` | Affinity and anti-affinity rules for server scheduling to nodes # Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity |
| defaultBackend.autoscaling.annotations | object | `{}` | |
| defaultBackend.autoscaling.enabled | bool | `false` | |
| defaultBackend.autoscaling.maxReplicas | int | `2` | |
diff --git a/charts/ingress-nginx/templates/controller-daemonset.yaml b/charts/ingress-nginx/templates/controller-daemonset.yaml
index 718e20c52..509d7a4c4 100644
--- a/charts/ingress-nginx/templates/controller-daemonset.yaml
+++ b/charts/ingress-nginx/templates/controller-daemonset.yaml
@@ -203,7 +203,7 @@ spec:
tolerations: {{ toYaml .Values.controller.tolerations | nindent 8 }}
{{- end }}
{{- if .Values.controller.affinity }}
- affinity: {{ toYaml .Values.controller.affinity | nindent 8 }}
+ affinity: {{ tpl (toYaml .Values.controller.affinity) $ | nindent 8 }}
{{- end }}
{{- if .Values.controller.topologySpreadConstraints }}
topologySpreadConstraints: {{ tpl (toYaml .Values.controller.topologySpreadConstraints) $ | nindent 8 }}
diff --git a/charts/ingress-nginx/templates/controller-deployment.yaml b/charts/ingress-nginx/templates/controller-deployment.yaml
index 879802779..77ea0052f 100644
--- a/charts/ingress-nginx/templates/controller-deployment.yaml
+++ b/charts/ingress-nginx/templates/controller-deployment.yaml
@@ -206,7 +206,7 @@ spec:
tolerations: {{ toYaml .Values.controller.tolerations | nindent 8 }}
{{- end }}
{{- if .Values.controller.affinity }}
- affinity: {{ toYaml .Values.controller.affinity | nindent 8 }}
+ affinity: {{ tpl (toYaml .Values.controller.affinity) $ | nindent 8 }}
{{- end }}
{{- if .Values.controller.topologySpreadConstraints }}
topologySpreadConstraints: {{ tpl (toYaml .Values.controller.topologySpreadConstraints) $ | nindent 8 }}
diff --git a/charts/ingress-nginx/templates/default-backend-deployment.yaml b/charts/ingress-nginx/templates/default-backend-deployment.yaml
index 6834dba07..c6ccdd5c9 100644
--- a/charts/ingress-nginx/templates/default-backend-deployment.yaml
+++ b/charts/ingress-nginx/templates/default-backend-deployment.yaml
@@ -107,7 +107,7 @@ spec:
tolerations: {{ toYaml .Values.defaultBackend.tolerations | nindent 8 }}
{{- end }}
{{- if .Values.defaultBackend.affinity }}
- affinity: {{ toYaml .Values.defaultBackend.affinity | nindent 8 }}
+ affinity: {{ tpl (toYaml .Values.defaultBackend.affinity) $ | nindent 8 }}
{{- end }}
{{- if .Values.defaultBackend.topologySpreadConstraints }}
topologySpreadConstraints: {{ tpl (toYaml .Values.defaultBackend.topologySpreadConstraints) $ | nindent 8 }}
diff --git a/charts/ingress-nginx/tests/controller-daemonset_test.yaml b/charts/ingress-nginx/tests/controller-daemonset_test.yaml
index 29359fd9e..6ee794af9 100644
--- a/charts/ingress-nginx/tests/controller-daemonset_test.yaml
+++ b/charts/ingress-nginx/tests/controller-daemonset_test.yaml
@@ -95,3 +95,46 @@ tests:
topologyKey: kubernetes.io/hostname
maxSkew: 1
whenUnsatisfiable: ScheduleAnyway
+
+ - it: should create a DaemonSet with affinity if `controller.affinity` is set
+ set:
+ controller.kind: DaemonSet
+ controller.affinity:
+ podAntiAffinity:
+ requiredDuringSchedulingIgnoredDuringExecution:
+ - labelSelector:
+ matchExpressions:
+ - key: app.kubernetes.io/name
+ operator: In
+ values:
+ - '{{ include "ingress-nginx.name" . }}'
+ - key: app.kubernetes.io/instance
+ operator: In
+ values:
+ - '{{ .Release.Name }}'
+ - key: app.kubernetes.io/component
+ operator: In
+ values:
+ - controller
+ topologyKey: kubernetes.io/hostname
+ asserts:
+ - equal:
+ path: spec.template.spec.affinity
+ value:
+ podAntiAffinity:
+ requiredDuringSchedulingIgnoredDuringExecution:
+ - labelSelector:
+ matchExpressions:
+ - key: app.kubernetes.io/name
+ operator: In
+ values:
+ - ingress-nginx
+ - key: app.kubernetes.io/instance
+ operator: In
+ values:
+ - RELEASE-NAME
+ - key: app.kubernetes.io/component
+ operator: In
+ values:
+ - controller
+ topologyKey: kubernetes.io/hostname
diff --git a/charts/ingress-nginx/tests/controller-deployment_test.yaml b/charts/ingress-nginx/tests/controller-deployment_test.yaml
index d0330db90..82b97a0f7 100644
--- a/charts/ingress-nginx/tests/controller-deployment_test.yaml
+++ b/charts/ingress-nginx/tests/controller-deployment_test.yaml
@@ -118,3 +118,45 @@ tests:
topologyKey: kubernetes.io/hostname
maxSkew: 1
whenUnsatisfiable: ScheduleAnyway
+
+ - it: should create a Deployment with affinity if `controller.affinity` is set
+ set:
+ controller.affinity:
+ podAntiAffinity:
+ requiredDuringSchedulingIgnoredDuringExecution:
+ - labelSelector:
+ matchExpressions:
+ - key: app.kubernetes.io/name
+ operator: In
+ values:
+ - '{{ include "ingress-nginx.name" . }}'
+ - key: app.kubernetes.io/instance
+ operator: In
+ values:
+ - '{{ .Release.Name }}'
+ - key: app.kubernetes.io/component
+ operator: In
+ values:
+ - controller
+ topologyKey: kubernetes.io/hostname
+ asserts:
+ - equal:
+ path: spec.template.spec.affinity
+ value:
+ podAntiAffinity:
+ requiredDuringSchedulingIgnoredDuringExecution:
+ - labelSelector:
+ matchExpressions:
+ - key: app.kubernetes.io/name
+ operator: In
+ values:
+ - ingress-nginx
+ - key: app.kubernetes.io/instance
+ operator: In
+ values:
+ - RELEASE-NAME
+ - key: app.kubernetes.io/component
+ operator: In
+ values:
+ - controller
+ topologyKey: kubernetes.io/hostname
diff --git a/charts/ingress-nginx/tests/default-backend-deployment_test.yaml b/charts/ingress-nginx/tests/default-backend-deployment_test.yaml
index e6fd0c541..e237fe7e3 100644
--- a/charts/ingress-nginx/tests/default-backend-deployment_test.yaml
+++ b/charts/ingress-nginx/tests/default-backend-deployment_test.yaml
@@ -92,3 +92,46 @@ tests:
topologyKey: kubernetes.io/hostname
maxSkew: 1
whenUnsatisfiable: ScheduleAnyway
+
+ - it: should create a Deployment with affinity if `defaultBackend.affinity` is set
+ set:
+ defaultBackend.enabled: true
+ defaultBackend.affinity:
+ podAntiAffinity:
+ requiredDuringSchedulingIgnoredDuringExecution:
+ - labelSelector:
+ matchExpressions:
+ - key: app.kubernetes.io/name
+ operator: In
+ values:
+ - '{{ include "ingress-nginx.name" . }}'
+ - key: app.kubernetes.io/instance
+ operator: In
+ values:
+ - '{{ .Release.Name }}'
+ - key: app.kubernetes.io/component
+ operator: In
+ values:
+ - default-backend
+ topologyKey: kubernetes.io/hostname
+ asserts:
+ - equal:
+ path: spec.template.spec.affinity
+ value:
+ podAntiAffinity:
+ requiredDuringSchedulingIgnoredDuringExecution:
+ - labelSelector:
+ matchExpressions:
+ - key: app.kubernetes.io/name
+ operator: In
+ values:
+ - ingress-nginx
+ - key: app.kubernetes.io/instance
+ operator: In
+ values:
+ - RELEASE-NAME
+ - key: app.kubernetes.io/component
+ operator: In
+ values:
+ - default-backend
+ topologyKey: kubernetes.io/hostname
diff --git a/charts/ingress-nginx/values.yaml b/charts/ingress-nginx/values.yaml
index f09edbe74..c662cd2bb 100644
--- a/charts/ingress-nginx/values.yaml
+++ b/charts/ingress-nginx/values.yaml
@@ -260,11 +260,11 @@ controller:
# - key: app.kubernetes.io/name
# operator: In
# values:
- # - ingress-nginx
+ # - '{{ include "ingress-nginx.name" . }}'
# - key: app.kubernetes.io/instance
# operator: In
# values:
- # - ingress-nginx
+ # - '{{ .Release.Name }}'
# - key: app.kubernetes.io/component
# operator: In
# values:
@@ -279,16 +279,16 @@ controller:
# - key: app.kubernetes.io/name
# operator: In
# values:
- # - ingress-nginx
+ # - '{{ include "ingress-nginx.name" . }}'
# - key: app.kubernetes.io/instance
# operator: In
# values:
- # - ingress-nginx
+ # - '{{ .Release.Name }}'
# - key: app.kubernetes.io/component
# operator: In
# values:
# - controller
- # topologyKey: "kubernetes.io/hostname"
+ # topologyKey: kubernetes.io/hostname
# -- Topology spread constraints rely on node labels to identify the topology domain(s) that each Node is in.
## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/
@@ -1011,7 +1011,49 @@ defaultBackend:
# value: "value"
# effect: "NoSchedule|PreferNoSchedule|NoExecute(1.6 only)"
+ # -- Affinity and anti-affinity rules for server scheduling to nodes
+ ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity
affinity: {}
+ # # An example of preferred pod anti-affinity, weight is in the range 1-100
+ # podAntiAffinity:
+ # preferredDuringSchedulingIgnoredDuringExecution:
+ # - weight: 100
+ # podAffinityTerm:
+ # labelSelector:
+ # matchExpressions:
+ # - key: app.kubernetes.io/name
+ # operator: In
+ # values:
+ # - '{{ include "ingress-nginx.name" . }}'
+ # - key: app.kubernetes.io/instance
+ # operator: In
+ # values:
+ # - '{{ .Release.Name }}'
+ # - key: app.kubernetes.io/component
+ # operator: In
+ # values:
+ # - default-backend
+ # topologyKey: kubernetes.io/hostname
+
+ # # An example of required pod anti-affinity
+ # podAntiAffinity:
+ # requiredDuringSchedulingIgnoredDuringExecution:
+ # - labelSelector:
+ # matchExpressions:
+ # - key: app.kubernetes.io/name
+ # operator: In
+ # values:
+ # - '{{ include "ingress-nginx.name" . }}'
+ # - key: app.kubernetes.io/instance
+ # operator: In
+ # values:
+ # - '{{ .Release.Name }}'
+ # - key: app.kubernetes.io/component
+ # operator: In
+ # values:
+ # - default-backend
+ # topologyKey: kubernetes.io/hostname
+
# -- Topology spread constraints rely on node labels to identify the topology domain(s) that each Node is in.
# Ref.: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/
topologySpreadConstraints: []
From 68b59db3e932db354287547c8137fe1d696d3013 Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Fri, 14 Jun 2024 19:38:06 +0200
Subject: [PATCH 096/283] Owners: Promote Gacko to admin. (#11463)
---
OWNERS_ALIASES | 1 +
1 file changed, 1 insertion(+)
diff --git a/OWNERS_ALIASES b/OWNERS_ALIASES
index fa10804ce..1b5bb134b 100644
--- a/OWNERS_ALIASES
+++ b/OWNERS_ALIASES
@@ -7,6 +7,7 @@ aliases:
- thockin
ingress-nginx-admins:
+ - Gacko
- rikatz
- strongjz
From 0718c89203df192e797ca38271073770a3cd4312 Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Sat, 15 Jun 2024 10:05:28 +0200
Subject: [PATCH 097/283] Tests: Replace deprecated `grpc.Dial` by
`grpc.NewClient`. (#11462)
---
test/e2e/annotations/grpc.go | 10 +++++-----
test/e2e/settings/grpc.go | 2 +-
2 files changed, 6 insertions(+), 6 deletions(-)
diff --git a/test/e2e/annotations/grpc.go b/test/e2e/annotations/grpc.go
index 60696e139..530d16729 100644
--- a/test/e2e/annotations/grpc.go
+++ b/test/e2e/annotations/grpc.go
@@ -107,7 +107,7 @@ var _ = framework.DescribeAnnotation("backend-protocol - GRPC", func() {
})
//nolint:goconst //string interpolation
- conn, err := grpc.Dial(f.GetNginxIP()+":443",
+ conn, err := grpc.NewClient(f.GetNginxIP()+":443",
grpc.WithTransportCredentials(
credentials.NewTLS(&tls.Config{
ServerName: echoHost,
@@ -168,7 +168,7 @@ var _ = framework.DescribeAnnotation("backend-protocol - GRPC", func() {
return strings.Contains(server, "grpc_pass grpc://upstream_balancer;")
})
- conn, err := grpc.Dial(f.GetNginxIP()+":443",
+ conn, err := grpc.NewClient(f.GetNginxIP()+":443",
grpc.WithTransportCredentials(
credentials.NewTLS(&tls.Config{
ServerName: echoHost,
@@ -242,7 +242,7 @@ var _ = framework.DescribeAnnotation("backend-protocol - GRPC", func() {
return strings.Contains(server, "grpc_pass grpcs://upstream_balancer;")
})
- conn, err := grpc.Dial(f.GetNginxIP()+":443",
+ conn, err := grpc.NewClient(f.GetNginxIP()+":443",
grpc.WithTransportCredentials(
credentials.NewTLS(&tls.Config{
ServerName: echoHost,
@@ -286,7 +286,7 @@ var _ = framework.DescribeAnnotation("backend-protocol - GRPC", func() {
strings.Contains(server, fmt.Sprintf("grpc_read_timeout %ss;", proxyTimeout))
})
- conn, err := grpc.Dial(
+ conn, err := grpc.NewClient(
f.GetNginxIP()+":80",
grpc.WithTransportCredentials(insecure.NewCredentials()),
grpc.WithAuthority(host),
@@ -329,7 +329,7 @@ var _ = framework.DescribeAnnotation("backend-protocol - GRPC", func() {
strings.Contains(server, fmt.Sprintf("grpc_read_timeout %ss;", proxyTimeout))
})
- conn, err := grpc.Dial(
+ conn, err := grpc.NewClient(
f.GetNginxIP()+":80",
grpc.WithTransportCredentials(insecure.NewCredentials()),
grpc.WithAuthority(host),
diff --git a/test/e2e/settings/grpc.go b/test/e2e/settings/grpc.go
index fa5f35b24..ae3175034 100644
--- a/test/e2e/settings/grpc.go
+++ b/test/e2e/settings/grpc.go
@@ -86,7 +86,7 @@ var _ = framework.DescribeSetting("GRPC", func() {
return strings.Contains(server, "grpc_pass grpc://upstream_balancer;")
})
- conn, err := grpc.Dial(f.GetNginxIP()+":443",
+ conn, err := grpc.NewClient(f.GetNginxIP()+":443",
grpc.WithTransportCredentials(
credentials.NewTLS(&tls.Config{
ServerName: echoHost,
From 9ca96df6af0ca1897416a26d27f8ca5386ef5027 Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Sat, 15 Jun 2024 10:29:28 +0200
Subject: [PATCH 098/283] CI: Bump forgotten Ginkgo versions. (#11467)
---
build/run-in-docker.sh | 2 +-
go.work.sum | 4 +++
images/kube-webhook-certgen/rootfs/go.mod | 14 ++++-----
images/kube-webhook-certgen/rootfs/go.sum | 35 ++++++++++++-----------
images/test-runner/Makefile | 4 +--
magefiles/go.sum | 7 +++++
test/e2e/run-chart-test.sh | 2 +-
test/e2e/run-kind-e2e.sh | 2 +-
8 files changed, 40 insertions(+), 30 deletions(-)
diff --git a/build/run-in-docker.sh b/build/run-in-docker.sh
index 5d4e82a09..8af3c81b6 100755
--- a/build/run-in-docker.sh
+++ b/build/run-in-docker.sh
@@ -82,7 +82,7 @@ if [[ "$DOCKER_IN_DOCKER_ENABLED" == "true" ]]; then
echo "..reached DIND check TRUE block, inside run-in-docker.sh"
echo "FLAGS=$FLAGS"
#go env
- go install -mod=mod github.com/onsi/ginkgo/v2/ginkgo@v2.17.1
+ go install -mod=mod github.com/onsi/ginkgo/v2/ginkgo@v2.19.0
find / -type f -name ginkgo 2>/dev/null
which ginkgo
/bin/bash -c "${FLAGS}"
diff --git a/go.work.sum b/go.work.sum
index 0fd4fc8e2..e047983dd 100644
--- a/go.work.sum
+++ b/go.work.sum
@@ -125,6 +125,7 @@ cloud.google.com/go/compute v1.23.1/go.mod h1:CqB3xpmPKKt3OJpW2ndFIXnA9A4xAy/F3X
cloud.google.com/go/compute v1.23.3/go.mod h1:VCgBUoMnIVIR0CscqQiPJLAG25E3ZRZMzcFZeQ+h8CI=
cloud.google.com/go/compute v1.24.0 h1:phWcR2eWzRJaL/kOiJwfFsPs4BaKq1j6vnpZrc1YlVg=
cloud.google.com/go/compute v1.24.0/go.mod h1:kw1/T+h/+tK2LJK0wiPPx1intgdAM3j/g3hFDlscY40=
+cloud.google.com/go/compute v1.25.1/go.mod h1:oopOIR53ly6viBYxaDhBfJwzUAxf1zE//uf3IB011ls=
cloud.google.com/go/compute/metadata v0.3.0 h1:Tz+eQXMEqDIKRsmY3cHTL6FVaynIjX2QxYC4trgAKZc=
cloud.google.com/go/compute/metadata v0.3.0/go.mod h1:zFmK7XCadkQkj6TtorcaGlCW1hT1fIilQDwofLpJ20k=
cloud.google.com/go/contactcenterinsights v1.6.0 h1:jXIpfcH/VYSE1SYcPzO0n1VVb+sAamiLOgCw45JbOQk=
@@ -605,6 +606,7 @@ github.com/cncf/xds/go v0.0.0-20230607035331-e9ce68804cb4/go.mod h1:eXthEFrGJvWH
github.com/cncf/xds/go v0.0.0-20231109132714-523115ebc101/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs=
github.com/cncf/xds/go v0.0.0-20231128003011-0fa0005c9caa h1:jQCWAUqqlij9Pgj2i/PB79y4KOPYVyFYdROxgaCwdTQ=
github.com/cncf/xds/go v0.0.0-20231128003011-0fa0005c9caa/go.mod h1:x/1Gn8zydmfq8dk6e9PdstVsDgu9RuyIIJqAaF//0IM=
+github.com/cncf/xds/go v0.0.0-20240318125728-8a4994d93e50/go.mod h1:5e1+Vvlzido69INQaVO6d87Qn543Xr6nooe9Kz7oBFM=
github.com/containerd/console v1.0.3 h1:lIr7SlA5PxZyMV30bDW0MGbiOPXwc63yRuCP0ARubLw=
github.com/containerd/console v1.0.3/go.mod h1:7LqA/THxQ86k76b8c/EMSiaJ3h1eZkMkXar0TQ1gf3U=
github.com/coreos/go-oidc v2.2.1+incompatible h1:mh48q/BqXqgjVHpy2ZY7WnWAbenxRjsz9N1i1YxjHAk=
@@ -965,6 +967,7 @@ google.golang.org/genproto/googleapis/api v0.0.0-20240205150955-31a09d347014/go.
google.golang.org/genproto/googleapis/api v0.0.0-20240213162025-012b6fc9bca9/go.mod h1:PVreiBMirk8ypES6aw9d4p6iiBNSIfZEBqr3UGoAi2E=
google.golang.org/genproto/googleapis/api v0.0.0-20240227224415-6ceb2ff114de h1:jFNzHPIeuzhdRwVhbZdiym9q0ory/xY3sA+v2wPg8I0=
google.golang.org/genproto/googleapis/api v0.0.0-20240227224415-6ceb2ff114de/go.mod h1:5iCWqnniDlqZHrd3neWVTOwvh/v6s3232omMecelax8=
+google.golang.org/genproto/googleapis/api v0.0.0-20240318140521-94a12d6c2237/go.mod h1:Z5Iiy3jtmioajWHDGFk7CeugTyHtPvMHA4UTmUkyalE=
google.golang.org/genproto/googleapis/bytestream v0.0.0-20230530153820-e85fd2cbaebc h1:g3hIDl0jRNd9PPTs2uBzYuaD5mQuwOkZY0vSc0LR32o=
google.golang.org/genproto/googleapis/bytestream v0.0.0-20231030173426-d783a09b4405/go.mod h1:GRUCuLdzVqZte8+Dl/D4N25yLzcGqqWaYkeVOwulFqw=
google.golang.org/genproto/googleapis/bytestream v0.0.0-20231212172506-995d672761c0/go.mod h1:guYXGPwC6jwxgWKW5Y405fKWOFNwlvUlUnzyp9i0uqo=
@@ -1005,6 +1008,7 @@ k8s.io/klog/v2 v2.80.1/go.mod h1:y1WjHnz7Dj687irZUWR/WLkLc5N1YHtjLdmgWjndZn0=
k8s.io/kms v0.29.3/go.mod h1:TBGbJKpRUMk59neTMDMddjIDL+D4HuFUbpuiuzmOPg0=
k8s.io/kms v0.30.0 h1:ZlnD/ei5lpvUlPw6eLfVvH7d8i9qZ6HwUQgydNVks8g=
k8s.io/kms v0.30.0/go.mod h1:GrMurD0qk3G4yNgGcsCEmepqf9KyyIrTXYR2lyUOJC4=
+k8s.io/kms v0.30.1/go.mod h1:GrMurD0qk3G4yNgGcsCEmepqf9KyyIrTXYR2lyUOJC4=
k8s.io/kube-openapi v0.0.0-20240228011516-70dd3763d340/go.mod h1:yD4MZYeKMBwQKVht279WycxKyM84kkAx2DPrTXaeb98=
k8s.io/utils v0.0.0-20210802155522-efc7438f0176/go.mod h1:jPW/WVKK9YHAvNhRxK0md/EJ228hCsBRufyofKtW8HA=
k8s.io/utils v0.0.0-20230726121419-3b25d923346b/go.mod h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0=
diff --git a/images/kube-webhook-certgen/rootfs/go.mod b/images/kube-webhook-certgen/rootfs/go.mod
index 94da139a2..9c7f96e1b 100644
--- a/images/kube-webhook-certgen/rootfs/go.mod
+++ b/images/kube-webhook-certgen/rootfs/go.mod
@@ -24,7 +24,6 @@ require (
github.com/golang/protobuf v1.5.4 // indirect
github.com/google/gnostic-models v0.6.8 // indirect
github.com/google/gofuzz v1.2.0 // indirect
- github.com/google/pprof v0.0.0-20240225044709-fd706174c886 // indirect
github.com/google/uuid v1.6.0 // indirect
github.com/imdario/mergo v0.3.16 // indirect
github.com/inconshreveable/mousetrap v1.1.0 // indirect
@@ -34,18 +33,17 @@ require (
github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd // indirect
github.com/modern-go/reflect2 v1.0.2 // indirect
github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 // indirect
- github.com/onsi/ginkgo/v2 v2.17.1 // indirect
- github.com/onsi/gomega v1.30.0 // indirect
+ github.com/onsi/ginkgo/v2 v2.19.0 // indirect
+ github.com/onsi/gomega v1.33.1 // indirect
github.com/pkg/errors v0.9.1 // indirect
github.com/spf13/pflag v1.0.5 // indirect
github.com/stretchr/testify v1.9.0 // indirect
- golang.org/x/net v0.23.0 // indirect
+ golang.org/x/net v0.25.0 // indirect
golang.org/x/oauth2 v0.18.0 // indirect
- golang.org/x/sys v0.18.0 // indirect
- golang.org/x/term v0.18.0 // indirect
- golang.org/x/text v0.14.0 // indirect
+ golang.org/x/sys v0.20.0 // indirect
+ golang.org/x/term v0.20.0 // indirect
+ golang.org/x/text v0.15.0 // indirect
golang.org/x/time v0.5.0 // indirect
- golang.org/x/tools v0.18.0 // indirect
google.golang.org/appengine v1.6.8 // indirect
google.golang.org/protobuf v1.33.0 // indirect
gopkg.in/inf.v0 v0.9.1 // indirect
diff --git a/images/kube-webhook-certgen/rootfs/go.sum b/images/kube-webhook-certgen/rootfs/go.sum
index 613ff3e2e..57b4a450b 100644
--- a/images/kube-webhook-certgen/rootfs/go.sum
+++ b/images/kube-webhook-certgen/rootfs/go.sum
@@ -15,7 +15,8 @@ github.com/go-openapi/jsonreference v0.20.4/go.mod h1:5pZJyJP2MnYCpoeoMAql78cCHa
github.com/go-openapi/swag v0.22.9 h1:XX2DssF+mQKM2DHsbgZK74y/zj4mo9I99+89xUmuZCE=
github.com/go-openapi/swag v0.22.9/go.mod h1:3/OXnFfnMAwBD099SwYRk7GD3xOrr1iL7d/XNLXVVwE=
github.com/go-task/slim-sprig v0.0.0-20230315185526-52ccab3ef572 h1:tfuBGBXKqDEevZMzYi5KSi8KkcZtzBcTgAUUtapy0OI=
-github.com/go-task/slim-sprig v0.0.0-20230315185526-52ccab3ef572/go.mod h1:9Pwr4B2jHnOSGXyyzV8ROjYa2ojvAY6HCGYYfMoC3Ls=
+github.com/go-task/slim-sprig/v3 v3.0.0 h1:sUs3vkvUymDpBKi3qH1YSqBQk9+9D/8M2mN1vB6EwHI=
+github.com/go-task/slim-sprig/v3 v3.0.0/go.mod h1:W848ghGpv3Qj3dhTPRyJypKRiqCdHZiAzKg9hl15HA8=
github.com/gogo/protobuf v1.3.2 h1:Ov1cvc58UF3b5XjBnZv7+opcTcQFZebYjWzi34vdm4Q=
github.com/gogo/protobuf v1.3.2/go.mod h1:P1XiOD3dCwIKUDQYPy72D8LYyHL2YPYrpS2s69NZV8Q=
github.com/golang/protobuf v1.5.0/go.mod h1:FsONVRAS9T7sI+LIUmWTfcYkHO4aIWwzhcaSAoJOfIk=
@@ -31,8 +32,8 @@ github.com/google/go-cmp v0.6.0/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeN
github.com/google/gofuzz v1.0.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
github.com/google/gofuzz v1.2.0 h1:xRy4A+RhZaiKjJ1bPfwQ8sedCA+YS2YcCHW6ec7JMi0=
github.com/google/gofuzz v1.2.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
-github.com/google/pprof v0.0.0-20240225044709-fd706174c886 h1:JSJUTZTQT1Gzb2ROdAKOY3HwzBYcclS2GgumhMfHqjw=
-github.com/google/pprof v0.0.0-20240225044709-fd706174c886/go.mod h1:czg5+yv1E0ZGTi6S6vVK1mke0fV+FaUhNGcd6VRS9Ik=
+github.com/google/pprof v0.0.0-20240424215950-a892ee059fd6 h1:k7nVchz72niMH6YLQNvHSdIE7iqsQxK1P41mySCvssg=
+github.com/google/pprof v0.0.0-20240424215950-a892ee059fd6/go.mod h1:kf6iHlnVGwgKolg33glAes7Yg/8iWP8ukqeldJSO7jw=
github.com/google/uuid v1.6.0 h1:NIvaJDMOsjHA8n1jAhLSgzrAzy1Hgr+hNrb57e+94F0=
github.com/google/uuid v1.6.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
github.com/imdario/mergo v0.3.16 h1:wwQJbIsHYGMUyLSPrEq1CT16AhnhNJQ51+4fdHUnCl4=
@@ -60,10 +61,10 @@ github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 h1:C3w9PqII01/Oq
github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822/go.mod h1:+n7T8mK8HuQTcFwEeznm/DIxMOiR9yIdICNftLE1DvQ=
github.com/onrik/logrus v0.11.0 h1:pu+BCaWL36t0yQaj/2UHK2erf88dwssAKOT51mxPUVs=
github.com/onrik/logrus v0.11.0/go.mod h1:fO2vlZwIdti6PidD3gV5YKt9Lq5ptpnP293RAe1ITwk=
-github.com/onsi/ginkgo/v2 v2.17.1 h1:V++EzdbhI4ZV4ev0UTIj0PzhzOcReJFyJaLjtSF55M8=
-github.com/onsi/ginkgo/v2 v2.17.1/go.mod h1:llBI3WDLL9Z6taip6f33H76YcWtJv+7R3HigUjbIBOs=
-github.com/onsi/gomega v1.30.0 h1:hvMK7xYz4D3HapigLTeGdId/NcfQx1VHMJc60ew99+8=
-github.com/onsi/gomega v1.30.0/go.mod h1:9sxs+SwGrKI0+PWe4Fxa9tFQQBG5xSsSbMXOI8PPpoQ=
+github.com/onsi/ginkgo/v2 v2.19.0 h1:9Cnnf7UHo57Hy3k6/m5k3dRfGTMXGvxhHFvkDTCTpvA=
+github.com/onsi/ginkgo/v2 v2.19.0/go.mod h1:rlwLi9PilAFJ8jCg9UE1QP6VBpd6/xj3SRC0d6TU0To=
+github.com/onsi/gomega v1.33.1 h1:dsYjIxxSR755MDmKVsaFQTE22ChNBcuuTWgkUDSubOk=
+github.com/onsi/gomega v1.33.1/go.mod h1:U4R44UsT+9eLIaYRB2a5qajjtQYn0hauxvRm16AVYg0=
github.com/pkg/errors v0.9.1 h1:FEBLx1zS214owpjy7qsBeixbURkuhQAwrK5UwLGTwt4=
github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
@@ -104,8 +105,8 @@ golang.org/x/net v0.0.0-20200226121028-0de0cce0169b/go.mod h1:z5CRVTTTmAJ677TzLL
golang.org/x/net v0.0.0-20201021035429-f5854403a974/go.mod h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU=
golang.org/x/net v0.0.0-20210226172049-e18ecbb05110/go.mod h1:m0MpNAwzfU5UDzcl9v0D8zg8gWTRqZa9RBIspLL5mdg=
golang.org/x/net v0.0.0-20220722155237-a158d28d115b/go.mod h1:XRhObCWvk6IyKnWLug+ECip1KBveYUHfp+8e9klMJ9c=
-golang.org/x/net v0.23.0 h1:7EYJ93RZ9vYSZAIb2x3lnuvqO5zneoD6IvWjuhfxjTs=
-golang.org/x/net v0.23.0/go.mod h1:JKghWKKOSdJwpW2GEx0Ja7fmaKnMsbu+MWVZTokSYmg=
+golang.org/x/net v0.25.0 h1:d/OCCoBEUq33pjydKrGQhw7IlUPI2Oylr+8qLx49kac=
+golang.org/x/net v0.25.0/go.mod h1:JkAGAh7GEvH74S6FOH42FLoXpXbE/aqXSrIQjXgsiwM=
golang.org/x/oauth2 v0.18.0 h1:09qnuIAgzdx1XplqJvW6CQqMCtGZykZWcXzPMPUusvI=
golang.org/x/oauth2 v0.18.0/go.mod h1:Wf7knwG0MPoWIMMBgFlEaSUDaKskp0dCfrlJRJXbBi8=
golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
@@ -120,18 +121,18 @@ golang.org/x/sys v0.0.0-20210615035016-665e8c7367d1/go.mod h1:oPkhp1MJrh7nUepCBc
golang.org/x/sys v0.0.0-20220520151302-bc2c85ada10a/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.0.0-20220715151400-c0bba94af5f8/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.0.0-20220722155257-8c9f86f7a55f/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.18.0 h1:DBdB3niSjOA/O0blCZBqDefyWNYveAYMNF1Wum0DYQ4=
-golang.org/x/sys v0.18.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
+golang.org/x/sys v0.20.0 h1:Od9JTbYCk261bKm4M/mw7AklTlFYIa0bIp9BgSm1S8Y=
+golang.org/x/sys v0.20.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8=
-golang.org/x/term v0.18.0 h1:FcHjZXDMxI8mM3nwhX9HlKop4C0YQvCVCdwYl2wOtE8=
-golang.org/x/term v0.18.0/go.mod h1:ILwASektA3OnRv7amZ1xhE/KTR+u50pbXfZ03+6Nx58=
+golang.org/x/term v0.20.0 h1:VnkxpohqXaOBYJtBmEppKUG6mXpi+4O6purfc2+sMhw=
+golang.org/x/term v0.20.0/go.mod h1:8UkIAJTvZgivsXaD6/pH6U9ecQzZ45awqEOzuCvwpFY=
golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
golang.org/x/text v0.3.3/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
golang.org/x/text v0.3.7/go.mod h1:u+2+/6zg+i71rQMx5EYifcz6MCKuco9NR6JIITiCfzQ=
golang.org/x/text v0.3.8/go.mod h1:E6s5w1FMmriuDzIBO73fBruAKo1PCIq6d2Q6DHfQ8WQ=
-golang.org/x/text v0.14.0 h1:ScX5w1eTa3QqT8oi6+ziP7dTV1S2+ALU0bI+0zXKWiQ=
-golang.org/x/text v0.14.0/go.mod h1:18ZOQIKpY8NJVqYksKHtTdi31H5itFRjB5/qKTNYzSU=
+golang.org/x/text v0.15.0 h1:h1V/4gjBv8v9cjcR6+AR5+/cIYK5N/WAgiv4xlsEtAk=
+golang.org/x/text v0.15.0/go.mod h1:18ZOQIKpY8NJVqYksKHtTdi31H5itFRjB5/qKTNYzSU=
golang.org/x/time v0.5.0 h1:o7cqy6amK/52YcAKIPlM3a+Fpj35zvRj2TP+e1xFSfk=
golang.org/x/time v0.5.0/go.mod h1:3BpzKBy/shNhVucY/MWOyx10tF3SFh9QdLuxbVysPQM=
golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
@@ -139,8 +140,8 @@ golang.org/x/tools v0.0.0-20191119224855-298f0cb1881e/go.mod h1:b+2E5dAYhXwXZwtn
golang.org/x/tools v0.0.0-20200619180055-7c47624df98f/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
golang.org/x/tools v0.0.0-20210106214847-113979e3529a/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
golang.org/x/tools v0.1.12/go.mod h1:hNGJHUnrk76NpqgfD5Aqm5Crs+Hm0VOH/i9J2+nxYbc=
-golang.org/x/tools v0.18.0 h1:k8NLag8AGHnn+PHbl7g43CtqZAwG60vZkLqgyZgIHgQ=
-golang.org/x/tools v0.18.0/go.mod h1:GL7B4CwcLLeo59yx/9UWWuNOW1n3VZ4f5axWfML7Lcg=
+golang.org/x/tools v0.21.0 h1:qc0xYgIbsSDt9EyWz05J5wfa7LOVW0YTLOXrqdLAWIw=
+golang.org/x/tools v0.21.0/go.mod h1:aiJjzUbINMkxbQROHiO6hDPo2LHcIPhhQsa9DLh0yGk=
golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
diff --git a/images/test-runner/Makefile b/images/test-runner/Makefile
index d82427140..7e30d432f 100644
--- a/images/test-runner/Makefile
+++ b/images/test-runner/Makefile
@@ -59,7 +59,7 @@ image:
--build-arg YAML_LINT_VERSION=1.33.0 \
--build-arg YAMALE_VERSION=4.0.4 \
--build-arg HELM_VERSION=3.14.4 \
- --build-arg GINKGO_VERSION=2.17.2 \
+ --build-arg GINKGO_VERSION=2.19.0 \
--build-arg GOLINT_VERSION=latest \
-t ${IMAGE}:${TAG} rootfs
@@ -80,7 +80,7 @@ build: ensure-buildx
--build-arg YAML_LINT_VERSION=1.33.0 \
--build-arg YAMALE_VERSION=4.0.4 \
--build-arg HELM_VERSION=3.14.4 \
- --build-arg GINKGO_VERSION=2.17.2 \
+ --build-arg GINKGO_VERSION=2.19.0 \
--build-arg GOLINT_VERSION=latest \
-t ${IMAGE}:${TAG} rootfs
diff --git a/magefiles/go.sum b/magefiles/go.sum
index 5f402c490..16bc8460f 100644
--- a/magefiles/go.sum
+++ b/magefiles/go.sum
@@ -31,6 +31,7 @@ github.com/golang/protobuf v1.4.2/go.mod h1:oDoupMAO8OvCJWAcko0GGGIgR6R6ocIYbsSw
github.com/golang/protobuf v1.5.0/go.mod h1:FsONVRAS9T7sI+LIUmWTfcYkHO4aIWwzhcaSAoJOfIk=
github.com/golang/protobuf v1.5.2/go.mod h1:XVQd3VNwM+JqD3oG2Ue2ip4fOMUkwXdXDdiuN0vRsmY=
github.com/golang/protobuf v1.5.4 h1:i7eJL8qZTpSEXOPTxNKhASYpMn+8e5Q6AdndVa1dWek=
+github.com/golang/protobuf v1.5.4/go.mod h1:lnTiLA8Wa4RWRcIUkrtSVa5nRhsEGBg48fD6rSs7xps=
github.com/google/go-cmp v0.3.0/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU=
github.com/google/go-cmp v0.3.1/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU=
github.com/google/go-cmp v0.4.0/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
@@ -79,6 +80,7 @@ github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+
github.com/stretchr/testify v1.4.0/go.mod h1:j7eGeouHqKxXV5pUuKE4zz7dFj8WfuZ+81PSLYec5m4=
github.com/stretchr/testify v1.5.1/go.mod h1:5W2xD1RspED5o8YsWQXVCued0rvSQ+mT+I5cxcmMvtA=
github.com/stretchr/testify v1.9.0 h1:HtqpIVDClZ4nwg75+f6Lvsy/wHu+3BoSGCbBAcpTsTg=
+github.com/stretchr/testify v1.9.0/go.mod h1:r2ic/lqez/lEtzL7wO/rwa5dbSLXVDPFyf8C91i36aY=
github.com/vmware-labs/yaml-jsonpath v0.3.2 h1:/5QKeCBGdsInyDCyVNLbXyilb61MXGi9NP674f9Hobk=
github.com/vmware-labs/yaml-jsonpath v0.3.2/go.mod h1:U6whw1z03QyqgWdgXxvVnQ90zN1BWz5V+51Ewf8k+rQ=
github.com/yuin/goldmark v1.2.1/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
@@ -88,6 +90,7 @@ golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8U
golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
golang.org/x/crypto v0.0.0-20210921155107-089bfa567519/go.mod h1:GvvjBRRGRdwPK5ydBHafDWAxML/pGHZbMvKqRZ5+Abc=
golang.org/x/crypto v0.21.0 h1:X31++rzVUdKhX5sWmSOFZxx8UW/ldWx55cbf08iNAMA=
+golang.org/x/crypto v0.21.0/go.mod h1:0BP7YvVV9gBbVKyeTG0Gyn+gZm94bibOW5BjDEYAOMs=
golang.org/x/mod v0.3.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
golang.org/x/mod v0.6.0-dev.0.20220419223038-86c51ed26bb4/go.mod h1:jJ57K6gSWd91VN4djpZkiMVwK6gcyfeH4XE8wZrZaV4=
golang.org/x/net v0.0.0-20180906233101-161cd47e91fd/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
@@ -98,7 +101,9 @@ golang.org/x/net v0.0.0-20201021035429-f5854403a974/go.mod h1:sp8m0HH+o8qH0wwXwY
golang.org/x/net v0.0.0-20210226172049-e18ecbb05110/go.mod h1:m0MpNAwzfU5UDzcl9v0D8zg8gWTRqZa9RBIspLL5mdg=
golang.org/x/net v0.0.0-20220722155237-a158d28d115b/go.mod h1:XRhObCWvk6IyKnWLug+ECip1KBveYUHfp+8e9klMJ9c=
golang.org/x/net v0.22.0 h1:9sGLhx7iRIHEiX0oAJ3MRZMUCElJgy7Br1nO+AMN3Tc=
+golang.org/x/net v0.22.0/go.mod h1:JKghWKKOSdJwpW2GEx0Ja7fmaKnMsbu+MWVZTokSYmg=
golang.org/x/oauth2 v0.18.0 h1:09qnuIAgzdx1XplqJvW6CQqMCtGZykZWcXzPMPUusvI=
+golang.org/x/oauth2 v0.18.0/go.mod h1:Wf7knwG0MPoWIMMBgFlEaSUDaKskp0dCfrlJRJXbBi8=
golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sync v0.0.0-20201020160332-67f06af15bc9/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
@@ -117,6 +122,7 @@ golang.org/x/sys v0.0.0-20210615035016-665e8c7367d1/go.mod h1:oPkhp1MJrh7nUepCBc
golang.org/x/sys v0.0.0-20220520151302-bc2c85ada10a/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.0.0-20220722155257-8c9f86f7a55f/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.18.0 h1:DBdB3niSjOA/O0blCZBqDefyWNYveAYMNF1Wum0DYQ4=
+golang.org/x/sys v0.18.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8=
golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
@@ -163,5 +169,6 @@ gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c/go.mod h1:K4uyk7z7BCEPqu6E+C
gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA=
gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
k8s.io/apimachinery v0.29.3 h1:2tbx+5L7RNvqJjn7RIuIKu9XTsIZ9Z5wX2G22XAa5EU=
+k8s.io/apimachinery v0.29.3/go.mod h1:hx/S4V2PNW4OMg3WizRrHutyB5la0iCUbZym+W0EQIU=
k8s.io/helm v2.17.0+incompatible h1:Bpn6o1wKLYqKM3+Osh8e+1/K2g/GsQJ4F4yNF2+deao=
k8s.io/helm v2.17.0+incompatible/go.mod h1:LZzlS4LQBHfciFOurYBFkCMTaZ0D1l+p0teMg7TSULI=
diff --git a/test/e2e/run-chart-test.sh b/test/e2e/run-chart-test.sh
index dadb5195d..4b5c6eae0 100755
--- a/test/e2e/run-chart-test.sh
+++ b/test/e2e/run-chart-test.sh
@@ -78,7 +78,7 @@ fi
if [ "${SKIP_IMAGE_CREATION:-false}" = "false" ]; then
if ! command -v ginkgo &> /dev/null; then
- go install github.com/onsi/ginkgo/v2/ginkgo@v2.17.1
+ go install github.com/onsi/ginkgo/v2/ginkgo@v2.19.0
fi
echo "[dev-env] building image"
make -C ${DIR}/../../ clean-image build image
diff --git a/test/e2e/run-kind-e2e.sh b/test/e2e/run-kind-e2e.sh
index 128964393..640632a1b 100755
--- a/test/e2e/run-kind-e2e.sh
+++ b/test/e2e/run-kind-e2e.sh
@@ -96,7 +96,7 @@ fi
if [ "${SKIP_E2E_IMAGE_CREATION}" = "false" ]; then
if ! command -v ginkgo &> /dev/null; then
- go install github.com/onsi/ginkgo/v2/ginkgo@v2.17.1
+ go install github.com/onsi/ginkgo/v2/ginkgo@v2.19.0
fi
echo "[dev-env] .. done building controller images"
From 471bc34f5d50cc4e2979639f12f946944ec0fade Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Sat, 15 Jun 2024 09:41:28 -0700
Subject: [PATCH 099/283] Bump golang.org/x/crypto from 0.23.0 to 0.24.0
(#11442)
Bumps [golang.org/x/crypto](https://github.com/golang/crypto) from 0.23.0 to 0.24.0.
- [Commits](https://github.com/golang/crypto/compare/v0.23.0...v0.24.0)
---
updated-dependencies:
- dependency-name: golang.org/x/crypto
dependency-type: direct:production
update-type: version-update:semver-minor
...
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 10 +++++-----
go.sum | 20 ++++++++++----------
2 files changed, 15 insertions(+), 15 deletions(-)
diff --git a/go.mod b/go.mod
index 4ef8611cd..2627556f8 100644
--- a/go.mod
+++ b/go.mod
@@ -27,7 +27,7 @@ require (
github.com/stretchr/testify v1.9.0
github.com/yudai/gojsondiff v1.0.0
github.com/zakjan/cert-chain-resolver v0.0.0-20221221105603-fcedb00c5b30
- golang.org/x/crypto v0.23.0
+ golang.org/x/crypto v0.24.0
golang.org/x/exp v0.0.0-20240416160154-fe59bbe5cc7f
google.golang.org/grpc v1.64.0
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab
@@ -112,11 +112,11 @@ require (
golang.org/x/net v0.25.0 // indirect
golang.org/x/oauth2 v0.20.0 // indirect
golang.org/x/sync v0.7.0 // indirect
- golang.org/x/sys v0.20.0 // indirect
- golang.org/x/term v0.20.0 // indirect
- golang.org/x/text v0.15.0 // indirect
+ golang.org/x/sys v0.21.0 // indirect
+ golang.org/x/term v0.21.0 // indirect
+ golang.org/x/text v0.16.0 // indirect
golang.org/x/time v0.5.0 // indirect
- golang.org/x/tools v0.21.0 // indirect
+ golang.org/x/tools v0.21.1-0.20240508182429-e35e4ccd0d2d // indirect
google.golang.org/genproto/googleapis/rpc v0.0.0-20240429193739-8cf5692501f6 // indirect
google.golang.org/protobuf v1.34.0 // indirect
gopkg.in/evanphx/json-patch.v5 v5.9.0 // indirect
diff --git a/go.sum b/go.sum
index 205f07a7f..09594f63b 100644
--- a/go.sum
+++ b/go.sum
@@ -1165,8 +1165,8 @@ golang.org/x/crypto v0.16.0/go.mod h1:gCAAfMLgwOJRpTjQ2zCCt2OcSfYMTeZVSRtQlPC7Nq
golang.org/x/crypto v0.18.0/go.mod h1:R0j02AL6hcrfOiy9T4ZYp/rcWeMxM3L6QYxlOuEG1mg=
golang.org/x/crypto v0.19.0/go.mod h1:Iy9bg/ha4yyC70EfRS8jz+B6ybOBKMaSxLj6P6oBDfU=
golang.org/x/crypto v0.21.0/go.mod h1:0BP7YvVV9gBbVKyeTG0Gyn+gZm94bibOW5BjDEYAOMs=
-golang.org/x/crypto v0.23.0 h1:dIJU/v2J8Mdglj/8rJ6UUOM3Zc9zLZxVZwwxMooUSAI=
-golang.org/x/crypto v0.23.0/go.mod h1:CKFgDieR+mRhux2Lsu27y0fO304Db0wZe70UKqHu0v8=
+golang.org/x/crypto v0.24.0 h1:mnl8DM0o513X8fdIkmyFE/5hTYxbwYOjDS/+rK6qpRI=
+golang.org/x/crypto v0.24.0/go.mod h1:Z1PMYSOR5nyMcyAVAIQSKCDwalqy85Aqn1x3Ws4L5DM=
golang.org/x/exp v0.0.0-20180321215751-8460e604b9de/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
golang.org/x/exp v0.0.0-20180807140117-3d87b88a115f/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
@@ -1459,8 +1459,8 @@ golang.org/x/sys v0.15.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
golang.org/x/sys v0.16.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
golang.org/x/sys v0.17.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
golang.org/x/sys v0.18.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
-golang.org/x/sys v0.20.0 h1:Od9JTbYCk261bKm4M/mw7AklTlFYIa0bIp9BgSm1S8Y=
-golang.org/x/sys v0.20.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
+golang.org/x/sys v0.21.0 h1:rF+pYz3DAGSQAxAu1CbC7catZg4ebC4UIeIhKxBZvws=
+golang.org/x/sys v0.21.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8=
golang.org/x/term v0.1.0/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8=
@@ -1477,8 +1477,8 @@ golang.org/x/term v0.15.0/go.mod h1:BDl952bC7+uMoWR75FIrCDx79TPU9oHkTZ9yRbYOrX0=
golang.org/x/term v0.16.0/go.mod h1:yn7UURbUtPyrVJPGPq404EukNFxcm/foM+bV/bfcDsY=
golang.org/x/term v0.17.0/go.mod h1:lLRBjIVuehSbZlaOtGMbcMncT+aqLLLmKrsjNrUguwk=
golang.org/x/term v0.18.0/go.mod h1:ILwASektA3OnRv7amZ1xhE/KTR+u50pbXfZ03+6Nx58=
-golang.org/x/term v0.20.0 h1:VnkxpohqXaOBYJtBmEppKUG6mXpi+4O6purfc2+sMhw=
-golang.org/x/term v0.20.0/go.mod h1:8UkIAJTvZgivsXaD6/pH6U9ecQzZ45awqEOzuCvwpFY=
+golang.org/x/term v0.21.0 h1:WVXCp+/EBEHOj53Rvu+7KiT/iElMrO8ACK16SMZ3jaA=
+golang.org/x/term v0.21.0/go.mod h1:ooXLefLobQVslOqselCNF4SxFAaoS6KujMbsGzSDmX0=
golang.org/x/text v0.0.0-20170915032832-14c0d48ead0c/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
golang.org/x/text v0.3.1-0.20180807135948-17ff2d5776d2/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
@@ -1497,8 +1497,8 @@ golang.org/x/text v0.8.0/go.mod h1:e1OnstbJyHTd6l/uOt8jFFHp6TRDWZR/bV3emEE/zU8=
golang.org/x/text v0.9.0/go.mod h1:e1OnstbJyHTd6l/uOt8jFFHp6TRDWZR/bV3emEE/zU8=
golang.org/x/text v0.13.0/go.mod h1:TvPlkZtksWOMsz7fbANvkp4WM8x/WCo/om8BMLbz+aE=
golang.org/x/text v0.14.0/go.mod h1:18ZOQIKpY8NJVqYksKHtTdi31H5itFRjB5/qKTNYzSU=
-golang.org/x/text v0.15.0 h1:h1V/4gjBv8v9cjcR6+AR5+/cIYK5N/WAgiv4xlsEtAk=
-golang.org/x/text v0.15.0/go.mod h1:18ZOQIKpY8NJVqYksKHtTdi31H5itFRjB5/qKTNYzSU=
+golang.org/x/text v0.16.0 h1:a94ExnEXNtEwYLGJSIUxnWoxoRz/ZcCsV63ROupILh4=
+golang.org/x/text v0.16.0/go.mod h1:GhwF1Be+LQoKShO3cGOHzqOgRrGaYc9AvblQOmPVHnI=
golang.org/x/time v0.0.0-20181108054448-85acf8d2951c/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
golang.org/x/time v0.0.0-20190308202827-9d24e82272b4/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
golang.org/x/time v0.0.0-20191024005414-555d28b269f0/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
@@ -1571,8 +1571,8 @@ golang.org/x/tools v0.1.12/go.mod h1:hNGJHUnrk76NpqgfD5Aqm5Crs+Hm0VOH/i9J2+nxYbc
golang.org/x/tools v0.3.0/go.mod h1:/rWhSS2+zyEVwoJf8YAX6L2f0ntZ7Kn/mGgAWcipA5k=
golang.org/x/tools v0.6.0/go.mod h1:Xwgl3UAJ/d3gWutnCtw505GrjyAbvKui8lOU390QaIU=
golang.org/x/tools v0.7.0/go.mod h1:4pg6aUX35JBAogB10C9AtvVL+qowtN4pT3CGSQex14s=
-golang.org/x/tools v0.21.0 h1:qc0xYgIbsSDt9EyWz05J5wfa7LOVW0YTLOXrqdLAWIw=
-golang.org/x/tools v0.21.0/go.mod h1:aiJjzUbINMkxbQROHiO6hDPo2LHcIPhhQsa9DLh0yGk=
+golang.org/x/tools v0.21.1-0.20240508182429-e35e4ccd0d2d h1:vU5i/LfpvrRCpgM/VPfJLg5KjxD3E+hfT1SH+d9zLwg=
+golang.org/x/tools v0.21.1-0.20240508182429-e35e4ccd0d2d/go.mod h1:aiJjzUbINMkxbQROHiO6hDPo2LHcIPhhQsa9DLh0yGk=
golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
From f1026b484905de9966c250b6fd3e46961aecf1fd Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 17 Jun 2024 04:09:29 -0700
Subject: [PATCH 100/283] Bump the all group with 2 updates (#11476)
Bumps the all group with 2 updates: [actions/checkout](https://github.com/actions/checkout) and [github/codeql-action](https://github.com/github/codeql-action).
Updates `actions/checkout` from 4.1.6 to 4.1.7
- [Release notes](https://github.com/actions/checkout/releases)
- [Changelog](https://github.com/actions/checkout/blob/main/CHANGELOG.md)
- [Commits](https://github.com/actions/checkout/compare/a5ac7e51b41094c92402da3b24376905380afc29...692973e3d937129bcbf40652eb9f2f61becf3332)
Updates `github/codeql-action` from 3.25.8 to 3.25.10
- [Release notes](https://github.com/github/codeql-action/releases)
- [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md)
- [Commits](https://github.com/github/codeql-action/compare/2e230e8fe0ad3a14a340ad0815ddb96d599d2aff...23acc5c183826b7a8a97bce3cecc52db901f8251)
---
updated-dependencies:
- dependency-name: actions/checkout
dependency-type: direct:production
update-type: version-update:semver-patch
dependency-group: all
- dependency-name: github/codeql-action
dependency-type: direct:production
update-type: version-update:semver-patch
dependency-group: all
...
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
.github/workflows/ci.yaml | 10 +++++-----
.github/workflows/depreview.yaml | 2 +-
.github/workflows/docs.yaml | 4 ++--
.github/workflows/golangci-lint.yml | 2 +-
.github/workflows/helm.yaml | 4 ++--
.github/workflows/images.yaml | 8 ++++----
.github/workflows/perftest.yaml | 2 +-
.github/workflows/plugin.yaml | 2 +-
.github/workflows/scorecards.yml | 4 ++--
.github/workflows/vulnerability-scans.yaml | 6 +++---
.github/workflows/zz-tmpl-images.yaml | 6 +++---
.github/workflows/zz-tmpl-k8s-e2e.yaml | 2 +-
12 files changed, 26 insertions(+), 26 deletions(-)
diff --git a/.github/workflows/ci.yaml b/.github/workflows/ci.yaml
index 70369418f..a2e036f72 100644
--- a/.github/workflows/ci.yaml
+++ b/.github/workflows/ci.yaml
@@ -47,7 +47,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
+ uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- uses: dorny/paths-filter@de90cc6fb38fc0963ad72b210f1f284cd68cea36 # v3.0.2
id: filter
@@ -77,7 +77,7 @@ jobs:
(needs.changes.outputs.go == 'true')
steps:
- name: Checkout
- uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
+ uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- name: Get go version
run: echo "GOLANG_VERSION=$(cat GOLANG_VERSION)" >> $GITHUB_ENV
@@ -105,7 +105,7 @@ jobs:
PLATFORMS: linux/amd64
steps:
- name: Checkout
- uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
+ uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- name: Get go version
id: golangversion
@@ -179,7 +179,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
+ uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
with:
fetch-depth: 0
@@ -239,7 +239,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
+ uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- name: Setup Go
uses: actions/setup-go@cdcb36043654635271a94b9a6d1392de5bb323a7 # v5.0.1
diff --git a/.github/workflows/depreview.yaml b/.github/workflows/depreview.yaml
index 2aacbd6cc..572121886 100644
--- a/.github/workflows/depreview.yaml
+++ b/.github/workflows/depreview.yaml
@@ -9,6 +9,6 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: 'Checkout Repository'
- uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
+ uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- name: 'Dependency Review'
uses: actions/dependency-review-action@72eb03d02c7872a771aacd928f3123ac62ad6d3a # v4.3.3
diff --git a/.github/workflows/docs.yaml b/.github/workflows/docs.yaml
index 0e12a0dc7..c1434c7b7 100644
--- a/.github/workflows/docs.yaml
+++ b/.github/workflows/docs.yaml
@@ -23,7 +23,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
+ uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- uses: dorny/paths-filter@de90cc6fb38fc0963ad72b210f1f284cd68cea36 # v3.0.2
id: filter
@@ -47,7 +47,7 @@ jobs:
steps:
- name: Checkout master
- uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
+ uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- name: Deploy
uses: ./.github/actions/mkdocs
diff --git a/.github/workflows/golangci-lint.yml b/.github/workflows/golangci-lint.yml
index 8e6ec5200..9d91c68fb 100644
--- a/.github/workflows/golangci-lint.yml
+++ b/.github/workflows/golangci-lint.yml
@@ -15,7 +15,7 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Checkout
- uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
+ uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- name: Get go version
run: echo "GOLANG_VERSION=$(cat GOLANG_VERSION)" >> $GITHUB_ENV
diff --git a/.github/workflows/helm.yaml b/.github/workflows/helm.yaml
index f3aa7ced8..f7a68af1a 100644
--- a/.github/workflows/helm.yaml
+++ b/.github/workflows/helm.yaml
@@ -27,7 +27,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
+ uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- name: Run Artifact Hub lint
run: |
@@ -66,7 +66,7 @@ jobs:
steps:
- name: Checkout master
- uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
+ uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
with:
# Fetch entire history. Required for chart-releaser; see https://github.com/helm/chart-releaser-action/issues/13#issuecomment-602063896
fetch-depth: 0
diff --git a/.github/workflows/images.yaml b/.github/workflows/images.yaml
index cd63a376e..4aed94772 100644
--- a/.github/workflows/images.yaml
+++ b/.github/workflows/images.yaml
@@ -41,7 +41,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
+ uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- uses: dorny/paths-filter@de90cc6fb38fc0963ad72b210f1f284cd68cea36 # v3.0.2
id: filter
with:
@@ -144,7 +144,7 @@ jobs:
k8s: [v1.26.14, v1.27.11, v1.28.7, v1.29.2]
steps:
- name: Checkout
- uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
+ uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- name: Get go version
run: echo "GOLANG_VERSION=$(cat GOLANG_VERSION)" >> $GITHUB_ENV
@@ -178,7 +178,7 @@ jobs:
nginx: ['1.25.3', '1.21.6']
steps:
- name: Checkout
- uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
+ uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- name: image build
run: |
cd images/opentelemetry && make NGINX_VERSION=${{ matrix.nginx }} build
@@ -195,7 +195,7 @@ jobs:
PLATFORMS: linux/amd64,linux/arm,linux/arm64,linux/s390x
steps:
- name: Checkout
- uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
+ uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- name: Set up QEMU
uses: docker/setup-qemu-action@68827325e0b33c7199eb31dd4e31fbe9023e06e3 # v3.0.0
- name: Set up Docker Buildx
diff --git a/.github/workflows/perftest.yaml b/.github/workflows/perftest.yaml
index 9a544c645..2e1e01a3e 100644
--- a/.github/workflows/perftest.yaml
+++ b/.github/workflows/perftest.yaml
@@ -19,7 +19,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
+ uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- name: Install K6
run: |
diff --git a/.github/workflows/plugin.yaml b/.github/workflows/plugin.yaml
index 8274a6a99..3adccc5eb 100644
--- a/.github/workflows/plugin.yaml
+++ b/.github/workflows/plugin.yaml
@@ -12,7 +12,7 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Checkout
- uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
+ uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
with:
fetch-depth: 0
diff --git a/.github/workflows/scorecards.yml b/.github/workflows/scorecards.yml
index 89ee0b55b..1a40697e7 100644
--- a/.github/workflows/scorecards.yml
+++ b/.github/workflows/scorecards.yml
@@ -27,7 +27,7 @@ jobs:
steps:
- name: "Checkout code"
- uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
+ uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
with:
persist-credentials: false
@@ -59,6 +59,6 @@ jobs:
# Upload the results to GitHub's code scanning dashboard.
- name: "Upload to code-scanning"
- uses: github/codeql-action/upload-sarif@2e230e8fe0ad3a14a340ad0815ddb96d599d2aff # v3.25.8
+ uses: github/codeql-action/upload-sarif@23acc5c183826b7a8a97bce3cecc52db901f8251 # v3.25.10
with:
sarif_file: results.sarif
diff --git a/.github/workflows/vulnerability-scans.yaml b/.github/workflows/vulnerability-scans.yaml
index 19a66053f..f7ceab6c0 100644
--- a/.github/workflows/vulnerability-scans.yaml
+++ b/.github/workflows/vulnerability-scans.yaml
@@ -22,7 +22,7 @@ jobs:
versions: ${{ steps.version.outputs.TAGS }}
steps:
- name: Checkout code
- uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
+ uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
with:
fetch-depth: 0
@@ -52,7 +52,7 @@ jobs:
versions: ${{ fromJSON(needs.version.outputs.versions) }}
steps:
- name: Checkout code
- uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
+ uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- shell: bash
id: test
@@ -75,7 +75,7 @@ jobs:
# This step checks out a copy of your repository.
- name: Upload SARIF file
- uses: github/codeql-action/upload-sarif@2e230e8fe0ad3a14a340ad0815ddb96d599d2aff # v3.25.8
+ uses: github/codeql-action/upload-sarif@23acc5c183826b7a8a97bce3cecc52db901f8251 # v3.25.10
with:
token: ${{ github.token }}
# Path to SARIF file relative to the root of the repository
diff --git a/.github/workflows/zz-tmpl-images.yaml b/.github/workflows/zz-tmpl-images.yaml
index 17425a468..1ed1bbcdc 100644
--- a/.github/workflows/zz-tmpl-images.yaml
+++ b/.github/workflows/zz-tmpl-images.yaml
@@ -31,7 +31,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
+ uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- uses: dorny/paths-filter@de90cc6fb38fc0963ad72b210f1f284cd68cea36 # v3.0.2
id: filter
with:
@@ -48,7 +48,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
+ uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- name: Build
run: |
@@ -67,7 +67,7 @@ jobs:
PLATFORMS: ${{ inputs.platforms-publish }}
steps:
- name: Checkout
- uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
+ uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- name: Login to GitHub Container Registry
uses: docker/login-action@0d4c9c5ea7693da7b068278f7b52bda2a190a446 # v3.2.0
diff --git a/.github/workflows/zz-tmpl-k8s-e2e.yaml b/.github/workflows/zz-tmpl-k8s-e2e.yaml
index 016157aad..fda6f1937 100644
--- a/.github/workflows/zz-tmpl-k8s-e2e.yaml
+++ b/.github/workflows/zz-tmpl-k8s-e2e.yaml
@@ -20,7 +20,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
+ uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- name: cache
uses: actions/download-artifact@65a9edc5881444af0b9093a5e628f2fe47ea3b2e # v4.1.7
From 6bb19ea698c8a83939b77797c1748a48a3915704 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 17 Jun 2024 04:19:52 -0700
Subject: [PATCH 101/283] Bump the all group with 3 updates (#11474)
Bumps the all group with 3 updates: [github.com/opencontainers/runc](https://github.com/opencontainers/runc), [github.com/spf13/cobra](https://github.com/spf13/cobra) and [k8s.io/component-base](https://github.com/kubernetes/component-base).
Updates `github.com/opencontainers/runc` from 1.1.12 to 1.1.13
- [Release notes](https://github.com/opencontainers/runc/releases)
- [Changelog](https://github.com/opencontainers/runc/blob/main/CHANGELOG.md)
- [Commits](https://github.com/opencontainers/runc/compare/v1.1.12...v1.1.13)
Updates `github.com/spf13/cobra` from 1.8.0 to 1.8.1
- [Release notes](https://github.com/spf13/cobra/releases)
- [Commits](https://github.com/spf13/cobra/compare/v1.8.0...v1.8.1)
Updates `k8s.io/component-base` from 0.30.1 to 0.30.2
- [Commits](https://github.com/kubernetes/component-base/compare/v0.30.1...v0.30.2)
---
updated-dependencies:
- dependency-name: github.com/opencontainers/runc
dependency-type: direct:production
update-type: version-update:semver-patch
dependency-group: all
- dependency-name: github.com/spf13/cobra
dependency-type: direct:production
update-type: version-update:semver-patch
dependency-group: all
- dependency-name: k8s.io/component-base
dependency-type: direct:production
update-type: version-update:semver-patch
dependency-group: all
...
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 12 ++++++------
go.sum | 26 +++++++++++++-------------
2 files changed, 19 insertions(+), 19 deletions(-)
diff --git a/go.mod b/go.mod
index 2627556f8..873c0aeaa 100644
--- a/go.mod
+++ b/go.mod
@@ -17,12 +17,12 @@ require (
github.com/moul/pb v0.0.0-20220425114252-bca18df4138c
github.com/ncabatoff/process-exporter v0.7.11
github.com/onsi/ginkgo/v2 v2.19.0
- github.com/opencontainers/runc v1.1.12
+ github.com/opencontainers/runc v1.1.13
github.com/pmezard/go-difflib v1.0.0
github.com/prometheus/client_golang v1.19.1
github.com/prometheus/client_model v0.6.1
github.com/prometheus/common v0.54.0
- github.com/spf13/cobra v1.8.0
+ github.com/spf13/cobra v1.8.1
github.com/spf13/pflag v1.0.5
github.com/stretchr/testify v1.9.0
github.com/yudai/gojsondiff v1.0.0
@@ -33,14 +33,14 @@ require (
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab
gopkg.in/go-playground/pool.v3 v3.1.1
gopkg.in/mcuadros/go-syslog.v2 v2.3.0
- k8s.io/api v0.30.1
+ k8s.io/api v0.30.2
k8s.io/apiextensions-apiserver v0.30.1
- k8s.io/apimachinery v0.30.1
+ k8s.io/apimachinery v0.30.2
k8s.io/apiserver v0.30.1
k8s.io/cli-runtime v0.30.0
- k8s.io/client-go v0.30.1
+ k8s.io/client-go v0.30.2
k8s.io/code-generator v0.30.1
- k8s.io/component-base v0.30.1
+ k8s.io/component-base v0.30.2
k8s.io/klog/v2 v2.120.1
pault.ag/go/sniff v0.0.0-20200207005214-cf7e4d167732
sigs.k8s.io/controller-runtime v0.18.4
diff --git a/go.sum b/go.sum
index 09594f63b..88c066494 100644
--- a/go.sum
+++ b/go.sum
@@ -665,7 +665,7 @@ github.com/cncf/xds/go v0.0.0-20230105202645-06c439db220b/go.mod h1:eXthEFrGJvWH
github.com/cncf/xds/go v0.0.0-20230310173818-32f1caf87195/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs=
github.com/coreos/go-systemd/v22 v22.5.0 h1:RrqgGjYQKalulkV8NGVIfkXQf6YYmOyiJKk8iXXhfZs=
github.com/coreos/go-systemd/v22 v22.5.0/go.mod h1:Y58oyj3AT4RCenI/lSvhwexgC+NSVTIJ3seZv2GcEnc=
-github.com/cpuguy83/go-md2man/v2 v2.0.3/go.mod h1:tgQtvFlXSQOSOSIRvRPT7W67SCa46tRHOmNcaadrF8o=
+github.com/cpuguy83/go-md2man/v2 v2.0.4/go.mod h1:tgQtvFlXSQOSOSIRvRPT7W67SCa46tRHOmNcaadrF8o=
github.com/creack/pty v1.1.9/go.mod h1:oKZEueFk5CKHvIhNR5MUki03XCEU+Q6VDXinZuGJ33E=
github.com/creack/pty v1.1.18 h1:n56/Zwd5o6whRC5PMGretI4IdRLlmBXYNjScPaBgsbY=
github.com/creack/pty v1.1.18/go.mod h1:MOBLtS5ELjhRRrroQr9kyvTxUAFNvYEK993ew/Vr4O4=
@@ -992,8 +992,8 @@ github.com/onsi/gomega v1.7.1/go.mod h1:XdKZgCCFLUoM/7CFJVPcG8C1xQ1AJ0vpAezJrB7J
github.com/onsi/gomega v1.10.1/go.mod h1:iN09h71vgCQne3DLsj+A5owkum+a2tYe+TOCB1ybHNo=
github.com/onsi/gomega v1.33.1 h1:dsYjIxxSR755MDmKVsaFQTE22ChNBcuuTWgkUDSubOk=
github.com/onsi/gomega v1.33.1/go.mod h1:U4R44UsT+9eLIaYRB2a5qajjtQYn0hauxvRm16AVYg0=
-github.com/opencontainers/runc v1.1.12 h1:BOIssBaW1La0/qbNZHXOOa71dZfZEQOzW7dqQf3phss=
-github.com/opencontainers/runc v1.1.12/go.mod h1:S+lQwSfncpBha7XTy/5lBwWgm5+y5Ma/O44Ekby9FK8=
+github.com/opencontainers/runc v1.1.13 h1:98S2srgG9vw0zWcDpFMn5TRrh8kLxa/5OFUstuUhmRs=
+github.com/opencontainers/runc v1.1.13/go.mod h1:R016aXacfp/gwQBYw2FDGa9m+n6atbLWrYY8hNMT/sA=
github.com/opencontainers/runtime-spec v1.2.0 h1:z97+pHb3uELt/yiAWD691HNHQIF07bE7dzrbT927iTk=
github.com/opencontainers/runtime-spec v1.2.0/go.mod h1:jwyrGlmzljRJv/Fgzds9SsS/C5hL+LL3ko9hs6T5lQ0=
github.com/peterbourgon/diskv v2.0.1+incompatible h1:UBdAOUP5p4RWqPBg048CAvpKN+vxiaj6gdUUzhl4XmI=
@@ -1080,8 +1080,8 @@ github.com/spaolacci/murmur3 v0.0.0-20180118202830-f09979ecbc72/go.mod h1:JwIasO
github.com/spf13/afero v1.3.3/go.mod h1:5KUK8ByomD5Ti5Artl0RtHeI5pTF7MIDuXL3yY520V4=
github.com/spf13/afero v1.6.0/go.mod h1:Ai8FlHk4v/PARR026UzYexafAt9roJ7LcLMAmO6Z93I=
github.com/spf13/afero v1.9.2/go.mod h1:iUV7ddyEEZPO5gA3zD4fJt6iStLlL+Lg4m2cihcDf8Y=
-github.com/spf13/cobra v1.8.0 h1:7aJaZx1B85qltLMc546zn58BxxfZdR/W22ej9CFoEf0=
-github.com/spf13/cobra v1.8.0/go.mod h1:WXLWApfZ71AjXPya3WOlMsY9yMs7YeiHhFVlvLyhcho=
+github.com/spf13/cobra v1.8.1 h1:e5/vxKd/rZsfSJMUX1agtjeTDf+qv1/JdBF8gg5k9ZM=
+github.com/spf13/cobra v1.8.1/go.mod h1:wHxEcudfqmLYa8iTfL+OuZPbBZkmvliBWKIezN3kD9Y=
github.com/spf13/pflag v1.0.5 h1:iy+VFUOCP1a+8yFto/drg2CJ5u0yRoB7fZw3DKv/JXA=
github.com/spf13/pflag v1.0.5/go.mod h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg=
github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
@@ -1913,22 +1913,22 @@ honnef.co/go/tools v0.0.1-2019.2.3/go.mod h1:a3bituU0lyd329TUQxRnasdCoJDkEUEAqEt
honnef.co/go/tools v0.0.1-2020.1.3/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k=
honnef.co/go/tools v0.0.1-2020.1.4/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k=
honnef.co/go/tools v0.1.3/go.mod h1:NgwopIslSNH47DimFoV78dnkksY2EFtX0ajyb3K/las=
-k8s.io/api v0.30.1 h1:kCm/6mADMdbAxmIh0LBjS54nQBE+U4KmbCfIkF5CpJY=
-k8s.io/api v0.30.1/go.mod h1:ddbN2C0+0DIiPntan/bye3SW3PdwLa11/0yqwvuRrJM=
+k8s.io/api v0.30.2 h1:+ZhRj+28QT4UOH+BKznu4CBgPWgkXO7XAvMcMl0qKvI=
+k8s.io/api v0.30.2/go.mod h1:ULg5g9JvOev2dG0u2hig4Z7tQ2hHIuS+m8MNZ+X6EmI=
k8s.io/apiextensions-apiserver v0.30.1 h1:4fAJZ9985BmpJG6PkoxVRpXv9vmPUOVzl614xarePws=
k8s.io/apiextensions-apiserver v0.30.1/go.mod h1:R4GuSrlhgq43oRY9sF2IToFh7PVlF1JjfWdoG3pixk4=
-k8s.io/apimachinery v0.30.1 h1:ZQStsEfo4n65yAdlGTfP/uSHMQSoYzU/oeEbkmF7P2U=
-k8s.io/apimachinery v0.30.1/go.mod h1:iexa2somDaxdnj7bha06bhb43Zpa6eWH8N8dbqVjTUc=
+k8s.io/apimachinery v0.30.2 h1:fEMcnBj6qkzzPGSVsAZtQThU62SmQ4ZymlXRC5yFSCg=
+k8s.io/apimachinery v0.30.2/go.mod h1:iexa2somDaxdnj7bha06bhb43Zpa6eWH8N8dbqVjTUc=
k8s.io/apiserver v0.30.1 h1:BEWEe8bzS12nMtDKXzCF5Q5ovp6LjjYkSp8qOPk8LZ8=
k8s.io/apiserver v0.30.1/go.mod h1:i87ZnQ+/PGAmSbD/iEKM68bm1D5reX8fO4Ito4B01mo=
k8s.io/cli-runtime v0.30.0 h1:0vn6/XhOvn1RJ2KJOC6IRR2CGqrpT6QQF4+8pYpWQ48=
k8s.io/cli-runtime v0.30.0/go.mod h1:vATpDMATVTMA79sZ0YUCzlMelf6rUjoBzlp+RnoM+cg=
-k8s.io/client-go v0.30.1 h1:uC/Ir6A3R46wdkgCV3vbLyNOYyCJ8oZnjtJGKfytl/Q=
-k8s.io/client-go v0.30.1/go.mod h1:wrAqLNs2trwiCH/wxxmT/x3hKVH9PuV0GGW0oDoHVqc=
+k8s.io/client-go v0.30.2 h1:sBIVJdojUNPDU/jObC+18tXWcTJVcwyqS9diGdWHk50=
+k8s.io/client-go v0.30.2/go.mod h1:JglKSWULm9xlJLx4KCkfLLQ7XwtlbflV6uFFSHTMgVs=
k8s.io/code-generator v0.30.1 h1:ZsG++q5Vt0ScmKCeLhynUuWgcwFGg1Hl1AGfatqPJBI=
k8s.io/code-generator v0.30.1/go.mod h1:hFgxRsvOUg79mbpbVKfjJvRhVz1qLoe40yZDJ/hwRH4=
-k8s.io/component-base v0.30.1 h1:bvAtlPh1UrdaZL20D9+sWxsJljMi0QZ3Lmw+kmZAaxQ=
-k8s.io/component-base v0.30.1/go.mod h1:e/X9kDiOebwlI41AvBHuWdqFriSRrX50CdwA9TFaHLI=
+k8s.io/component-base v0.30.2 h1:pqGBczYoW1sno8q9ObExUqrYSKhtE5rW3y6gX88GZII=
+k8s.io/component-base v0.30.2/go.mod h1:yQLkQDrkK8J6NtP+MGJOws+/PPeEXNpwFixsUI7h/OE=
k8s.io/gengo/v2 v2.0.0-20240404160639-a0386bf69313 h1:bKcdZJOPICVmIIuaM9+MXmapE94dn5AYv5ODs1jA43o=
k8s.io/gengo/v2 v2.0.0-20240404160639-a0386bf69313/go.mod h1:VH3AT8AaQOqiGjMF9p0/IM1Dj+82ZwjfxUP1IxaHE+8=
k8s.io/klog/v2 v2.120.1 h1:QXU6cPEOIslTGvZaXvFWiP9VKyeet3sawzTOvdXb4Vw=
From 5ac6f775037b06596dca9a6dff4281655085b933 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 17 Jun 2024 05:21:08 -0700
Subject: [PATCH 102/283] Bump k8s.io/klog/v2 from 2.120.1 to 2.130.0 (#11475)
Bumps [k8s.io/klog/v2](https://github.com/kubernetes/klog) from 2.120.1 to 2.130.0.
- [Release notes](https://github.com/kubernetes/klog/releases)
- [Changelog](https://github.com/kubernetes/klog/blob/main/RELEASE.md)
- [Commits](https://github.com/kubernetes/klog/compare/v2.120.1...v2.130.0)
---
updated-dependencies:
- dependency-name: k8s.io/klog/v2
dependency-type: direct:production
update-type: version-update:semver-minor
...
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 2 +-
go.sum | 4 ++--
2 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/go.mod b/go.mod
index 873c0aeaa..01ed7658a 100644
--- a/go.mod
+++ b/go.mod
@@ -41,7 +41,7 @@ require (
k8s.io/client-go v0.30.2
k8s.io/code-generator v0.30.1
k8s.io/component-base v0.30.2
- k8s.io/klog/v2 v2.120.1
+ k8s.io/klog/v2 v2.130.0
pault.ag/go/sniff v0.0.0-20200207005214-cf7e4d167732
sigs.k8s.io/controller-runtime v0.18.4
sigs.k8s.io/mdtoc v1.1.0
diff --git a/go.sum b/go.sum
index 88c066494..77c0417d3 100644
--- a/go.sum
+++ b/go.sum
@@ -1931,8 +1931,8 @@ k8s.io/component-base v0.30.2 h1:pqGBczYoW1sno8q9ObExUqrYSKhtE5rW3y6gX88GZII=
k8s.io/component-base v0.30.2/go.mod h1:yQLkQDrkK8J6NtP+MGJOws+/PPeEXNpwFixsUI7h/OE=
k8s.io/gengo/v2 v2.0.0-20240404160639-a0386bf69313 h1:bKcdZJOPICVmIIuaM9+MXmapE94dn5AYv5ODs1jA43o=
k8s.io/gengo/v2 v2.0.0-20240404160639-a0386bf69313/go.mod h1:VH3AT8AaQOqiGjMF9p0/IM1Dj+82ZwjfxUP1IxaHE+8=
-k8s.io/klog/v2 v2.120.1 h1:QXU6cPEOIslTGvZaXvFWiP9VKyeet3sawzTOvdXb4Vw=
-k8s.io/klog/v2 v2.120.1/go.mod h1:3Jpz1GvMt720eyJH1ckRHK1EDfpxISzJ7I9OYgaDtPE=
+k8s.io/klog/v2 v2.130.0 h1:5nB3+3HpqKqXJIXNtJdtxcDCfaa9KL8StJgMzGJkUkM=
+k8s.io/klog/v2 v2.130.0/go.mod h1:3Jpz1GvMt720eyJH1ckRHK1EDfpxISzJ7I9OYgaDtPE=
k8s.io/kube-openapi v0.0.0-20240430033511-f0e62f92d13f h1:0LQagt0gDpKqvIkAMPaRGcXawNMouPECM1+F9BVxEaM=
k8s.io/kube-openapi v0.0.0-20240430033511-f0e62f92d13f/go.mod h1:S9tOR0FxgyusSNR+MboCuiDpVWkAifZvaYI1Q2ubgro=
k8s.io/utils v0.0.0-20240502163921-fe8a2dddb1d0 h1:jgGTlFYnhF1PM1Ax/lAlxUPE+KfCIXHaathvJg1C3ak=
From e084ad0a5eefe7ccfa80a0f4eac69f923efd0374 Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Mon, 17 Jun 2024 14:25:38 +0200
Subject: [PATCH 103/283] Chores: Align security contacts & chart maintainers
to actual owners. (#11465)
---
.github/ISSUE_TEMPLATE/cve_report.md | 3 ++-
SECURITY_CONTACTS | 2 +-
charts/ingress-nginx/Chart.yaml | 2 ++
3 files changed, 5 insertions(+), 2 deletions(-)
diff --git a/.github/ISSUE_TEMPLATE/cve_report.md b/.github/ISSUE_TEMPLATE/cve_report.md
index 11789d479..79781fa66 100644
--- a/.github/ISSUE_TEMPLATE/cve_report.md
+++ b/.github/ISSUE_TEMPLATE/cve_report.md
@@ -4,8 +4,9 @@ about: CVE reporting for ingress-nginx
title: ''
labels: kind/bug
assignees:
- - strongjz
+ - Gacko
- rikatz
+ - strongjz
---
## Quick start
@@ -67,7 +67,7 @@ helm show values ingress-nginx --repo https://kubernetes.github.io/ingress-nginx
!!! attention "Helm install on AWS/GCP/Azure/Other providers"
The *ingress-nginx-controller helm-chart is a generic install out of the box*. The default set of helm values is **not** configured for installation on any infra provider. The annotations that are applicable to the cloud provider must be customized by the users.
- See [AWS LB Constroller](https://kubernetes-sigs.github.io/aws-load-balancer-controller/v2.2/guide/service/annotations/).
+ See [AWS LB Controller](https://kubernetes-sigs.github.io/aws-load-balancer-controller/v2.2/guide/service/annotations/).
Examples of some annotations needed for the service resource of `--type LoadBalancer` on AWS are below:
```yaml
annotations:
@@ -338,7 +338,7 @@ kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/cont
`10254/tcp` to also allow access to port `8443/tcp`. More information can be found in the
[Official GCP Documentation](https://cloud.google.com/load-balancing/docs/tcp/setting-up-tcp#config-hc-firewall).
- See the [GKE documentation](https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters#add_firewall_rules)
+ See the [GKE documentation](https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters#add_firewall_rules)
on adding rules and the [Kubernetes issue](https://github.com/kubernetes/kubernetes/issues/79739) for more detail.
Proxy-protocol is supported in GCE check the [Official Documentations on how to enable.](https://cloud.google.com/load-balancing/docs/tcp/setting-up-tcp#proxy-protocol)
From 56c83284c798f19e2bd75117fb4bd84a8085f8d0 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 5 Aug 2024 05:08:59 -0700
Subject: [PATCH 165/283] Bump the all group with 3 updates (#11727)
Bumps the all group with 3 updates: [docker/setup-buildx-action](https://github.com/docker/setup-buildx-action), [actions/upload-artifact](https://github.com/actions/upload-artifact) and [golangci/golangci-lint-action](https://github.com/golangci/golangci-lint-action).
Updates `docker/setup-buildx-action` from 3.5.0 to 3.6.1
- [Release notes](https://github.com/docker/setup-buildx-action/releases)
- [Commits](https://github.com/docker/setup-buildx-action/compare/aa33708b10e362ff993539393ff100fa93ed6a27...988b5a0280414f521da01fcc63a27aeeb4b104db)
Updates `actions/upload-artifact` from 4.3.4 to 4.3.5
- [Release notes](https://github.com/actions/upload-artifact/releases)
- [Commits](https://github.com/actions/upload-artifact/compare/0b2256b8c012f0828dc542b3febcab082c67f72b...89ef406dd8d7e03cfd12d9e0a4a378f454709029)
Updates `golangci/golangci-lint-action` from 6.0.1 to 6.1.0
- [Release notes](https://github.com/golangci/golangci-lint-action/releases)
- [Commits](https://github.com/golangci/golangci-lint-action/compare/a4f60bb28d35aeee14e6880718e0c85ff1882e64...aaa42aa0628b4ae2578232a66b541047968fac86)
---
updated-dependencies:
- dependency-name: docker/setup-buildx-action
dependency-type: direct:production
update-type: version-update:semver-minor
dependency-group: all
- dependency-name: actions/upload-artifact
dependency-type: direct:production
update-type: version-update:semver-patch
dependency-group: all
- dependency-name: golangci/golangci-lint-action
dependency-type: direct:production
update-type: version-update:semver-minor
dependency-group: all
...
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
.github/workflows/ci.yaml | 4 ++--
.github/workflows/golangci-lint.yml | 2 +-
.github/workflows/images.yaml | 2 +-
.github/workflows/scorecards.yml | 2 +-
.github/workflows/zz-tmpl-k8s-e2e.yaml | 2 +-
5 files changed, 6 insertions(+), 6 deletions(-)
diff --git a/.github/workflows/ci.yaml b/.github/workflows/ci.yaml
index 3bd8bbb3d..a9ca9e229 100644
--- a/.github/workflows/ci.yaml
+++ b/.github/workflows/ci.yaml
@@ -124,7 +124,7 @@ jobs:
- name: Set up Docker Buildx
id: buildx
- uses: docker/setup-buildx-action@aa33708b10e362ff993539393ff100fa93ed6a27 # v3.5.0
+ uses: docker/setup-buildx-action@988b5a0280414f521da01fcc63a27aeeb4b104db # v3.6.1
with:
version: latest
@@ -163,7 +163,7 @@ jobs:
| gzip > docker.tar.gz
- name: cache
- uses: actions/upload-artifact@0b2256b8c012f0828dc542b3febcab082c67f72b # v4.3.4
+ uses: actions/upload-artifact@89ef406dd8d7e03cfd12d9e0a4a378f454709029 # v4.3.5
with:
name: docker.tar.gz
path: docker.tar.gz
diff --git a/.github/workflows/golangci-lint.yml b/.github/workflows/golangci-lint.yml
index b40eca1bb..dca8f07db 100644
--- a/.github/workflows/golangci-lint.yml
+++ b/.github/workflows/golangci-lint.yml
@@ -28,6 +28,6 @@ jobs:
check-latest: true
- name: golangci-lint
- uses: golangci/golangci-lint-action@a4f60bb28d35aeee14e6880718e0c85ff1882e64 # v6.0.1
+ uses: golangci/golangci-lint-action@aaa42aa0628b4ae2578232a66b541047968fac86 # v6.1.0
with:
version: v1.56
diff --git a/.github/workflows/images.yaml b/.github/workflows/images.yaml
index 92325c632..fe83f1dd3 100644
--- a/.github/workflows/images.yaml
+++ b/.github/workflows/images.yaml
@@ -200,7 +200,7 @@ jobs:
uses: docker/setup-qemu-action@49b3bc8e6bdd4a60e6116a5414239cba5943d3cf # v3.2.0
- name: Set up Docker Buildx
id: buildx
- uses: docker/setup-buildx-action@aa33708b10e362ff993539393ff100fa93ed6a27 # v3.5.0
+ uses: docker/setup-buildx-action@988b5a0280414f521da01fcc63a27aeeb4b104db # v3.6.1
with:
version: latest
platforms: ${{ env.PLATFORMS }}
diff --git a/.github/workflows/scorecards.yml b/.github/workflows/scorecards.yml
index 83837e312..db419a581 100644
--- a/.github/workflows/scorecards.yml
+++ b/.github/workflows/scorecards.yml
@@ -51,7 +51,7 @@ jobs:
# Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF
# format to the repository Actions tab.
- name: "Upload artifact"
- uses: actions/upload-artifact@0b2256b8c012f0828dc542b3febcab082c67f72b # v4.3.4
+ uses: actions/upload-artifact@89ef406dd8d7e03cfd12d9e0a4a378f454709029 # v4.3.5
with:
name: SARIF file
path: results.sarif
diff --git a/.github/workflows/zz-tmpl-k8s-e2e.yaml b/.github/workflows/zz-tmpl-k8s-e2e.yaml
index 114e1a45f..30502e999 100644
--- a/.github/workflows/zz-tmpl-k8s-e2e.yaml
+++ b/.github/workflows/zz-tmpl-k8s-e2e.yaml
@@ -50,7 +50,7 @@ jobs:
make kind-e2e-test
- name: Upload e2e junit-reports ${{ inputs.variation }}
- uses: actions/upload-artifact@0b2256b8c012f0828dc542b3febcab082c67f72b # v4.3.4
+ uses: actions/upload-artifact@89ef406dd8d7e03cfd12d9e0a4a378f454709029 # v4.3.5
if: success() || failure()
with:
name: e2e-test-reports-${{ inputs.k8s-version }}${{ inputs.variation }}
From 26036777c9f81cf217e323cbd70c5ed8374911f6 Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Mon, 5 Aug 2024 17:26:59 +0200
Subject: [PATCH 166/283] Go: Bump to v1.22.5. (#11634)
---
GOLANG_VERSION | 2 +-
go.mod | 4 +---
go.work | 2 +-
images/custom-error-pages/rootfs/go.mod | 2 +-
images/ext-auth-example-authsvc/rootfs/Dockerfile | 4 ++--
images/ext-auth-example-authsvc/rootfs/go.mod | 2 +-
images/fastcgi-helloserver/rootfs/Dockerfile | 4 ++--
images/go-grpc-greeter-server/rootfs/Dockerfile | 4 ++--
images/kube-webhook-certgen/rootfs/go.mod | 2 +-
images/opentelemetry/rootfs/Dockerfile | 10 +++++-----
images/opentelemetry/rootfs/build.sh | 5 ++++-
images/opentelemetry/rootfs/go.mod | 2 +-
magefiles/go.mod | 2 +-
13 files changed, 23 insertions(+), 22 deletions(-)
diff --git a/GOLANG_VERSION b/GOLANG_VERSION
index be02b337a..da9594fd6 100644
--- a/GOLANG_VERSION
+++ b/GOLANG_VERSION
@@ -1 +1 @@
-1.22.4
\ No newline at end of file
+1.22.5
diff --git a/go.mod b/go.mod
index 62241e201..6aeb96031 100644
--- a/go.mod
+++ b/go.mod
@@ -1,8 +1,6 @@
module k8s.io/ingress-nginx
-go 1.22.0
-
-toolchain go1.22.4
+go 1.22.5
require (
dario.cat/mergo v1.0.0
diff --git a/go.work b/go.work
index c963e3c0e..9da22b9ae 100644
--- a/go.work
+++ b/go.work
@@ -1,4 +1,4 @@
-go 1.22.0
+go 1.22.5
use (
.
diff --git a/images/custom-error-pages/rootfs/go.mod b/images/custom-error-pages/rootfs/go.mod
index eebc562a5..75c488ae9 100644
--- a/images/custom-error-pages/rootfs/go.mod
+++ b/images/custom-error-pages/rootfs/go.mod
@@ -1,6 +1,6 @@
module k8s.io/ingress-nginx/custom-error-pages
-go 1.21
+go 1.22.5
require github.com/prometheus/client_golang v1.11.1
diff --git a/images/ext-auth-example-authsvc/rootfs/Dockerfile b/images/ext-auth-example-authsvc/rootfs/Dockerfile
index ec611fa54..5942ac5b9 100644
--- a/images/ext-auth-example-authsvc/rootfs/Dockerfile
+++ b/images/ext-auth-example-authsvc/rootfs/Dockerfile
@@ -1,6 +1,6 @@
ARG GOLANG_VERSION
-FROM golang:${GOLANG_VERSION}-alpine3.18 as builder
+FROM golang:${GOLANG_VERSION}-alpine3.20 as builder
RUN mkdir /authsvc
WORKDIR /authsvc
COPY . ./
@@ -9,4 +9,4 @@ RUN CGO_ENABLED=0 GOOS=linux go build -o authsvc authsvc.go
FROM gcr.io/distroless/base-debian11
COPY --from=builder /authsvc/authsvc /
EXPOSE 8080
-ENTRYPOINT ["/authsvc"]
\ No newline at end of file
+ENTRYPOINT ["/authsvc"]
diff --git a/images/ext-auth-example-authsvc/rootfs/go.mod b/images/ext-auth-example-authsvc/rootfs/go.mod
index 8c3abdcf2..0079040cb 100644
--- a/images/ext-auth-example-authsvc/rootfs/go.mod
+++ b/images/ext-auth-example-authsvc/rootfs/go.mod
@@ -1,6 +1,6 @@
module example.com/authsvc
-go 1.21
+go 1.22.5
require k8s.io/apimachinery v0.23.1
diff --git a/images/fastcgi-helloserver/rootfs/Dockerfile b/images/fastcgi-helloserver/rootfs/Dockerfile
index eec93c844..2b91887c9 100755
--- a/images/fastcgi-helloserver/rootfs/Dockerfile
+++ b/images/fastcgi-helloserver/rootfs/Dockerfile
@@ -13,7 +13,7 @@
# limitations under the License.
ARG GOLANG_VERSION
-FROM golang:${GOLANG_VERSION}-alpine3.18 as builder
+FROM golang:${GOLANG_VERSION}-alpine3.20 as builder
WORKDIR /go/src/k8s.io/ingress-nginx/images/fastcgi
@@ -30,4 +30,4 @@ FROM gcr.io/distroless/static:nonroot
COPY --from=builder /go/src/k8s.io/ingress-nginx/images/fastcgi/fastcgi-helloserver /
USER nonroot:nonroot
-CMD ["/fastcgi-helloserver"]
\ No newline at end of file
+CMD ["/fastcgi-helloserver"]
diff --git a/images/go-grpc-greeter-server/rootfs/Dockerfile b/images/go-grpc-greeter-server/rootfs/Dockerfile
index 79693eaeb..f07b1d667 100644
--- a/images/go-grpc-greeter-server/rootfs/Dockerfile
+++ b/images/go-grpc-greeter-server/rootfs/Dockerfile
@@ -1,6 +1,6 @@
ARG GOLANG_VERSION
-FROM golang:${GOLANG_VERSION}-alpine3.18 as build
+FROM golang:${GOLANG_VERSION}-alpine3.20 as build
WORKDIR /go/src/greeter-server
@@ -15,4 +15,4 @@ COPY --from=build /greeter-server /
EXPOSE 50051
-CMD ["/greeter-server"]
\ No newline at end of file
+CMD ["/greeter-server"]
diff --git a/images/kube-webhook-certgen/rootfs/go.mod b/images/kube-webhook-certgen/rootfs/go.mod
index b32fd22bd..bbbc44215 100644
--- a/images/kube-webhook-certgen/rootfs/go.mod
+++ b/images/kube-webhook-certgen/rootfs/go.mod
@@ -1,6 +1,6 @@
module github.com/jet/kube-webhook-certgen
-go 1.21
+go 1.22.5
require (
github.com/onrik/logrus v0.11.0
diff --git a/images/opentelemetry/rootfs/Dockerfile b/images/opentelemetry/rootfs/Dockerfile
index eb951e5c4..90135a1e3 100644
--- a/images/opentelemetry/rootfs/Dockerfile
+++ b/images/opentelemetry/rootfs/Dockerfile
@@ -13,7 +13,7 @@
# limitations under the License.
-FROM alpine:3.20.0 as base
+FROM alpine:3.20.0 AS base
RUN mkdir -p /opt/third_party/install
COPY . /opt/third_party/
@@ -24,14 +24,14 @@ RUN apk update \
&& apk add -U bash \
&& bash /opt/third_party/build.sh -p
-ENV NINJA_STATUS "[%p/%f/%t] "
+ENV NINJA_STATUS="[%p/%f/%t] "
# install otel_ngx_module.so
-FROM base as nginx
+FROM base AS nginx
ARG NGINX_VERSION=1.25.3
RUN bash /opt/third_party/build.sh -n ${NGINX_VERSION}
-FROM golang:1.21.6-bullseye as build-init
+FROM golang:1.22.5-bullseye AS build-init
WORKDIR /go/src/app
COPY . .
@@ -39,7 +39,7 @@ COPY . .
RUN go mod download
RUN CGO_ENABLED=0 go build -o /go/bin/init_module
-FROM gcr.io/distroless/static-debian11 as final
+FROM gcr.io/distroless/static-debian11 AS final
COPY --from=build-init /go/bin/init_module /
COPY --from=nginx /etc/nginx/modules /etc/nginx/modules
diff --git a/images/opentelemetry/rootfs/build.sh b/images/opentelemetry/rootfs/build.sh
index d46ab9fe5..649595a75 100755
--- a/images/opentelemetry/rootfs/build.sh
+++ b/images/opentelemetry/rootfs/build.sh
@@ -52,7 +52,10 @@ Help()
prepare()
{
- echo "http://dl-cdn.alpinelinux.org/alpine/edge/testing" >> /etc/apk/repositories
+ echo "https://dl-cdn.alpinelinux.org/alpine/edge/main" >> /etc/apk/repositories
+ echo "https://dl-cdn.alpinelinux.org/alpine/edge/community" >> /etc/apk/repositories
+ echo "https://dl-cdn.alpinelinux.org/alpine/edge/testing" >> /etc/apk/repositories
+
apk add \
linux-headers \
cmake \
diff --git a/images/opentelemetry/rootfs/go.mod b/images/opentelemetry/rootfs/go.mod
index 9c183ef06..c2fb37d60 100644
--- a/images/opentelemetry/rootfs/go.mod
+++ b/images/opentelemetry/rootfs/go.mod
@@ -1,3 +1,3 @@
module init-otel
-go 1.21
+go 1.22.5
diff --git a/magefiles/go.mod b/magefiles/go.mod
index d41baf17e..ef6e89197 100644
--- a/magefiles/go.mod
+++ b/magefiles/go.mod
@@ -1,6 +1,6 @@
module k8s.io/ingress-nginx/magefiles
-go 1.21
+go 1.22.5
require (
github.com/blang/semver/v4 v4.0.0
From e4986a74cd14119b2e16262e74f9080722b151e6 Mon Sep 17 00:00:00 2001
From: Mmx
Date: Mon, 5 Aug 2024 23:29:00 +0800
Subject: [PATCH 167/283] docs: update OpenSSL Roadmap link (#11730)
---
images/nginx-1.25/README.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/images/nginx-1.25/README.md b/images/nginx-1.25/README.md
index b5c6d593f..35cccc100 100644
--- a/images/nginx-1.25/README.md
+++ b/images/nginx-1.25/README.md
@@ -35,7 +35,7 @@ The next steps will be:
[And also there are some issues even with client side](https://github.com/openssl/openssl/discussions/23339)
Due to this, we currently have incomplete HTTP/3 support, without important security and performance features.\
- But the good news is that [OpenSSL plans to add server-side support in 3.4](https://www.openssl.org/roadmap.html):
+ But the good news is that [OpenSSL plans to add server-side support in 3.4](https://github.com/openssl/web/blob/master/roadmap.md):
> Server-side QUIC support
From fd7e02b97617d7869f583ff0182a893d5ac61d7f Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Mon, 5 Aug 2024 22:05:49 +0200
Subject: [PATCH 168/283] Images: Trigger NGINX build. (#11735)
---
images/nginx-1.25/TAG | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/images/nginx-1.25/TAG b/images/nginx-1.25/TAG
index 51bbb66dc..3527dbc1b 100644
--- a/images/nginx-1.25/TAG
+++ b/images/nginx-1.25/TAG
@@ -1 +1 @@
-v0.0.10
+v0.0.11
From 1e6e2e1b376404332c0ae4ae705c1b446d992e66 Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Tue, 6 Aug 2024 17:16:51 +0200
Subject: [PATCH 169/283] Images: Bump `NGINX_BASE` to v0.0.11. (#11741)
---
NGINX_BASE | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/NGINX_BASE b/NGINX_BASE
index b179689bf..1e1cf7a62 100644
--- a/NGINX_BASE
+++ b/NGINX_BASE
@@ -1 +1 @@
-registry.k8s.io/ingress-nginx/nginx-1.25:v0.0.10@sha256:1686f4cd2e16f09a1e7d27529d21eb74a8b551dc06ef86189ac837d3d6548725
+registry.k8s.io/ingress-nginx/nginx-1.25:v0.0.11@sha256:05bec8b13129c54cf855ad1802b0fe302c5d63c992b76b5b9ba897650938a328
From 86e81373ea0f2c1abc76fc0710070e168ee646b5 Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Thu, 8 Aug 2024 15:36:49 +0200
Subject: [PATCH 170/283] Go: Bump to v1.22.6. (#11747)
---
GOLANG_VERSION | 2 +-
go.mod | 2 +-
go.work | 2 +-
images/custom-error-pages/rootfs/go.mod | 2 +-
images/ext-auth-example-authsvc/rootfs/go.mod | 2 +-
images/kube-webhook-certgen/rootfs/go.mod | 2 +-
images/opentelemetry/rootfs/Dockerfile | 2 +-
images/opentelemetry/rootfs/go.mod | 2 +-
magefiles/go.mod | 2 +-
9 files changed, 9 insertions(+), 9 deletions(-)
diff --git a/GOLANG_VERSION b/GOLANG_VERSION
index da9594fd6..013173af5 100644
--- a/GOLANG_VERSION
+++ b/GOLANG_VERSION
@@ -1 +1 @@
-1.22.5
+1.22.6
diff --git a/go.mod b/go.mod
index 6aeb96031..7877fdd3f 100644
--- a/go.mod
+++ b/go.mod
@@ -1,6 +1,6 @@
module k8s.io/ingress-nginx
-go 1.22.5
+go 1.22.6
require (
dario.cat/mergo v1.0.0
diff --git a/go.work b/go.work
index 9da22b9ae..ac741bb5a 100644
--- a/go.work
+++ b/go.work
@@ -1,4 +1,4 @@
-go 1.22.5
+go 1.22.6
use (
.
diff --git a/images/custom-error-pages/rootfs/go.mod b/images/custom-error-pages/rootfs/go.mod
index 75c488ae9..264ebf427 100644
--- a/images/custom-error-pages/rootfs/go.mod
+++ b/images/custom-error-pages/rootfs/go.mod
@@ -1,6 +1,6 @@
module k8s.io/ingress-nginx/custom-error-pages
-go 1.22.5
+go 1.22.6
require github.com/prometheus/client_golang v1.11.1
diff --git a/images/ext-auth-example-authsvc/rootfs/go.mod b/images/ext-auth-example-authsvc/rootfs/go.mod
index 0079040cb..a3396b358 100644
--- a/images/ext-auth-example-authsvc/rootfs/go.mod
+++ b/images/ext-auth-example-authsvc/rootfs/go.mod
@@ -1,6 +1,6 @@
module example.com/authsvc
-go 1.22.5
+go 1.22.6
require k8s.io/apimachinery v0.23.1
diff --git a/images/kube-webhook-certgen/rootfs/go.mod b/images/kube-webhook-certgen/rootfs/go.mod
index bbbc44215..34cf0284f 100644
--- a/images/kube-webhook-certgen/rootfs/go.mod
+++ b/images/kube-webhook-certgen/rootfs/go.mod
@@ -1,6 +1,6 @@
module github.com/jet/kube-webhook-certgen
-go 1.22.5
+go 1.22.6
require (
github.com/onrik/logrus v0.11.0
diff --git a/images/opentelemetry/rootfs/Dockerfile b/images/opentelemetry/rootfs/Dockerfile
index 90135a1e3..f67948b86 100644
--- a/images/opentelemetry/rootfs/Dockerfile
+++ b/images/opentelemetry/rootfs/Dockerfile
@@ -31,7 +31,7 @@ FROM base AS nginx
ARG NGINX_VERSION=1.25.3
RUN bash /opt/third_party/build.sh -n ${NGINX_VERSION}
-FROM golang:1.22.5-bullseye AS build-init
+FROM golang:1.22.6-bullseye AS build-init
WORKDIR /go/src/app
COPY . .
diff --git a/images/opentelemetry/rootfs/go.mod b/images/opentelemetry/rootfs/go.mod
index c2fb37d60..115ef686a 100644
--- a/images/opentelemetry/rootfs/go.mod
+++ b/images/opentelemetry/rootfs/go.mod
@@ -1,3 +1,3 @@
module init-otel
-go 1.22.5
+go 1.22.6
diff --git a/magefiles/go.mod b/magefiles/go.mod
index ef6e89197..8e146d70e 100644
--- a/magefiles/go.mod
+++ b/magefiles/go.mod
@@ -1,6 +1,6 @@
module k8s.io/ingress-nginx/magefiles
-go 1.22.5
+go 1.22.6
require (
github.com/blang/semver/v4 v4.0.0
From 978bdeed7f2ef32655c4f4496ac1ec086e5a77d1 Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Sun, 11 Aug 2024 08:06:19 +0200
Subject: [PATCH 171/283] Cloud Build: Some chores. (#11633)
* Cloud Build: Remove comment.
* Cloud Build: Add newlines at EOF.
* Cloud Build: Align comment.
* Cloud Build: Remove trailing slash.
* Cloud Build: Remove quotes.
* Cloud Build: Align indentation.
* Cloud Build: Improve quotes.
* Cloud Build: Put arguments in one line.
* Cloud Build: Bump image.
* Cloud Build: Reorder entrypoint.
* Cloud Build: Adjust timeouts.
* Cloud Build: Remove useless files.
* Cloud Build: Remove `substitution_option`.
---
cloudbuild.yaml | 29 ++++--------
images/cfssl/cloudbuild.yaml | 17 ++-----
images/custom-error-pages/README.md | 3 --
images/custom-error-pages/TAG | 2 +-
images/custom-error-pages/cloudbuild.yaml | 18 +++-----
images/e2e-test-echo/TAG | 2 +-
images/ext-auth-example-authsvc/TAG | 2 +-
.../ext-auth-example-authsvc/cloudbuild.yaml | 19 ++------
images/fastcgi-helloserver/TAG | 2 +-
images/fastcgi-helloserver/cloudbuild.yaml | 18 +++-----
images/go-grpc-greeter-server/TAG | 2 +-
images/go-grpc-greeter-server/cloudbuild.yaml | 19 ++------
images/httpbun/TAG | 2 +-
images/httpbun/cloudbuild.yaml | 20 +++------
images/kube-webhook-certgen/cloudbuild.yaml | 33 +++-----------
images/nginx-1.25/cloudbuild.yaml | 17 +++----
images/nginx/cloudbuild.yaml | 17 +++----
images/nginx/rc.yaml | 44 -------------------
images/opentelemetry/README.md | 5 ---
images/opentelemetry/cloudbuild.yaml | 22 +++-------
images/test-runner/cloudbuild.yaml | 18 +++-----
21 files changed, 71 insertions(+), 240 deletions(-)
delete mode 100644 images/custom-error-pages/README.md
delete mode 100644 images/nginx/rc.yaml
delete mode 100644 images/opentelemetry/README.md
diff --git a/cloudbuild.yaml b/cloudbuild.yaml
index d3f1eed62..265947b8b 100644
--- a/cloudbuild.yaml
+++ b/cloudbuild.yaml
@@ -1,25 +1,14 @@
-# See https://cloud.google.com/cloud-build/docs/build-config
-
-timeout: 18000s
-options:
- substitution_option: ALLOW_LOOSE
+substitutions:
+ _PULL_BASE_SHA: "12345"
steps:
- - name: 'gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20211118-2f2d816b90'
- entrypoint: bash
+ - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
env:
- - DOCKER_CLI_EXPERIMENTAL=enabled
- REGISTRY=gcr.io/k8s-staging-ingress-nginx
- REPO_INFO=https://github.com/kubernetes/ingress-nginx
- - COMMIT_SHA=$_PULL_BASE_SHA
- - BUILD_ID=$BUILD_ID
- - HOME=/root
- - USER=root
+ - COMMIT_SHA=${_PULL_BASE_SHA}
+ - BUILD_ID=${BUILD_ID}
+ entrypoint: bash
args:
- - -c
- - |
- gcloud auth configure-docker \
- && make release
-substitutions:
- _GIT_TAG: "12345"
- _PULL_BASE_REF: "main"
- _PULL_BASE_SHA: '12345'
+ - -c
+ - gcloud auth configure-docker && make release
+timeout: 1800s
diff --git a/images/cfssl/cloudbuild.yaml b/images/cfssl/cloudbuild.yaml
index 32d91ca83..8ddb22013 100644
--- a/images/cfssl/cloudbuild.yaml
+++ b/images/cfssl/cloudbuild.yaml
@@ -1,17 +1,8 @@
-timeout: 600s
-options:
- substitution_option: ALLOW_LOOSE
steps:
- - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20211118-2f2d816b90
- entrypoint: bash
+ - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
env:
- - DOCKER_CLI_EXPERIMENTAL=enabled
- REGISTRY=gcr.io/k8s-staging-ingress-nginx
- # default cloudbuild has HOME=/builder/home and docker buildx is in /root/.docker/cli-plugins/docker-buildx
- # set the home to /root explicitly to if using docker buildx
- - HOME=/root
+ entrypoint: bash
args:
- - -c
- - |
- gcloud auth configure-docker \
- && cd images && make NAME=cfssl push
+ - -c
+ - gcloud auth configure-docker && cd images && make NAME=cfssl push
diff --git a/images/custom-error-pages/README.md b/images/custom-error-pages/README.md
deleted file mode 100644
index cd6df3e0a..000000000
--- a/images/custom-error-pages/README.md
+++ /dev/null
@@ -1,3 +0,0 @@
-# custom-error-pages
-
-Example of Custom error pages for the Ingress-Nginx Controller
diff --git a/images/custom-error-pages/TAG b/images/custom-error-pages/TAG
index 8ce995b80..f9cece58d 100644
--- a/images/custom-error-pages/TAG
+++ b/images/custom-error-pages/TAG
@@ -1 +1 @@
-v0.0.3
\ No newline at end of file
+v0.0.3
diff --git a/images/custom-error-pages/cloudbuild.yaml b/images/custom-error-pages/cloudbuild.yaml
index bb74da6b8..bc1a3dc91 100644
--- a/images/custom-error-pages/cloudbuild.yaml
+++ b/images/custom-error-pages/cloudbuild.yaml
@@ -1,17 +1,9 @@
-timeout: 1800s
-options:
- substitution_option: ALLOW_LOOSE
steps:
- - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20211118-2f2d816b90
- entrypoint: bash
+ - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
env:
- - DOCKER_CLI_EXPERIMENTAL=enabled
- REGISTRY=gcr.io/k8s-staging-ingress-nginx
- # default cloudbuild has HOME=/builder/home and docker buildx is in /root/.docker/cli-plugins/docker-buildx
- # set the home to /root explicitly to if using docker buildx
- - HOME=/root
+ entrypoint: bash
args:
- - -c
- - |
- gcloud auth configure-docker \
- && cd images/ && make NAME=custom-error-pages push
+ - -c
+ - gcloud auth configure-docker && cd images && make NAME=custom-error-pages push
+timeout: 3600s
diff --git a/images/e2e-test-echo/TAG b/images/e2e-test-echo/TAG
index 8ce995b80..f9cece58d 100644
--- a/images/e2e-test-echo/TAG
+++ b/images/e2e-test-echo/TAG
@@ -1 +1 @@
-v0.0.3
\ No newline at end of file
+v0.0.3
diff --git a/images/ext-auth-example-authsvc/TAG b/images/ext-auth-example-authsvc/TAG
index 8ce995b80..f9cece58d 100644
--- a/images/ext-auth-example-authsvc/TAG
+++ b/images/ext-auth-example-authsvc/TAG
@@ -1 +1 @@
-v0.0.3
\ No newline at end of file
+v0.0.3
diff --git a/images/ext-auth-example-authsvc/cloudbuild.yaml b/images/ext-auth-example-authsvc/cloudbuild.yaml
index 506e20111..4ce8d75d3 100644
--- a/images/ext-auth-example-authsvc/cloudbuild.yaml
+++ b/images/ext-auth-example-authsvc/cloudbuild.yaml
@@ -1,19 +1,8 @@
-timeout: 1200s
-options:
- substitution_option: ALLOW_LOOSE
- # job builds a multi-arch docker image for amd64,arm,arm64 and s390x.
- machineType: E2_HIGHCPU_8
steps:
- - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20211118-2f2d816b90
- entrypoint: bash
+ - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
env:
- - DOCKER_CLI_EXPERIMENTAL=enabled
- REGISTRY=gcr.io/k8s-staging-ingress-nginx
- # default cloudbuild has HOME=/builder/home and docker buildx is in /root/.docker/cli-plugins/docker-buildx
- # set the home to /root explicitly to if using docker buildx
- - HOME=/root
+ entrypoint: bash
args:
- - -c
- - |
- gcloud auth configure-docker \
- && cd images/ && make NAME=ext-auth-example-authsvc push
\ No newline at end of file
+ - -c
+ - gcloud auth configure-docker && cd images && make NAME=ext-auth-example-authsvc push
diff --git a/images/fastcgi-helloserver/TAG b/images/fastcgi-helloserver/TAG
index 8ce995b80..f9cece58d 100644
--- a/images/fastcgi-helloserver/TAG
+++ b/images/fastcgi-helloserver/TAG
@@ -1 +1 @@
-v0.0.3
\ No newline at end of file
+v0.0.3
diff --git a/images/fastcgi-helloserver/cloudbuild.yaml b/images/fastcgi-helloserver/cloudbuild.yaml
index e3ab3b375..a74fcfddc 100644
--- a/images/fastcgi-helloserver/cloudbuild.yaml
+++ b/images/fastcgi-helloserver/cloudbuild.yaml
@@ -1,17 +1,9 @@
-timeout: 1800s
-options:
- substitution_option: ALLOW_LOOSE
steps:
- - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20211118-2f2d816b90
- entrypoint: bash
+ - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
env:
- - DOCKER_CLI_EXPERIMENTAL=enabled
- REGISTRY=gcr.io/k8s-staging-ingress-nginx
- # default cloudbuild has HOME=/builder/home and docker buildx is in /root/.docker/cli-plugins/docker-buildx
- # set the home to /root explicitly to if using docker buildx
- - HOME=/root
+ entrypoint: bash
args:
- - -c
- - |
- gcloud auth configure-docker \
- && cd images/ && make NAME=fastcgi-helloserver push
\ No newline at end of file
+ - -c
+ - gcloud auth configure-docker && cd images && make NAME=fastcgi-helloserver push
+timeout: 3600s
diff --git a/images/go-grpc-greeter-server/TAG b/images/go-grpc-greeter-server/TAG
index 8ce995b80..f9cece58d 100644
--- a/images/go-grpc-greeter-server/TAG
+++ b/images/go-grpc-greeter-server/TAG
@@ -1 +1 @@
-v0.0.3
\ No newline at end of file
+v0.0.3
diff --git a/images/go-grpc-greeter-server/cloudbuild.yaml b/images/go-grpc-greeter-server/cloudbuild.yaml
index b690ffbec..4ae3139bd 100644
--- a/images/go-grpc-greeter-server/cloudbuild.yaml
+++ b/images/go-grpc-greeter-server/cloudbuild.yaml
@@ -1,19 +1,8 @@
-timeout: 1200s
-options:
- substitution_option: ALLOW_LOOSE
- # job builds a multi-arch docker image for amd64,arm,arm64 and s390x.
- machineType: E2_HIGHCPU_8
steps:
- - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20211118-2f2d816b90
- entrypoint: bash
+ - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
env:
- - DOCKER_CLI_EXPERIMENTAL=enabled
- REGISTRY=gcr.io/k8s-staging-ingress-nginx
- # default cloudbuild has HOME=/builder/home and docker buildx is in /root/.docker/cli-plugins/docker-buildx
- # set the home to /root explicitly to if using docker buildx
- - HOME=/root
+ entrypoint: bash
args:
- - -c
- - |
- gcloud auth configure-docker \
- && cd images/ && make NAME=go-grpc-greeter-server push
\ No newline at end of file
+ - -c
+ - gcloud auth configure-docker && cd images && make NAME=go-grpc-greeter-server push
diff --git a/images/httpbun/TAG b/images/httpbun/TAG
index 8ce995b80..f9cece58d 100644
--- a/images/httpbun/TAG
+++ b/images/httpbun/TAG
@@ -1 +1 @@
-v0.0.3
\ No newline at end of file
+v0.0.3
diff --git a/images/httpbun/cloudbuild.yaml b/images/httpbun/cloudbuild.yaml
index c532a3908..e718d319f 100644
--- a/images/httpbun/cloudbuild.yaml
+++ b/images/httpbun/cloudbuild.yaml
@@ -1,19 +1,9 @@
-timeout: 1200s
-options:
- substitution_option: ALLOW_LOOSE
- # job builds a multi-arch docker image for amd64,arm,arm64 and s390x.
- machineType: E2_HIGHCPU_8
steps:
- - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20211118-2f2d816b90
- entrypoint: bash
+ - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
env:
- - DOCKER_CLI_EXPERIMENTAL=enabled
- REGISTRY=gcr.io/k8s-staging-ingress-nginx
- # default cloudbuild has HOME=/builder/home and docker buildx is in /root/.docker/cli-plugins/docker-buildx
- # set the home to /root explicitly to if using docker buildx
- - HOME=/root
+ entrypoint: bash
args:
- - -c
- - |
- gcloud auth configure-docker \
- && cd images/ && make NAME=httpbun push
\ No newline at end of file
+ - -c
+ - gcloud auth configure-docker && cd images && make NAME=httpbun push
+timeout: 3600s
diff --git a/images/kube-webhook-certgen/cloudbuild.yaml b/images/kube-webhook-certgen/cloudbuild.yaml
index 690f13126..33f181add 100644
--- a/images/kube-webhook-certgen/cloudbuild.yaml
+++ b/images/kube-webhook-certgen/cloudbuild.yaml
@@ -1,32 +1,9 @@
-
-# Copyright 2021 The Kubernetes Authors. All rights reserved.
-#
-# Licensed under the Apache License, Version 2.0 (the "License");
-# you may not use this file except in compliance with the License.
-# You may obtain a copy of the License at
-#
-# http://www.apache.org/licenses/LICENSE-2.0
-#
-# Unless required by applicable law or agreed to in writing, software
-# distributed under the License is distributed on an "AS IS" BASIS,
-# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-# See the License for the specific language governing permissions and
-# limitations under the License.
-
-timeout: 10800s
-options:
- substitution_option: ALLOW_LOOSE
steps:
- - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20211118-2f2d816b90
- entrypoint: bash
+ - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
env:
- - DOCKER_CLI_EXPERIMENTAL=enabled
- REGISTRY=gcr.io/k8s-staging-ingress-nginx
- # default cloudbuild has HOME=/builder/home and docker buildx is in /root/.docker/cli-plugins/docker-buildx
- # set the home to /root explicitly to if using docker buildx
- - HOME=/root
+ entrypoint: bash
args:
- - -c
- - |
- gcloud auth configure-docker \
- && cd images/ && make NAME=kube-webhook-certgen push
+ - -c
+ - gcloud auth configure-docker && cd images && make NAME=kube-webhook-certgen push
+timeout: 1800s
diff --git a/images/nginx-1.25/cloudbuild.yaml b/images/nginx-1.25/cloudbuild.yaml
index c94539165..c03425a5a 100644
--- a/images/nginx-1.25/cloudbuild.yaml
+++ b/images/nginx-1.25/cloudbuild.yaml
@@ -1,17 +1,12 @@
-timeout: 10800s
options:
- substitution_option: ALLOW_LOOSE
- # job builds a multi-arch docker image for amd64,arm,arm64
+ # Increase machine type for multi-arch builds.
machineType: E2_HIGHCPU_32
steps:
- - name: 'gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20211118-2f2d816b90'
- entrypoint: bash
+ - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
env:
- - DOCKER_CLI_EXPERIMENTAL=enabled
- REGISTRY=gcr.io/k8s-staging-ingress-nginx
- - HOME=/root
+ entrypoint: bash
args:
- - -c
- - |
- gcloud auth configure-docker \
- && cd images/nginx-1.25 && make push
\ No newline at end of file
+ - -c
+ - gcloud auth configure-docker && cd images/nginx-1.25 && make push
+timeout: 7200s
diff --git a/images/nginx/cloudbuild.yaml b/images/nginx/cloudbuild.yaml
index 71051f26d..871110162 100644
--- a/images/nginx/cloudbuild.yaml
+++ b/images/nginx/cloudbuild.yaml
@@ -1,17 +1,12 @@
-timeout: 10800s
options:
- substitution_option: ALLOW_LOOSE
- # job builds a multi-arch docker image for amd64,arm,arm64 and s390x.
+ # Increase machine type for multi-arch builds.
machineType: E2_HIGHCPU_32
steps:
- - name: 'gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20211118-2f2d816b90'
- entrypoint: bash
+ - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
env:
- - DOCKER_CLI_EXPERIMENTAL=enabled
- REGISTRY=gcr.io/k8s-staging-ingress-nginx
- - HOME=/root
+ entrypoint: bash
args:
- - -c
- - |
- gcloud auth configure-docker \
- && cd images/nginx && make push
+ - -c
+ - gcloud auth configure-docker && cd images/nginx && make push
+timeout: 7200s
diff --git a/images/nginx/rc.yaml b/images/nginx/rc.yaml
deleted file mode 100644
index bcf2b0274..000000000
--- a/images/nginx/rc.yaml
+++ /dev/null
@@ -1,44 +0,0 @@
-apiVersion: v1
-kind: Service
-metadata:
- name: nginx
- labels:
- app.kubernetes.io/name: ingress-nginx
- app.kubernetes.io/part-of: ingress-nginx
-spec:
- type: NodePort
- ports:
- - port: 80
- protocol: TCP
- name: http
- - port: 443
- protocol: TCP
- name: https
- selector:
- app.kubernetes.io/name: ingress-nginx
- app.kubernetes.io/part-of: ingress-nginx
----
-apiVersion: v1
-kind: ReplicationController
-metadata:
- name: nginx
- labels:
- app.kubernetes.io/name: ingress-nginx
- app.kubernetes.io/part-of: ingress-nginx
-spec:
- replicas: 1
- selector:
- app.kubernetes.io/name: ingress-nginx
- app.kubernetes.io/part-of: ingress-nginx
- template:
- metadata:
- labels:
- app.kubernetes.io/name: ingress-nginx
- app.kubernetes.io/part-of: ingress-nginx
- spec:
- containers:
- - name: nginx
- image: registry.k8s.io/ingress-nginx/nginx:c5766dc011965f22fac2f4437e86d0fd9960a50c@sha256:94ff9b435a5f3f4570bbdaed4a3a523f63a54ce2ad6b132b5640bae2af5d9d90
- ports:
- - containerPort: 80
- - containerPort: 443
diff --git a/images/opentelemetry/README.md b/images/opentelemetry/README.md
deleted file mode 100644
index f5c3d90de..000000000
--- a/images/opentelemetry/README.md
+++ /dev/null
@@ -1,5 +0,0 @@
-# OpenTelemetry library builder
-
-**How to use this image:**
-This image only contains the necessary files in /usr/local and /etc/nginx/opentelemetry to
-be copied to Ingress Controller deployment when OpenTelemetry is enabled
diff --git a/images/opentelemetry/cloudbuild.yaml b/images/opentelemetry/cloudbuild.yaml
index bc48a93f4..95fdabac9 100644
--- a/images/opentelemetry/cloudbuild.yaml
+++ b/images/opentelemetry/cloudbuild.yaml
@@ -1,20 +1,12 @@
-timeout: 10800s
options:
- substitution_option: ALLOW_LOOSE
- # job builds a multi-arch docker image for amd64,arm,arm64 and s390x.
- machineType: E2_HIGHCPU_32
+ # Increase machine type for multi-arch builds.
+ machineType: E2_HIGHCPU_8
steps:
- - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20211118-2f2d816b90
- entrypoint: bash
+ - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
env:
- - DOCKER_CLI_EXPERIMENTAL=enabled
- REGISTRY=gcr.io/k8s-staging-ingress-nginx
- # default cloudbuild has HOME=/builder/home and docker buildx is in /root/.docker/cli-plugins/docker-buildx
- # set the home to /root explicitly to if using docker buildx
- - HOME=/root
+ entrypoint: bash
args:
- - -c
- - |
- gcloud auth configure-docker \
- && cd images/opentelemetry && make NGINX_VERSION=1.25.3 push \
- && make NGINX_VERSION=1.21.6 push
+ - -c
+ - gcloud auth configure-docker && cd images/opentelemetry && make NGINX_VERSION=1.21.6 push && make NGINX_VERSION=1.25.3 push
+timeout: 3600s
diff --git a/images/test-runner/cloudbuild.yaml b/images/test-runner/cloudbuild.yaml
index b17de9b31..cd8d73e98 100644
--- a/images/test-runner/cloudbuild.yaml
+++ b/images/test-runner/cloudbuild.yaml
@@ -1,17 +1,9 @@
-timeout: 3600s
-options:
- substitution_option: ALLOW_LOOSE
steps:
- - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20211118-2f2d816b90
- entrypoint: bash
+ - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
env:
- - DOCKER_CLI_EXPERIMENTAL=enabled
- REGISTRY=gcr.io/k8s-staging-ingress-nginx
- # default cloudbuild has HOME=/builder/home and docker buildx is in /root/.docker/cli-plugins/docker-buildx
- # set the home to /root explicitly to if using docker buildx
- - HOME=/root
+ entrypoint: bash
args:
- - -c
- - |
- gcloud auth configure-docker \
- && cd images/test-runner && make push
+ - -c
+ - gcloud auth configure-docker && cd images/test-runner && make push
+timeout: 1800s
From 5ddc442b0cf2691d751de388a49bb36d848df2ee Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Sun, 11 Aug 2024 08:50:33 +0200
Subject: [PATCH 172/283] Cloud Build: Fix substitutions. (#11758)
Prow hands in some substitutions via arguments we need to ignore.
---
cloudbuild.yaml | 5 +++--
images/cfssl/cloudbuild.yaml | 3 +++
images/custom-error-pages/cloudbuild.yaml | 3 +++
images/ext-auth-example-authsvc/cloudbuild.yaml | 3 +++
images/fastcgi-helloserver/cloudbuild.yaml | 3 +++
images/go-grpc-greeter-server/cloudbuild.yaml | 3 +++
images/httpbun/cloudbuild.yaml | 3 +++
images/kube-webhook-certgen/cloudbuild.yaml | 3 +++
images/nginx-1.25/cloudbuild.yaml | 2 ++
images/nginx/cloudbuild.yaml | 2 ++
images/opentelemetry/cloudbuild.yaml | 2 ++
images/test-runner/cloudbuild.yaml | 3 +++
12 files changed, 33 insertions(+), 2 deletions(-)
diff --git a/cloudbuild.yaml b/cloudbuild.yaml
index 265947b8b..494838720 100644
--- a/cloudbuild.yaml
+++ b/cloudbuild.yaml
@@ -1,5 +1,6 @@
-substitutions:
- _PULL_BASE_SHA: "12345"
+options:
+ # Ignore Prow provided substitutions.
+ substitution_option: ALLOW_LOOSE
steps:
- name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
env:
diff --git a/images/cfssl/cloudbuild.yaml b/images/cfssl/cloudbuild.yaml
index 8ddb22013..6b5b0fc1b 100644
--- a/images/cfssl/cloudbuild.yaml
+++ b/images/cfssl/cloudbuild.yaml
@@ -1,3 +1,6 @@
+options:
+ # Ignore Prow provided substitutions.
+ substitution_option: ALLOW_LOOSE
steps:
- name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
env:
diff --git a/images/custom-error-pages/cloudbuild.yaml b/images/custom-error-pages/cloudbuild.yaml
index bc1a3dc91..772a7697f 100644
--- a/images/custom-error-pages/cloudbuild.yaml
+++ b/images/custom-error-pages/cloudbuild.yaml
@@ -1,3 +1,6 @@
+options:
+ # Ignore Prow provided substitutions.
+ substitution_option: ALLOW_LOOSE
steps:
- name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
env:
diff --git a/images/ext-auth-example-authsvc/cloudbuild.yaml b/images/ext-auth-example-authsvc/cloudbuild.yaml
index 4ce8d75d3..09535a5a6 100644
--- a/images/ext-auth-example-authsvc/cloudbuild.yaml
+++ b/images/ext-auth-example-authsvc/cloudbuild.yaml
@@ -1,3 +1,6 @@
+options:
+ # Ignore Prow provided substitutions.
+ substitution_option: ALLOW_LOOSE
steps:
- name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
env:
diff --git a/images/fastcgi-helloserver/cloudbuild.yaml b/images/fastcgi-helloserver/cloudbuild.yaml
index a74fcfddc..5fb3e3318 100644
--- a/images/fastcgi-helloserver/cloudbuild.yaml
+++ b/images/fastcgi-helloserver/cloudbuild.yaml
@@ -1,3 +1,6 @@
+options:
+ # Ignore Prow provided substitutions.
+ substitution_option: ALLOW_LOOSE
steps:
- name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
env:
diff --git a/images/go-grpc-greeter-server/cloudbuild.yaml b/images/go-grpc-greeter-server/cloudbuild.yaml
index 4ae3139bd..44e0bef8b 100644
--- a/images/go-grpc-greeter-server/cloudbuild.yaml
+++ b/images/go-grpc-greeter-server/cloudbuild.yaml
@@ -1,3 +1,6 @@
+options:
+ # Ignore Prow provided substitutions.
+ substitution_option: ALLOW_LOOSE
steps:
- name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
env:
diff --git a/images/httpbun/cloudbuild.yaml b/images/httpbun/cloudbuild.yaml
index e718d319f..3d2662531 100644
--- a/images/httpbun/cloudbuild.yaml
+++ b/images/httpbun/cloudbuild.yaml
@@ -1,3 +1,6 @@
+options:
+ # Ignore Prow provided substitutions.
+ substitution_option: ALLOW_LOOSE
steps:
- name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
env:
diff --git a/images/kube-webhook-certgen/cloudbuild.yaml b/images/kube-webhook-certgen/cloudbuild.yaml
index 33f181add..8bf139423 100644
--- a/images/kube-webhook-certgen/cloudbuild.yaml
+++ b/images/kube-webhook-certgen/cloudbuild.yaml
@@ -1,3 +1,6 @@
+options:
+ # Ignore Prow provided substitutions.
+ substitution_option: ALLOW_LOOSE
steps:
- name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
env:
diff --git a/images/nginx-1.25/cloudbuild.yaml b/images/nginx-1.25/cloudbuild.yaml
index c03425a5a..d8bb1f2a9 100644
--- a/images/nginx-1.25/cloudbuild.yaml
+++ b/images/nginx-1.25/cloudbuild.yaml
@@ -1,6 +1,8 @@
options:
# Increase machine type for multi-arch builds.
machineType: E2_HIGHCPU_32
+ # Ignore Prow provided substitutions.
+ substitution_option: ALLOW_LOOSE
steps:
- name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
env:
diff --git a/images/nginx/cloudbuild.yaml b/images/nginx/cloudbuild.yaml
index 871110162..a5ec1abd8 100644
--- a/images/nginx/cloudbuild.yaml
+++ b/images/nginx/cloudbuild.yaml
@@ -1,6 +1,8 @@
options:
# Increase machine type for multi-arch builds.
machineType: E2_HIGHCPU_32
+ # Ignore Prow provided substitutions.
+ substitution_option: ALLOW_LOOSE
steps:
- name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
env:
diff --git a/images/opentelemetry/cloudbuild.yaml b/images/opentelemetry/cloudbuild.yaml
index 95fdabac9..98281d8ef 100644
--- a/images/opentelemetry/cloudbuild.yaml
+++ b/images/opentelemetry/cloudbuild.yaml
@@ -1,6 +1,8 @@
options:
# Increase machine type for multi-arch builds.
machineType: E2_HIGHCPU_8
+ # Ignore Prow provided substitutions.
+ substitution_option: ALLOW_LOOSE
steps:
- name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
env:
diff --git a/images/test-runner/cloudbuild.yaml b/images/test-runner/cloudbuild.yaml
index cd8d73e98..6efe5eeaf 100644
--- a/images/test-runner/cloudbuild.yaml
+++ b/images/test-runner/cloudbuild.yaml
@@ -1,3 +1,6 @@
+options:
+ # Ignore Prow provided substitutions.
+ substitution_option: ALLOW_LOOSE
steps:
- name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
env:
From b93ccdf7b600be4c40a874819c21f4e3f842cbea Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Sun, 11 Aug 2024 10:03:39 +0200
Subject: [PATCH 173/283] Cloud Build: Tweak timeouts. (#11761)
---
images/opentelemetry/cloudbuild.yaml | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/images/opentelemetry/cloudbuild.yaml b/images/opentelemetry/cloudbuild.yaml
index 98281d8ef..df86d37e7 100644
--- a/images/opentelemetry/cloudbuild.yaml
+++ b/images/opentelemetry/cloudbuild.yaml
@@ -11,4 +11,4 @@ steps:
args:
- -c
- gcloud auth configure-docker && cd images/opentelemetry && make NGINX_VERSION=1.21.6 push && make NGINX_VERSION=1.25.3 push
-timeout: 3600s
+timeout: 1800s
From c21b6a99aa79f6ac2c81981037dcda6a473b81f5 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 12 Aug 2024 04:44:44 -0700
Subject: [PATCH 174/283] Bump golang.org/x/crypto from 0.25.0 to 0.26.0
(#11765)
Bumps [golang.org/x/crypto](https://github.com/golang/crypto) from 0.25.0 to 0.26.0.
- [Commits](https://github.com/golang/crypto/compare/v0.25.0...v0.26.0)
---
updated-dependencies:
- dependency-name: golang.org/x/crypto
dependency-type: direct:production
update-type: version-update:semver-minor
...
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 10 +++++-----
go.sum | 20 ++++++++++----------
2 files changed, 15 insertions(+), 15 deletions(-)
diff --git a/go.mod b/go.mod
index 7877fdd3f..76581ef96 100644
--- a/go.mod
+++ b/go.mod
@@ -25,7 +25,7 @@ require (
github.com/stretchr/testify v1.9.0
github.com/yudai/gojsondiff v1.0.0
github.com/zakjan/cert-chain-resolver v0.0.0-20221221105603-fcedb00c5b30
- golang.org/x/crypto v0.25.0
+ golang.org/x/crypto v0.26.0
golang.org/x/exp v0.0.0-20240416160154-fe59bbe5cc7f
google.golang.org/grpc v1.65.0
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab
@@ -109,10 +109,10 @@ require (
golang.org/x/mod v0.17.0 // indirect
golang.org/x/net v0.26.0 // indirect
golang.org/x/oauth2 v0.21.0 // indirect
- golang.org/x/sync v0.7.0 // indirect
- golang.org/x/sys v0.22.0 // indirect
- golang.org/x/term v0.22.0 // indirect
- golang.org/x/text v0.16.0 // indirect
+ golang.org/x/sync v0.8.0 // indirect
+ golang.org/x/sys v0.23.0 // indirect
+ golang.org/x/term v0.23.0 // indirect
+ golang.org/x/text v0.17.0 // indirect
golang.org/x/time v0.5.0 // indirect
golang.org/x/tools v0.21.1-0.20240508182429-e35e4ccd0d2d // indirect
google.golang.org/genproto/googleapis/rpc v0.0.0-20240528184218-531527333157 // indirect
diff --git a/go.sum b/go.sum
index 68326360f..1522bb392 100644
--- a/go.sum
+++ b/go.sum
@@ -230,8 +230,8 @@ golang.org/dl v0.0.0-20190829154251-82a15e2f2ead/go.mod h1:IUMfjQLJQd4UTqG1Z90te
golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
-golang.org/x/crypto v0.25.0 h1:ypSNr+bnYL2YhwoMt2zPxHFmbAN1KZs/njMG3hxUp30=
-golang.org/x/crypto v0.25.0/go.mod h1:T+wALwcMOSE0kXgUAnPAHqTLW+XHgcELELW8VaDgm/M=
+golang.org/x/crypto v0.26.0 h1:RrRspgV4mU+YwB4FYnuBoKsUapNIL5cohGAmSH3azsw=
+golang.org/x/crypto v0.26.0/go.mod h1:GY7jblb9wI+FOo5y8/S2oY4zWP07AkOJ4+jxCqdqn54=
golang.org/x/exp v0.0.0-20240416160154-fe59bbe5cc7f h1:99ci1mjWVBWwJiEKYY6jWa4d2nTQVIEhZIptnrVb1XY=
golang.org/x/exp v0.0.0-20240416160154-fe59bbe5cc7f/go.mod h1:/lliqkxwWAhPjf5oSOIJup2XcqJaw8RGS6k3TGEc7GI=
golang.org/x/mod v0.2.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
@@ -252,8 +252,8 @@ golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f/go.mod h1:RxMgew5VJxzue5/jJ
golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sync v0.0.0-20190911185100-cd5d95a43a6e/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sync v0.0.0-20201020160332-67f06af15bc9/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
-golang.org/x/sync v0.7.0 h1:YsImfSBoP9QPYL0xyKJPq0gcaJdG3rInoqxTWbfQu9M=
-golang.org/x/sync v0.7.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk=
+golang.org/x/sync v0.8.0 h1:3NFvSEYkUoMifnESzZl15y791HH1qU2xm6eCJU5ZPXQ=
+golang.org/x/sync v0.8.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk=
golang.org/x/sys v0.0.0-20180909124046-d0be0721c37e/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
golang.org/x/sys v0.0.0-20190412213103-97732733099d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
@@ -268,14 +268,14 @@ golang.org/x/sys v0.0.0-20220520151302-bc2c85ada10a/go.mod h1:oPkhp1MJrh7nUepCBc
golang.org/x/sys v0.0.0-20220715151400-c0bba94af5f8/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.0.0-20220811171246-fbc7d0a398ab/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.22.0 h1:RI27ohtqKCnwULzJLqkv897zojh5/DwS/ENaMzUOaWI=
-golang.org/x/sys v0.22.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
-golang.org/x/term v0.22.0 h1:BbsgPEJULsl2fV/AT3v15Mjva5yXKQDyKf+TbDz7QJk=
-golang.org/x/term v0.22.0/go.mod h1:F3qCibpT5AMpCRfhfT53vVJwhLtIVHhB9XDjfFvnMI4=
+golang.org/x/sys v0.23.0 h1:YfKFowiIMvtgl1UERQoTPPToxltDeZfbj4H7dVUCwmM=
+golang.org/x/sys v0.23.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
+golang.org/x/term v0.23.0 h1:F6D4vR+EHoL9/sWAWgAR1H2DcHr4PareCbAaCo1RpuU=
+golang.org/x/term v0.23.0/go.mod h1:DgV24QBUrK6jhZXl+20l6UWznPlwAHm1Q1mGHtydmSk=
golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
golang.org/x/text v0.3.3/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
-golang.org/x/text v0.16.0 h1:a94ExnEXNtEwYLGJSIUxnWoxoRz/ZcCsV63ROupILh4=
-golang.org/x/text v0.16.0/go.mod h1:GhwF1Be+LQoKShO3cGOHzqOgRrGaYc9AvblQOmPVHnI=
+golang.org/x/text v0.17.0 h1:XtiM5bkSOt+ewxlOE/aE/AKEHibwj/6gvWMl9Rsh0Qc=
+golang.org/x/text v0.17.0/go.mod h1:BuEKDfySbSR4drPmRPG/7iBdf8hvFMuRexcpahXilzY=
golang.org/x/time v0.5.0 h1:o7cqy6amK/52YcAKIPlM3a+Fpj35zvRj2TP+e1xFSfk=
golang.org/x/time v0.5.0/go.mod h1:3BpzKBy/shNhVucY/MWOyx10tF3SFh9QdLuxbVysPQM=
golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
From 4a1da5ccab5058b2b49f32c076318287a7b63065 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 12 Aug 2024 05:27:20 -0700
Subject: [PATCH 175/283] Bump the all group with 2 updates (#11767)
Bumps the all group with 2 updates: [actions/upload-artifact](https://github.com/actions/upload-artifact) and [github/codeql-action](https://github.com/github/codeql-action).
Updates `actions/upload-artifact` from 4.3.5 to 4.3.6
- [Release notes](https://github.com/actions/upload-artifact/releases)
- [Commits](https://github.com/actions/upload-artifact/compare/89ef406dd8d7e03cfd12d9e0a4a378f454709029...834a144ee995460fba8ed112a2fc961b36a5ec5a)
Updates `github/codeql-action` from 3.25.15 to 3.26.0
- [Release notes](https://github.com/github/codeql-action/releases)
- [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md)
- [Commits](https://github.com/github/codeql-action/compare/afb54ba388a7dca6ecae48f608c4ff05ff4cc77a...eb055d739abdc2e8de2e5f4ba1a8b246daa779aa)
---
updated-dependencies:
- dependency-name: actions/upload-artifact
dependency-type: direct:production
update-type: version-update:semver-patch
dependency-group: all
- dependency-name: github/codeql-action
dependency-type: direct:production
update-type: version-update:semver-minor
dependency-group: all
...
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
.github/workflows/ci.yaml | 2 +-
.github/workflows/scorecards.yml | 4 ++--
.github/workflows/vulnerability-scans.yaml | 2 +-
.github/workflows/zz-tmpl-k8s-e2e.yaml | 2 +-
4 files changed, 5 insertions(+), 5 deletions(-)
diff --git a/.github/workflows/ci.yaml b/.github/workflows/ci.yaml
index a9ca9e229..f3af49d37 100644
--- a/.github/workflows/ci.yaml
+++ b/.github/workflows/ci.yaml
@@ -163,7 +163,7 @@ jobs:
| gzip > docker.tar.gz
- name: cache
- uses: actions/upload-artifact@89ef406dd8d7e03cfd12d9e0a4a378f454709029 # v4.3.5
+ uses: actions/upload-artifact@834a144ee995460fba8ed112a2fc961b36a5ec5a # v4.3.6
with:
name: docker.tar.gz
path: docker.tar.gz
diff --git a/.github/workflows/scorecards.yml b/.github/workflows/scorecards.yml
index db419a581..a6b64d408 100644
--- a/.github/workflows/scorecards.yml
+++ b/.github/workflows/scorecards.yml
@@ -51,7 +51,7 @@ jobs:
# Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF
# format to the repository Actions tab.
- name: "Upload artifact"
- uses: actions/upload-artifact@89ef406dd8d7e03cfd12d9e0a4a378f454709029 # v4.3.5
+ uses: actions/upload-artifact@834a144ee995460fba8ed112a2fc961b36a5ec5a # v4.3.6
with:
name: SARIF file
path: results.sarif
@@ -59,6 +59,6 @@ jobs:
# Upload the results to GitHub's code scanning dashboard.
- name: "Upload to code-scanning"
- uses: github/codeql-action/upload-sarif@afb54ba388a7dca6ecae48f608c4ff05ff4cc77a # v3.25.15
+ uses: github/codeql-action/upload-sarif@eb055d739abdc2e8de2e5f4ba1a8b246daa779aa # v3.26.0
with:
sarif_file: results.sarif
diff --git a/.github/workflows/vulnerability-scans.yaml b/.github/workflows/vulnerability-scans.yaml
index 14d5dc406..cc3240931 100644
--- a/.github/workflows/vulnerability-scans.yaml
+++ b/.github/workflows/vulnerability-scans.yaml
@@ -75,7 +75,7 @@ jobs:
# This step checks out a copy of your repository.
- name: Upload SARIF file
- uses: github/codeql-action/upload-sarif@afb54ba388a7dca6ecae48f608c4ff05ff4cc77a # v3.25.15
+ uses: github/codeql-action/upload-sarif@eb055d739abdc2e8de2e5f4ba1a8b246daa779aa # v3.26.0
with:
token: ${{ github.token }}
# Path to SARIF file relative to the root of the repository
diff --git a/.github/workflows/zz-tmpl-k8s-e2e.yaml b/.github/workflows/zz-tmpl-k8s-e2e.yaml
index 30502e999..adf1dc0e8 100644
--- a/.github/workflows/zz-tmpl-k8s-e2e.yaml
+++ b/.github/workflows/zz-tmpl-k8s-e2e.yaml
@@ -50,7 +50,7 @@ jobs:
make kind-e2e-test
- name: Upload e2e junit-reports ${{ inputs.variation }}
- uses: actions/upload-artifact@89ef406dd8d7e03cfd12d9e0a4a378f454709029 # v4.3.5
+ uses: actions/upload-artifact@834a144ee995460fba8ed112a2fc961b36a5ec5a # v4.3.6
if: success() || failure()
with:
name: e2e-test-reports-${{ inputs.k8s-version }}${{ inputs.variation }}
From cc3c941ac3a9b9d5541daa24175fddeff5cf64a7 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 12 Aug 2024 20:23:58 +0200
Subject: [PATCH 176/283] Bump github.com/onsi/ginkgo/v2 from 2.19.1 to 2.20.0
(#11766)
* Bump github.com/onsi/ginkgo/v2 from 2.19.1 to 2.20.0
Bumps [github.com/onsi/ginkgo/v2](https://github.com/onsi/ginkgo) from 2.19.1 to 2.20.0.
- [Release notes](https://github.com/onsi/ginkgo/releases)
- [Changelog](https://github.com/onsi/ginkgo/blob/master/CHANGELOG.md)
- [Commits](https://github.com/onsi/ginkgo/compare/v2.19.1...v2.20.0)
---
updated-dependencies:
- dependency-name: github.com/onsi/ginkgo/v2
dependency-type: direct:production
update-type: version-update:semver-minor
...
Signed-off-by: dependabot[bot]
* Bump github.com/onsi/ginkgo/v2 from 2.19.1 to 2.20.0 elsewhere
---------
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: Marco Ebert
---
build/run-in-docker.sh | 2 +-
go.mod | 12 ++++----
go.sum | 28 +++++++++----------
images/kube-webhook-certgen/rootfs/go.mod | 12 ++++----
images/kube-webhook-certgen/rootfs/go.sum | 34 ++++++++++++-----------
images/test-runner/Makefile | 4 +--
test/e2e/run-chart-test.sh | 2 +-
test/e2e/run-kind-e2e.sh | 2 +-
8 files changed, 49 insertions(+), 47 deletions(-)
diff --git a/build/run-in-docker.sh b/build/run-in-docker.sh
index 822ff265a..4cc678363 100755
--- a/build/run-in-docker.sh
+++ b/build/run-in-docker.sh
@@ -82,7 +82,7 @@ if [[ "$DOCKER_IN_DOCKER_ENABLED" == "true" ]]; then
echo "..reached DIND check TRUE block, inside run-in-docker.sh"
echo "FLAGS=$FLAGS"
#go env
- go install -mod=mod github.com/onsi/ginkgo/v2/ginkgo@v2.19.1
+ go install -mod=mod github.com/onsi/ginkgo/v2/ginkgo@v2.20.0
find / -type f -name ginkgo 2>/dev/null
which ginkgo
/bin/bash -c "${FLAGS}"
diff --git a/go.mod b/go.mod
index 76581ef96..ae4974c4a 100644
--- a/go.mod
+++ b/go.mod
@@ -14,7 +14,7 @@ require (
github.com/mitchellh/mapstructure v1.5.0
github.com/moul/pb v0.0.0-20220425114252-bca18df4138c
github.com/ncabatoff/process-exporter v0.8.3
- github.com/onsi/ginkgo/v2 v2.19.1
+ github.com/onsi/ginkgo/v2 v2.20.0
github.com/opencontainers/runc v1.1.13
github.com/pmezard/go-difflib v1.0.0
github.com/prometheus/client_golang v1.19.1
@@ -26,7 +26,7 @@ require (
github.com/yudai/gojsondiff v1.0.0
github.com/zakjan/cert-chain-resolver v0.0.0-20221221105603-fcedb00c5b30
golang.org/x/crypto v0.26.0
- golang.org/x/exp v0.0.0-20240416160154-fe59bbe5cc7f
+ golang.org/x/exp v0.0.0-20240719175910-8a7402abbf56
google.golang.org/grpc v1.65.0
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab
gopkg.in/go-playground/pool.v3 v3.1.1
@@ -75,7 +75,7 @@ require (
github.com/google/gnostic-models v0.6.8 // indirect
github.com/google/go-cmp v0.6.0 // indirect
github.com/google/gofuzz v1.2.0 // indirect
- github.com/google/pprof v0.0.0-20240424215950-a892ee059fd6 // indirect
+ github.com/google/pprof v0.0.0-20240727154555-813a5fbdbec8 // indirect
github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 // indirect
github.com/google/uuid v1.6.0 // indirect
github.com/gregjones/httpcache v0.0.0-20190611155906-901d90724c79 // indirect
@@ -106,15 +106,15 @@ require (
github.com/yudai/pp v2.0.1+incompatible // indirect
go.starlark.net v0.0.0-20240123142251-f86470692795 // indirect
go.uber.org/zap v1.27.0 // indirect
- golang.org/x/mod v0.17.0 // indirect
- golang.org/x/net v0.26.0 // indirect
+ golang.org/x/mod v0.20.0 // indirect
+ golang.org/x/net v0.28.0 // indirect
golang.org/x/oauth2 v0.21.0 // indirect
golang.org/x/sync v0.8.0 // indirect
golang.org/x/sys v0.23.0 // indirect
golang.org/x/term v0.23.0 // indirect
golang.org/x/text v0.17.0 // indirect
golang.org/x/time v0.5.0 // indirect
- golang.org/x/tools v0.21.1-0.20240508182429-e35e4ccd0d2d // indirect
+ golang.org/x/tools v0.24.0 // indirect
google.golang.org/genproto/googleapis/rpc v0.0.0-20240528184218-531527333157 // indirect
google.golang.org/protobuf v1.34.2 // indirect
gopkg.in/evanphx/json-patch.v5 v5.9.0 // indirect
diff --git a/go.sum b/go.sum
index 1522bb392..48031be86 100644
--- a/go.sum
+++ b/go.sum
@@ -89,8 +89,8 @@ github.com/google/go-cmp v0.6.0/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeN
github.com/google/gofuzz v1.0.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
github.com/google/gofuzz v1.2.0 h1:xRy4A+RhZaiKjJ1bPfwQ8sedCA+YS2YcCHW6ec7JMi0=
github.com/google/gofuzz v1.2.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
-github.com/google/pprof v0.0.0-20240424215950-a892ee059fd6 h1:k7nVchz72niMH6YLQNvHSdIE7iqsQxK1P41mySCvssg=
-github.com/google/pprof v0.0.0-20240424215950-a892ee059fd6/go.mod h1:kf6iHlnVGwgKolg33glAes7Yg/8iWP8ukqeldJSO7jw=
+github.com/google/pprof v0.0.0-20240727154555-813a5fbdbec8 h1:FKHo8hFI3A+7w0aUQuYXQ+6EN5stWmeY/AZqtM8xk9k=
+github.com/google/pprof v0.0.0-20240727154555-813a5fbdbec8/go.mod h1:K1liHPHnj73Fdn/EKuT8nrFqBihUSKXoLYU0BuatOYo=
github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 h1:El6M4kTTCOh6aBiKaUGG7oYTSPP8MxqL4YI3kZKwcP4=
github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510/go.mod h1:pupxD2MaaD3pAXIBCelhxNneeOaAeabZDe5s4K6zSpQ=
github.com/google/uuid v1.6.0 h1:NIvaJDMOsjHA8n1jAhLSgzrAzy1Hgr+hNrb57e+94F0=
@@ -160,12 +160,12 @@ github.com/onsi/ginkgo v1.6.0/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+W
github.com/onsi/ginkgo v1.12.1/go.mod h1:zj2OWP4+oCPe1qIXoGWkgMRwljMUYCdkwsT2108oapk=
github.com/onsi/ginkgo v1.16.5 h1:8xi0RTUf59SOSfEtZMvwTvXYMzG4gV23XVHOZiXNtnE=
github.com/onsi/ginkgo v1.16.5/go.mod h1:+E8gABHa3K6zRBolWtd+ROzc/U5bkGt0FwiG042wbpU=
-github.com/onsi/ginkgo/v2 v2.19.1 h1:QXgq3Z8Crl5EL1WBAC98A5sEBHARrAJNzAmMxzLcRF0=
-github.com/onsi/ginkgo/v2 v2.19.1/go.mod h1:O3DtEWQkPa/F7fBMgmZQKKsluAy8pd3rEQdrjkPb9zA=
+github.com/onsi/ginkgo/v2 v2.20.0 h1:PE84V2mHqoT1sglvHc8ZdQtPcwmvvt29WLEEO3xmdZw=
+github.com/onsi/ginkgo/v2 v2.20.0/go.mod h1:lG9ey2Z29hR41WMVthyJBGUBcBhGOtoPF2VFMvBXFCI=
github.com/onsi/gomega v1.7.1/go.mod h1:XdKZgCCFLUoM/7CFJVPcG8C1xQ1AJ0vpAezJrB7JYyY=
github.com/onsi/gomega v1.10.1/go.mod h1:iN09h71vgCQne3DLsj+A5owkum+a2tYe+TOCB1ybHNo=
-github.com/onsi/gomega v1.34.0 h1:eSSPsPNp6ZpsG8X1OVmOTxig+CblTc4AxpPBykhe2Os=
-github.com/onsi/gomega v1.34.0/go.mod h1:MIKI8c+f+QLWk+hxbePD4i0LMJSExPaZOVfkoex4cAo=
+github.com/onsi/gomega v1.34.1 h1:EUMJIKUjM8sKjYbtxQI9A4z2o+rruxnzNvpknOXie6k=
+github.com/onsi/gomega v1.34.1/go.mod h1:kU1QgUvBDLXBJq618Xvm2LUX6rSAfRaFRTcdOeDLwwY=
github.com/opencontainers/runc v1.1.13 h1:98S2srgG9vw0zWcDpFMn5TRrh8kLxa/5OFUstuUhmRs=
github.com/opencontainers/runc v1.1.13/go.mod h1:R016aXacfp/gwQBYw2FDGa9m+n6atbLWrYY8hNMT/sA=
github.com/opencontainers/runtime-spec v1.2.0 h1:z97+pHb3uELt/yiAWD691HNHQIF07bE7dzrbT927iTk=
@@ -232,20 +232,20 @@ golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8U
golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
golang.org/x/crypto v0.26.0 h1:RrRspgV4mU+YwB4FYnuBoKsUapNIL5cohGAmSH3azsw=
golang.org/x/crypto v0.26.0/go.mod h1:GY7jblb9wI+FOo5y8/S2oY4zWP07AkOJ4+jxCqdqn54=
-golang.org/x/exp v0.0.0-20240416160154-fe59bbe5cc7f h1:99ci1mjWVBWwJiEKYY6jWa4d2nTQVIEhZIptnrVb1XY=
-golang.org/x/exp v0.0.0-20240416160154-fe59bbe5cc7f/go.mod h1:/lliqkxwWAhPjf5oSOIJup2XcqJaw8RGS6k3TGEc7GI=
+golang.org/x/exp v0.0.0-20240719175910-8a7402abbf56 h1:2dVuKD2vS7b0QIHQbpyTISPd0LeHDbnYEryqj5Q1ug8=
+golang.org/x/exp v0.0.0-20240719175910-8a7402abbf56/go.mod h1:M4RDyNAINzryxdtnbRXRL/OHtkFuWGRjvuhBJpk2IlY=
golang.org/x/mod v0.2.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
golang.org/x/mod v0.3.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
-golang.org/x/mod v0.17.0 h1:zY54UmvipHiNd+pm+m0x9KhZ9hl1/7QNMyxXbc6ICqA=
-golang.org/x/mod v0.17.0/go.mod h1:hTbmBsO62+eylJbnUtE2MGJUyE7QWk4xUqPFrRgJ+7c=
+golang.org/x/mod v0.20.0 h1:utOm6MM3R3dnawAiJgn0y+xvuYRsm1RKM/4giyfDgV0=
+golang.org/x/mod v0.20.0/go.mod h1:hTbmBsO62+eylJbnUtE2MGJUyE7QWk4xUqPFrRgJ+7c=
golang.org/x/net v0.0.0-20180906233101-161cd47e91fd/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
golang.org/x/net v0.0.0-20190404232315-eb5bcb51f2a3/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
golang.org/x/net v0.0.0-20190620200207-3b0461eec859/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
golang.org/x/net v0.0.0-20200226121028-0de0cce0169b/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
golang.org/x/net v0.0.0-20200520004742-59133d7f0dd7/go.mod h1:qpuaurCH72eLCgpAm/N6yyVIVM9cpaDIP3A8BGJEC5A=
golang.org/x/net v0.0.0-20201021035429-f5854403a974/go.mod h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU=
-golang.org/x/net v0.26.0 h1:soB7SVo0PWrY4vPW/+ay0jKDNScG2X9wFeYlXIvJsOQ=
-golang.org/x/net v0.26.0/go.mod h1:5YKkiSynbBIh3p6iOc/vibscux0x38BZDkn8sCUPxHE=
+golang.org/x/net v0.28.0 h1:a9JDOJc5GMUJ0+UDqmLT86WiEy7iWyIhz8gz8E4e5hE=
+golang.org/x/net v0.28.0/go.mod h1:yqtgsTWOOnlGLG9GFRrK3++bGOUEkNBoHZc8MEDWPNg=
golang.org/x/oauth2 v0.21.0 h1:tsimM75w1tF/uws5rbeHzIWxEqElMehnc+iW793zsZs=
golang.org/x/oauth2 v0.21.0/go.mod h1:XYTD2NtWslqkgxebSiOHnXEap4TF09sJSc7H1sXbhtI=
golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
@@ -283,8 +283,8 @@ golang.org/x/tools v0.0.0-20191119224855-298f0cb1881e/go.mod h1:b+2E5dAYhXwXZwtn
golang.org/x/tools v0.0.0-20200619180055-7c47624df98f/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
golang.org/x/tools v0.0.0-20201224043029-2b0845dc783e/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
golang.org/x/tools v0.0.0-20210106214847-113979e3529a/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
-golang.org/x/tools v0.21.1-0.20240508182429-e35e4ccd0d2d h1:vU5i/LfpvrRCpgM/VPfJLg5KjxD3E+hfT1SH+d9zLwg=
-golang.org/x/tools v0.21.1-0.20240508182429-e35e4ccd0d2d/go.mod h1:aiJjzUbINMkxbQROHiO6hDPo2LHcIPhhQsa9DLh0yGk=
+golang.org/x/tools v0.24.0 h1:J1shsA93PJUEVaUSaay7UXAyE8aimq3GW0pjlolpa24=
+golang.org/x/tools v0.24.0/go.mod h1:YhNqVBIfWHdzvTLs0d8LCuMhkKUgSUKldakyV7W/WDQ=
golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
diff --git a/images/kube-webhook-certgen/rootfs/go.mod b/images/kube-webhook-certgen/rootfs/go.mod
index 34cf0284f..52746ebd9 100644
--- a/images/kube-webhook-certgen/rootfs/go.mod
+++ b/images/kube-webhook-certgen/rootfs/go.mod
@@ -33,16 +33,16 @@ require (
github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd // indirect
github.com/modern-go/reflect2 v1.0.2 // indirect
github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 // indirect
- github.com/onsi/ginkgo/v2 v2.19.1 // indirect
- github.com/onsi/gomega v1.34.0 // indirect
+ github.com/onsi/ginkgo/v2 v2.20.0 // indirect
+ github.com/onsi/gomega v1.34.1 // indirect
github.com/pkg/errors v0.9.1 // indirect
github.com/spf13/pflag v1.0.5 // indirect
github.com/stretchr/testify v1.9.0 // indirect
- golang.org/x/net v0.25.0 // indirect
+ golang.org/x/net v0.28.0 // indirect
golang.org/x/oauth2 v0.18.0 // indirect
- golang.org/x/sys v0.21.0 // indirect
- golang.org/x/term v0.20.0 // indirect
- golang.org/x/text v0.15.0 // indirect
+ golang.org/x/sys v0.23.0 // indirect
+ golang.org/x/term v0.23.0 // indirect
+ golang.org/x/text v0.17.0 // indirect
golang.org/x/time v0.5.0 // indirect
google.golang.org/appengine v1.6.8 // indirect
google.golang.org/protobuf v1.34.1 // indirect
diff --git a/images/kube-webhook-certgen/rootfs/go.sum b/images/kube-webhook-certgen/rootfs/go.sum
index 4229215bd..8ce13c672 100644
--- a/images/kube-webhook-certgen/rootfs/go.sum
+++ b/images/kube-webhook-certgen/rootfs/go.sum
@@ -32,8 +32,8 @@ github.com/google/go-cmp v0.6.0/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeN
github.com/google/gofuzz v1.0.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
github.com/google/gofuzz v1.2.0 h1:xRy4A+RhZaiKjJ1bPfwQ8sedCA+YS2YcCHW6ec7JMi0=
github.com/google/gofuzz v1.2.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
-github.com/google/pprof v0.0.0-20240424215950-a892ee059fd6 h1:k7nVchz72niMH6YLQNvHSdIE7iqsQxK1P41mySCvssg=
-github.com/google/pprof v0.0.0-20240424215950-a892ee059fd6/go.mod h1:kf6iHlnVGwgKolg33glAes7Yg/8iWP8ukqeldJSO7jw=
+github.com/google/pprof v0.0.0-20240727154555-813a5fbdbec8 h1:FKHo8hFI3A+7w0aUQuYXQ+6EN5stWmeY/AZqtM8xk9k=
+github.com/google/pprof v0.0.0-20240727154555-813a5fbdbec8/go.mod h1:K1liHPHnj73Fdn/EKuT8nrFqBihUSKXoLYU0BuatOYo=
github.com/google/uuid v1.6.0 h1:NIvaJDMOsjHA8n1jAhLSgzrAzy1Hgr+hNrb57e+94F0=
github.com/google/uuid v1.6.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
github.com/imdario/mergo v0.3.16 h1:wwQJbIsHYGMUyLSPrEq1CT16AhnhNJQ51+4fdHUnCl4=
@@ -61,10 +61,10 @@ github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 h1:C3w9PqII01/Oq
github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822/go.mod h1:+n7T8mK8HuQTcFwEeznm/DIxMOiR9yIdICNftLE1DvQ=
github.com/onrik/logrus v0.11.0 h1:pu+BCaWL36t0yQaj/2UHK2erf88dwssAKOT51mxPUVs=
github.com/onrik/logrus v0.11.0/go.mod h1:fO2vlZwIdti6PidD3gV5YKt9Lq5ptpnP293RAe1ITwk=
-github.com/onsi/ginkgo/v2 v2.19.1 h1:QXgq3Z8Crl5EL1WBAC98A5sEBHARrAJNzAmMxzLcRF0=
-github.com/onsi/ginkgo/v2 v2.19.1/go.mod h1:O3DtEWQkPa/F7fBMgmZQKKsluAy8pd3rEQdrjkPb9zA=
-github.com/onsi/gomega v1.34.0 h1:eSSPsPNp6ZpsG8X1OVmOTxig+CblTc4AxpPBykhe2Os=
-github.com/onsi/gomega v1.34.0/go.mod h1:MIKI8c+f+QLWk+hxbePD4i0LMJSExPaZOVfkoex4cAo=
+github.com/onsi/ginkgo/v2 v2.20.0 h1:PE84V2mHqoT1sglvHc8ZdQtPcwmvvt29WLEEO3xmdZw=
+github.com/onsi/ginkgo/v2 v2.20.0/go.mod h1:lG9ey2Z29hR41WMVthyJBGUBcBhGOtoPF2VFMvBXFCI=
+github.com/onsi/gomega v1.34.1 h1:EUMJIKUjM8sKjYbtxQI9A4z2o+rruxnzNvpknOXie6k=
+github.com/onsi/gomega v1.34.1/go.mod h1:kU1QgUvBDLXBJq618Xvm2LUX6rSAfRaFRTcdOeDLwwY=
github.com/pkg/errors v0.9.1 h1:FEBLx1zS214owpjy7qsBeixbURkuhQAwrK5UwLGTwt4=
github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
@@ -96,6 +96,8 @@ golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACk
golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
golang.org/x/crypto v0.0.0-20210921155107-089bfa567519/go.mod h1:GvvjBRRGRdwPK5ydBHafDWAxML/pGHZbMvKqRZ5+Abc=
+golang.org/x/exp v0.0.0-20240719175910-8a7402abbf56 h1:2dVuKD2vS7b0QIHQbpyTISPd0LeHDbnYEryqj5Q1ug8=
+golang.org/x/exp v0.0.0-20240719175910-8a7402abbf56/go.mod h1:M4RDyNAINzryxdtnbRXRL/OHtkFuWGRjvuhBJpk2IlY=
golang.org/x/mod v0.2.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
golang.org/x/mod v0.3.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
golang.org/x/mod v0.6.0-dev.0.20220419223038-86c51ed26bb4/go.mod h1:jJ57K6gSWd91VN4djpZkiMVwK6gcyfeH4XE8wZrZaV4=
@@ -105,8 +107,8 @@ golang.org/x/net v0.0.0-20200226121028-0de0cce0169b/go.mod h1:z5CRVTTTmAJ677TzLL
golang.org/x/net v0.0.0-20201021035429-f5854403a974/go.mod h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU=
golang.org/x/net v0.0.0-20210226172049-e18ecbb05110/go.mod h1:m0MpNAwzfU5UDzcl9v0D8zg8gWTRqZa9RBIspLL5mdg=
golang.org/x/net v0.0.0-20220722155237-a158d28d115b/go.mod h1:XRhObCWvk6IyKnWLug+ECip1KBveYUHfp+8e9klMJ9c=
-golang.org/x/net v0.25.0 h1:d/OCCoBEUq33pjydKrGQhw7IlUPI2Oylr+8qLx49kac=
-golang.org/x/net v0.25.0/go.mod h1:JkAGAh7GEvH74S6FOH42FLoXpXbE/aqXSrIQjXgsiwM=
+golang.org/x/net v0.28.0 h1:a9JDOJc5GMUJ0+UDqmLT86WiEy7iWyIhz8gz8E4e5hE=
+golang.org/x/net v0.28.0/go.mod h1:yqtgsTWOOnlGLG9GFRrK3++bGOUEkNBoHZc8MEDWPNg=
golang.org/x/oauth2 v0.18.0 h1:09qnuIAgzdx1XplqJvW6CQqMCtGZykZWcXzPMPUusvI=
golang.org/x/oauth2 v0.18.0/go.mod h1:Wf7knwG0MPoWIMMBgFlEaSUDaKskp0dCfrlJRJXbBi8=
golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
@@ -121,18 +123,18 @@ golang.org/x/sys v0.0.0-20210615035016-665e8c7367d1/go.mod h1:oPkhp1MJrh7nUepCBc
golang.org/x/sys v0.0.0-20220520151302-bc2c85ada10a/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.0.0-20220715151400-c0bba94af5f8/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.0.0-20220722155257-8c9f86f7a55f/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.21.0 h1:rF+pYz3DAGSQAxAu1CbC7catZg4ebC4UIeIhKxBZvws=
-golang.org/x/sys v0.21.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
+golang.org/x/sys v0.23.0 h1:YfKFowiIMvtgl1UERQoTPPToxltDeZfbj4H7dVUCwmM=
+golang.org/x/sys v0.23.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8=
-golang.org/x/term v0.20.0 h1:VnkxpohqXaOBYJtBmEppKUG6mXpi+4O6purfc2+sMhw=
-golang.org/x/term v0.20.0/go.mod h1:8UkIAJTvZgivsXaD6/pH6U9ecQzZ45awqEOzuCvwpFY=
+golang.org/x/term v0.23.0 h1:F6D4vR+EHoL9/sWAWgAR1H2DcHr4PareCbAaCo1RpuU=
+golang.org/x/term v0.23.0/go.mod h1:DgV24QBUrK6jhZXl+20l6UWznPlwAHm1Q1mGHtydmSk=
golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
golang.org/x/text v0.3.3/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
golang.org/x/text v0.3.7/go.mod h1:u+2+/6zg+i71rQMx5EYifcz6MCKuco9NR6JIITiCfzQ=
golang.org/x/text v0.3.8/go.mod h1:E6s5w1FMmriuDzIBO73fBruAKo1PCIq6d2Q6DHfQ8WQ=
-golang.org/x/text v0.15.0 h1:h1V/4gjBv8v9cjcR6+AR5+/cIYK5N/WAgiv4xlsEtAk=
-golang.org/x/text v0.15.0/go.mod h1:18ZOQIKpY8NJVqYksKHtTdi31H5itFRjB5/qKTNYzSU=
+golang.org/x/text v0.17.0 h1:XtiM5bkSOt+ewxlOE/aE/AKEHibwj/6gvWMl9Rsh0Qc=
+golang.org/x/text v0.17.0/go.mod h1:BuEKDfySbSR4drPmRPG/7iBdf8hvFMuRexcpahXilzY=
golang.org/x/time v0.5.0 h1:o7cqy6amK/52YcAKIPlM3a+Fpj35zvRj2TP+e1xFSfk=
golang.org/x/time v0.5.0/go.mod h1:3BpzKBy/shNhVucY/MWOyx10tF3SFh9QdLuxbVysPQM=
golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
@@ -140,8 +142,8 @@ golang.org/x/tools v0.0.0-20191119224855-298f0cb1881e/go.mod h1:b+2E5dAYhXwXZwtn
golang.org/x/tools v0.0.0-20200619180055-7c47624df98f/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
golang.org/x/tools v0.0.0-20210106214847-113979e3529a/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
golang.org/x/tools v0.1.12/go.mod h1:hNGJHUnrk76NpqgfD5Aqm5Crs+Hm0VOH/i9J2+nxYbc=
-golang.org/x/tools v0.21.0 h1:qc0xYgIbsSDt9EyWz05J5wfa7LOVW0YTLOXrqdLAWIw=
-golang.org/x/tools v0.21.0/go.mod h1:aiJjzUbINMkxbQROHiO6hDPo2LHcIPhhQsa9DLh0yGk=
+golang.org/x/tools v0.24.0 h1:J1shsA93PJUEVaUSaay7UXAyE8aimq3GW0pjlolpa24=
+golang.org/x/tools v0.24.0/go.mod h1:YhNqVBIfWHdzvTLs0d8LCuMhkKUgSUKldakyV7W/WDQ=
golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
diff --git a/images/test-runner/Makefile b/images/test-runner/Makefile
index 9045b8a53..3d60a5313 100644
--- a/images/test-runner/Makefile
+++ b/images/test-runner/Makefile
@@ -59,7 +59,7 @@ image:
--build-arg YAML_LINT_VERSION=1.33.0 \
--build-arg YAMALE_VERSION=4.0.4 \
--build-arg HELM_VERSION=3.14.4 \
- --build-arg GINKGO_VERSION=2.19.1 \
+ --build-arg GINKGO_VERSION=2.20.0 \
--build-arg GOLINT_VERSION=latest \
-t ${IMAGE}:${TAG} rootfs
@@ -80,7 +80,7 @@ build: ensure-buildx
--build-arg YAML_LINT_VERSION=1.33.0 \
--build-arg YAMALE_VERSION=4.0.4 \
--build-arg HELM_VERSION=3.14.4 \
- --build-arg GINKGO_VERSION=2.19.1 \
+ --build-arg GINKGO_VERSION=2.20.0 \
--build-arg GOLINT_VERSION=latest \
-t ${IMAGE}:${TAG} rootfs
diff --git a/test/e2e/run-chart-test.sh b/test/e2e/run-chart-test.sh
index 106029c77..a3f5e1b4d 100755
--- a/test/e2e/run-chart-test.sh
+++ b/test/e2e/run-chart-test.sh
@@ -78,7 +78,7 @@ fi
if [ "${SKIP_IMAGE_CREATION:-false}" = "false" ]; then
if ! command -v ginkgo &> /dev/null; then
- go install github.com/onsi/ginkgo/v2/ginkgo@v2.19.1
+ go install github.com/onsi/ginkgo/v2/ginkgo@v2.20.0
fi
echo "[dev-env] building image"
make -C ${DIR}/../../ clean-image build image
diff --git a/test/e2e/run-kind-e2e.sh b/test/e2e/run-kind-e2e.sh
index 9ef6f5acd..ab2cb2dd7 100755
--- a/test/e2e/run-kind-e2e.sh
+++ b/test/e2e/run-kind-e2e.sh
@@ -96,7 +96,7 @@ fi
if [ "${SKIP_E2E_IMAGE_CREATION}" = "false" ]; then
if ! command -v ginkgo &> /dev/null; then
- go install github.com/onsi/ginkgo/v2/ginkgo@v2.19.1
+ go install github.com/onsi/ginkgo/v2/ginkgo@v2.20.0
fi
echo "[dev-env] .. done building controller images"
From 28d2e782a8a2cdda25d76352b78b613f7fa1f27b Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Mon, 12 Aug 2024 21:37:22 +0200
Subject: [PATCH 177/283] Cloud Build: Add missing config, remove unused ones.
(#11774)
---
.../cloudbuild.yaml | 2 +-
images/go-grpc-greeter-server/cloudbuild.yaml | 11 -----------
2 files changed, 1 insertion(+), 12 deletions(-)
rename images/{ext-auth-example-authsvc => e2e-test-echo}/cloudbuild.yaml (92%)
delete mode 100644 images/go-grpc-greeter-server/cloudbuild.yaml
diff --git a/images/ext-auth-example-authsvc/cloudbuild.yaml b/images/e2e-test-echo/cloudbuild.yaml
similarity index 92%
rename from images/ext-auth-example-authsvc/cloudbuild.yaml
rename to images/e2e-test-echo/cloudbuild.yaml
index 09535a5a6..dc6e1dcf0 100644
--- a/images/ext-auth-example-authsvc/cloudbuild.yaml
+++ b/images/e2e-test-echo/cloudbuild.yaml
@@ -8,4 +8,4 @@ steps:
entrypoint: bash
args:
- -c
- - gcloud auth configure-docker && cd images && make NAME=ext-auth-example-authsvc push
+ - gcloud auth configure-docker && cd images && make NAME=e2e-test-echo push
diff --git a/images/go-grpc-greeter-server/cloudbuild.yaml b/images/go-grpc-greeter-server/cloudbuild.yaml
deleted file mode 100644
index 44e0bef8b..000000000
--- a/images/go-grpc-greeter-server/cloudbuild.yaml
+++ /dev/null
@@ -1,11 +0,0 @@
-options:
- # Ignore Prow provided substitutions.
- substitution_option: ALLOW_LOOSE
-steps:
- - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
- env:
- - REGISTRY=gcr.io/k8s-staging-ingress-nginx
- entrypoint: bash
- args:
- - -c
- - gcloud auth configure-docker && cd images && make NAME=go-grpc-greeter-server push
From 8d96714c4e88d53c855c8c7e9f6cb093f1d40827 Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Mon, 12 Aug 2024 22:52:46 +0200
Subject: [PATCH 178/283] Images: Trigger NGINX build. (#11779)
---
images/nginx-1.25/TAG | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/images/nginx-1.25/TAG b/images/nginx-1.25/TAG
index 3527dbc1b..f25246219 100644
--- a/images/nginx-1.25/TAG
+++ b/images/nginx-1.25/TAG
@@ -1 +1 @@
-v0.0.11
+v0.0.12
From ffbbb449f79580431d789678efc53aa17688faba Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Tue, 13 Aug 2024 00:24:42 +0200
Subject: [PATCH 179/283] Images: Bump `NGINX_BASE` to v0.0.12. (#11782)
---
NGINX_BASE | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/NGINX_BASE b/NGINX_BASE
index 1e1cf7a62..5e32265fa 100644
--- a/NGINX_BASE
+++ b/NGINX_BASE
@@ -1 +1 @@
-registry.k8s.io/ingress-nginx/nginx-1.25:v0.0.11@sha256:05bec8b13129c54cf855ad1802b0fe302c5d63c992b76b5b9ba897650938a328
+registry.k8s.io/ingress-nginx/nginx-1.25:v0.0.12@sha256:2d471b3a34dc43d10c3f3d7f2a6e8a2ecf7654a4197e56374261c1c708b16365
From 3f0129aa8cf192680d6b356b682eaa61a3873c01 Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Tue, 13 Aug 2024 00:32:01 +0200
Subject: [PATCH 180/283] Images: Trigger `test-runner` build. (#11785)
---
images/test-runner/TAG | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/images/test-runner/TAG b/images/test-runner/TAG
index 3ce186fb7..384942600 100644
--- a/images/test-runner/TAG
+++ b/images/test-runner/TAG
@@ -1 +1 @@
-v0.0.8
+v0.0.9
From f19e9265b0ca266c7f2bc5e4d2ac137479e8b842 Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Tue, 13 Aug 2024 08:21:42 +0200
Subject: [PATCH 181/283] Tests: Bump `e2e-test-runner` to v20240812-3f0129aa.
(#11788)
---
build/run-in-docker.sh | 2 +-
test/e2e-image/Makefile | 2 +-
test/e2e/run-chart-test.sh | 2 +-
3 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/build/run-in-docker.sh b/build/run-in-docker.sh
index 4cc678363..fcbf8f6cd 100755
--- a/build/run-in-docker.sh
+++ b/build/run-in-docker.sh
@@ -44,7 +44,7 @@ function cleanup {
}
trap cleanup EXIT
-E2E_IMAGE=${E2E_IMAGE:-registry.k8s.io/ingress-nginx/e2e-test-runner:v20240729-04899b27@sha256:9f067e6c861343da47f5851bf255aecdeb33a61fc5991a6c659fb237a3f619f9}
+E2E_IMAGE=${E2E_IMAGE:-registry.k8s.io/ingress-nginx/e2e-test-runner:v20240812-3f0129aa@sha256:95c2aaf2a66e8cbbf7a7453046f3b024383c273a0988efab841cd96116afd1a9}
if [[ "$RUNTIME" == podman ]]; then
# Podman does not support both tag and digest
diff --git a/test/e2e-image/Makefile b/test/e2e-image/Makefile
index 9ade9961f..74f3cc437 100644
--- a/test/e2e-image/Makefile
+++ b/test/e2e-image/Makefile
@@ -1,6 +1,6 @@
DIR:=$(shell dirname $(realpath $(firstword $(MAKEFILE_LIST))))
-E2E_BASE_IMAGE ?= "registry.k8s.io/ingress-nginx/e2e-test-runner:v20240729-04899b27@sha256:9f067e6c861343da47f5851bf255aecdeb33a61fc5991a6c659fb237a3f619f9"
+E2E_BASE_IMAGE ?= "registry.k8s.io/ingress-nginx/e2e-test-runner:v20240812-3f0129aa@sha256:95c2aaf2a66e8cbbf7a7453046f3b024383c273a0988efab841cd96116afd1a9"
image:
echo "..entered Makefile in /test/e2e-image"
diff --git a/test/e2e/run-chart-test.sh b/test/e2e/run-chart-test.sh
index a3f5e1b4d..7d388c215 100755
--- a/test/e2e/run-chart-test.sh
+++ b/test/e2e/run-chart-test.sh
@@ -109,7 +109,7 @@ docker run --rm --interactive --network host \
--volume $KUBECONFIG:/root/.kube/config \
--volume "${DIR}/../../":/workdir \
--workdir /workdir \
- registry.k8s.io/ingress-nginx/e2e-test-runner:v20240729-04899b27@sha256:9f067e6c861343da47f5851bf255aecdeb33a61fc5991a6c659fb237a3f619f9 \
+ registry.k8s.io/ingress-nginx/e2e-test-runner:v20240812-3f0129aa@sha256:95c2aaf2a66e8cbbf7a7453046f3b024383c273a0988efab841cd96116afd1a9 \
ct install \
--charts charts/ingress-nginx \
--helm-extra-args "--timeout 60s"
From e5c29d1ce437446f750875094de9fbe9e05c8250 Mon Sep 17 00:00:00 2001
From: chengjoey <30427474+chengjoey@users.noreply.github.com>
Date: Tue, 13 Aug 2024 16:37:37 +0800
Subject: [PATCH 182/283] Controller: Fix panic in alternative backend merging.
(#11789)
---
internal/ingress/controller/controller.go | 12 +++-
.../ingress/controller/controller_test.go | 68 +++++++++++++++++++
2 files changed, 78 insertions(+), 2 deletions(-)
diff --git a/internal/ingress/controller/controller.go b/internal/ingress/controller/controller.go
index 2e782f485..9250ded08 100644
--- a/internal/ingress/controller/controller.go
+++ b/internal/ingress/controller/controller.go
@@ -1594,7 +1594,11 @@ func mergeAlternativeBackends(ing *ingress.Ingress, upstreams map[string]*ingres
altEqualsPri := false
for _, loc := range servers[defServerName].Locations {
- priUps := upstreams[loc.Backend]
+ priUps, ok := upstreams[loc.Backend]
+ if !ok {
+ klog.Warningf("cannot find primary backend %s for location %s%s", loc.Backend, servers[defServerName].Hostname, loc.Path)
+ continue
+ }
altEqualsPri = altUps.Name == priUps.Name
if altEqualsPri {
klog.Warningf("alternative upstream %s in Ingress %s/%s is primary upstream in Other Ingress for location %s%s!",
@@ -1653,7 +1657,11 @@ func mergeAlternativeBackends(ing *ingress.Ingress, upstreams map[string]*ingres
// find matching paths
for _, loc := range server.Locations {
- priUps := upstreams[loc.Backend]
+ priUps, ok := upstreams[loc.Backend]
+ if !ok {
+ klog.Warningf("cannot find primary backend %s for location %s%s", loc.Backend, server.Hostname, loc.Path)
+ continue
+ }
altEqualsPri = altUps.Name == priUps.Name
if altEqualsPri {
klog.Warningf("alternative upstream %s in Ingress %s/%s is primary upstream in Other Ingress for location %s%s!",
diff --git a/internal/ingress/controller/controller_test.go b/internal/ingress/controller/controller_test.go
index e257dd1f1..9d3fea470 100644
--- a/internal/ingress/controller/controller_test.go
+++ b/internal/ingress/controller/controller_test.go
@@ -1292,6 +1292,74 @@ func TestMergeAlternativeBackends(t *testing.T) {
},
},
},
+ "alternative backend does not merge for missing upstream": {
+ &ingress.Ingress{
+ Ingress: networking.Ingress{
+ ObjectMeta: metav1.ObjectMeta{
+ Namespace: "example",
+ },
+ Spec: networking.IngressSpec{
+ Rules: []networking.IngressRule{
+ {
+ Host: "example.com",
+ IngressRuleValue: networking.IngressRuleValue{
+ HTTP: &networking.HTTPIngressRuleValue{
+ Paths: []networking.HTTPIngressPath{
+ {
+ Path: "/",
+ PathType: &pathTypePrefix,
+ Backend: networking.IngressBackend{
+ Service: &networking.IngressServiceBackend{
+ Name: "http-svc-canary",
+ Port: networking.ServiceBackendPort{
+ Number: 80,
+ },
+ },
+ },
+ },
+ },
+ },
+ },
+ },
+ },
+ },
+ },
+ },
+ map[string]*ingress.Backend{
+ "example-http-svc-canary-80": {
+ Name: "example-http-svc-canary-80",
+ NoServer: true,
+ TrafficShapingPolicy: ingress.TrafficShapingPolicy{
+ Weight: 20,
+ },
+ },
+ },
+ map[string]*ingress.Server{
+ "example.com": {
+ Hostname: "example.com",
+ Locations: []*ingress.Location{
+ {
+ Path: "/",
+ PathType: &pathTypePrefix,
+ Backend: "example-http-svc-80",
+ },
+ },
+ },
+ },
+ map[string]*ingress.Backend{},
+ map[string]*ingress.Server{
+ "example.com": {
+ Hostname: "example.com",
+ Locations: []*ingress.Location{
+ {
+ Path: "/",
+ PathType: &pathTypePrefix,
+ Backend: "example-http-svc-80",
+ },
+ },
+ },
+ },
+ },
}
for title, tc := range testCases {
From b933310da5914adbf3f243b5cf902c245d5a0cef Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Tue, 13 Aug 2024 12:28:06 +0200
Subject: [PATCH 183/283] Images: Trigger other builds. (#11796)
---
images/cfssl/TAG | 2 +-
images/custom-error-pages/TAG | 2 +-
images/e2e-test-echo/TAG | 2 +-
images/ext-auth-example-authsvc/TAG | 2 +-
images/fastcgi-helloserver/TAG | 2 +-
images/go-grpc-greeter-server/TAG | 2 +-
images/httpbun/TAG | 2 +-
images/kube-webhook-certgen/TAG | 2 +-
images/nginx/TAG | 2 +-
images/opentelemetry/TAG | 2 +-
10 files changed, 10 insertions(+), 10 deletions(-)
diff --git a/images/cfssl/TAG b/images/cfssl/TAG
index 7df503e63..0ec25f750 100644
--- a/images/cfssl/TAG
+++ b/images/cfssl/TAG
@@ -1 +1 @@
-v0.0.4
+v1.0.0
diff --git a/images/custom-error-pages/TAG b/images/custom-error-pages/TAG
index f9cece58d..0ec25f750 100644
--- a/images/custom-error-pages/TAG
+++ b/images/custom-error-pages/TAG
@@ -1 +1 @@
-v0.0.3
+v1.0.0
diff --git a/images/e2e-test-echo/TAG b/images/e2e-test-echo/TAG
index f9cece58d..0ec25f750 100644
--- a/images/e2e-test-echo/TAG
+++ b/images/e2e-test-echo/TAG
@@ -1 +1 @@
-v0.0.3
+v1.0.0
diff --git a/images/ext-auth-example-authsvc/TAG b/images/ext-auth-example-authsvc/TAG
index f9cece58d..0ec25f750 100644
--- a/images/ext-auth-example-authsvc/TAG
+++ b/images/ext-auth-example-authsvc/TAG
@@ -1 +1 @@
-v0.0.3
+v1.0.0
diff --git a/images/fastcgi-helloserver/TAG b/images/fastcgi-helloserver/TAG
index f9cece58d..0ec25f750 100644
--- a/images/fastcgi-helloserver/TAG
+++ b/images/fastcgi-helloserver/TAG
@@ -1 +1 @@
-v0.0.3
+v1.0.0
diff --git a/images/go-grpc-greeter-server/TAG b/images/go-grpc-greeter-server/TAG
index f9cece58d..0ec25f750 100644
--- a/images/go-grpc-greeter-server/TAG
+++ b/images/go-grpc-greeter-server/TAG
@@ -1 +1 @@
-v0.0.3
+v1.0.0
diff --git a/images/httpbun/TAG b/images/httpbun/TAG
index f9cece58d..0ec25f750 100644
--- a/images/httpbun/TAG
+++ b/images/httpbun/TAG
@@ -1 +1 @@
-v0.0.3
+v1.0.0
diff --git a/images/kube-webhook-certgen/TAG b/images/kube-webhook-certgen/TAG
index c432e90f2..92f76b423 100644
--- a/images/kube-webhook-certgen/TAG
+++ b/images/kube-webhook-certgen/TAG
@@ -1 +1 @@
-v1.4.2
+v1.4.3
diff --git a/images/nginx/TAG b/images/nginx/TAG
index bbdeab622..0ec25f750 100644
--- a/images/nginx/TAG
+++ b/images/nginx/TAG
@@ -1 +1 @@
-0.0.5
+v1.0.0
diff --git a/images/opentelemetry/TAG b/images/opentelemetry/TAG
index a3dce6cd3..0ec25f750 100644
--- a/images/opentelemetry/TAG
+++ b/images/opentelemetry/TAG
@@ -1 +1 @@
-v0.0.2
+v1.0.0
From 0dd1bf5fb93101fc62a43c24d26ab26d0b027249 Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Tue, 13 Aug 2024 19:35:35 +0200
Subject: [PATCH 184/283] Images: Trigger failed builds. (#11800)
---
images/custom-error-pages/TAG | 2 +-
images/fastcgi-helloserver/TAG | 2 +-
images/httpbun/TAG | 2 +-
3 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/images/custom-error-pages/TAG b/images/custom-error-pages/TAG
index 0ec25f750..b18d46540 100644
--- a/images/custom-error-pages/TAG
+++ b/images/custom-error-pages/TAG
@@ -1 +1 @@
-v1.0.0
+v1.0.1
diff --git a/images/fastcgi-helloserver/TAG b/images/fastcgi-helloserver/TAG
index 0ec25f750..b18d46540 100644
--- a/images/fastcgi-helloserver/TAG
+++ b/images/fastcgi-helloserver/TAG
@@ -1 +1 @@
-v1.0.0
+v1.0.1
diff --git a/images/httpbun/TAG b/images/httpbun/TAG
index 0ec25f750..b18d46540 100644
--- a/images/httpbun/TAG
+++ b/images/httpbun/TAG
@@ -1 +1 @@
-v1.0.0
+v1.0.1
From 004321e265d4653d57c7f40c30432724c539df4f Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Wed, 14 Aug 2024 19:55:17 +0200
Subject: [PATCH 185/283] Tests & Docs: Bump images. (#11803)
* Tests: Bump CFSSL.
* Docs: Bump Custom Error Pages.
* Tests: Bump FastCGI HelloServer.
* Tests: Bump HTTPBun.
* Docs: Bump OpenTelemetry.
---
.../custom-errors/custom-default-backend.helm.values.yaml | 4 ++--
.../customization/custom-errors/custom-default-backend.yaml | 2 +-
docs/user-guide/third-party-addons/opentelemetry.md | 2 +-
images/test-runner/rootfs/Dockerfile | 4 ++--
test/e2e/HTTPBUN_IMAGE | 2 +-
test/e2e/framework/fastcgi_helloserver.go | 2 +-
test/e2e/settings/ocsp/ocsp.go | 2 +-
7 files changed, 9 insertions(+), 9 deletions(-)
diff --git a/docs/examples/customization/custom-errors/custom-default-backend.helm.values.yaml b/docs/examples/customization/custom-errors/custom-default-backend.helm.values.yaml
index 708a93831..e6c3e2169 100644
--- a/docs/examples/customization/custom-errors/custom-default-backend.helm.values.yaml
+++ b/docs/examples/customization/custom-errors/custom-default-backend.helm.values.yaml
@@ -5,8 +5,8 @@ defaultBackend:
enabled: true
image:
registry: registry.k8s.io
- image: ingress-nginx/nginx-errors
- tag: "v20230505@sha256:3600dcd1bbd0d05959bb01af4b272714e94d22d24a64e91838e7183c80e53f7f"
+ image: ingress-nginx/custom-error-pages
+ tag: v1.0.1@sha256:d8ab7de384cf41bdaa696354e19f1d0efbb0c9ac69f8682ffc0cc008a252eb76
extraVolumes:
- name: custom-error-pages
configMap:
diff --git a/docs/examples/customization/custom-errors/custom-default-backend.yaml b/docs/examples/customization/custom-errors/custom-default-backend.yaml
index e606c5b62..a47805ad7 100644
--- a/docs/examples/customization/custom-errors/custom-default-backend.yaml
+++ b/docs/examples/customization/custom-errors/custom-default-backend.yaml
@@ -36,7 +36,7 @@ spec:
spec:
containers:
- name: nginx-error-server
- image: registry.k8s.io/ingress-nginx/nginx-errors:v20230505@sha256:3600dcd1bbd0d05959bb01af4b272714e94d22d24a64e91838e7183c80e53f7f
+ image: registry.k8s.io/ingress-nginx/custom-error-pages:v1.0.1@sha256:d8ab7de384cf41bdaa696354e19f1d0efbb0c9ac69f8682ffc0cc008a252eb76
ports:
- containerPort: 8080
# Setting the environment variable DEBUG we can see the headers sent
diff --git a/docs/user-guide/third-party-addons/opentelemetry.md b/docs/user-guide/third-party-addons/opentelemetry.md
index e681e1c69..4d71ff675 100644
--- a/docs/user-guide/third-party-addons/opentelemetry.md
+++ b/docs/user-guide/third-party-addons/opentelemetry.md
@@ -152,7 +152,7 @@ To install the example and collectors run:
```yaml
opentelemetry:
enabled: true
- image: registry.k8s.io/ingress-nginx/opentelemetry:v20230527@sha256:fd7ec835f31b7b37187238eb4fdad4438806e69f413a203796263131f4f02ed0
+ image: registry.k8s.io/ingress-nginx/opentelemetry-1.25.3:v20240813-b933310d@sha256:f7604ac0547ed64d79b98d92133234e66c2c8aade3c1f4809fed5eec1fb7f922
containerSecurityContext:
allowPrivilegeEscalation: false
```
diff --git a/images/test-runner/rootfs/Dockerfile b/images/test-runner/rootfs/Dockerfile
index ff031182d..fd664f2e5 100644
--- a/images/test-runner/rootfs/Dockerfile
+++ b/images/test-runner/rootfs/Dockerfile
@@ -66,8 +66,8 @@ RUN apk update && apk upgrade && apk add --no-cache \
openssl \
cfssl@testing \
tzdata \
- libc6-compat \
- sqlite-dev
+ libc6-compat \
+ sqlite-dev
RUN go install -v github.com/onsi/ginkgo/v2/ginkgo@v${GINKGO_VERSION} \
&& go install golang.org/x/lint/golint@${GOLINT_VERSION}
diff --git a/test/e2e/HTTPBUN_IMAGE b/test/e2e/HTTPBUN_IMAGE
index 7e83b49fe..7deb1e1cb 100644
--- a/test/e2e/HTTPBUN_IMAGE
+++ b/test/e2e/HTTPBUN_IMAGE
@@ -1 +1 @@
-registry.k8s.io/ingress-nginx/e2e-test-httpbun:v20231011-8b53cabe0
+registry.k8s.io/ingress-nginx/httpbun:v1.0.1@sha256:264371edd5b19ddc2da9333bb4d87c0ce3c0cf37c73c4adeb8bc641b872bc9da
diff --git a/test/e2e/framework/fastcgi_helloserver.go b/test/e2e/framework/fastcgi_helloserver.go
index 73f9ef340..60482c067 100644
--- a/test/e2e/framework/fastcgi_helloserver.go
+++ b/test/e2e/framework/fastcgi_helloserver.go
@@ -59,7 +59,7 @@ func (f *Framework) NewNewFastCGIHelloServerDeploymentWithReplicas(replicas int3
Containers: []corev1.Container{
{
Name: "fastcgi-helloserver",
- Image: "registry.k8s.io/ingress-nginx/e2e-test-fastcgi-helloserver@sha256:0e08c836cc58f1ea862578de99b13bc4264fe071e816f96dc1d79857bfba7473",
+ Image: "registry.k8s.io/ingress-nginx/fastcgi-helloserver:v1.0.1@sha256:bfcce5866d106450f41af15af868886c953c3661373f34aa6d99bcc6f44c6ba6",
Env: []corev1.EnvVar{},
Ports: []corev1.ContainerPort{
{
diff --git a/test/e2e/settings/ocsp/ocsp.go b/test/e2e/settings/ocsp/ocsp.go
index 21cda3008..ef3bfb58a 100644
--- a/test/e2e/settings/ocsp/ocsp.go
+++ b/test/e2e/settings/ocsp/ocsp.go
@@ -295,7 +295,7 @@ func ocspserveDeployment(namespace string) (*appsv1.Deployment, *corev1.Service)
Containers: []corev1.Container{
{
Name: name,
- Image: "registry.k8s.io/ingress-nginx/e2e-test-cfssl@sha256:48869cf72b0ceb1d8c82029f85961e423daf3ff8a04f4a455150000f90a90606",
+ Image: "registry.k8s.io/ingress-nginx/cfssl:v1.0.0@sha256:fffd36e2f1c8fd485ec6fd24c6d55f0817b54352274293d2a247b8a0d924c5b0",
Command: []string{
"/bin/bash",
"-c",
From 593f05ed571fdd69e06504d13c4f15308643ad66 Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Thu, 15 Aug 2024 13:33:14 +0200
Subject: [PATCH 186/283] Chart: Bump Kube Webhook CertGen & OpenTelemetry.
(#11809)
---
charts/ingress-nginx/README.md | 10 +++++-----
charts/ingress-nginx/values.yaml | 10 +++++-----
2 files changed, 10 insertions(+), 10 deletions(-)
diff --git a/charts/ingress-nginx/README.md b/charts/ingress-nginx/README.md
index 64abf33cc..3b10e8ee7 100644
--- a/charts/ingress-nginx/README.md
+++ b/charts/ingress-nginx/README.md
@@ -253,11 +253,11 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
| controller.admissionWebhooks.namespaceSelector | object | `{}` | |
| controller.admissionWebhooks.objectSelector | object | `{}` | |
| controller.admissionWebhooks.patch.enabled | bool | `true` | |
-| controller.admissionWebhooks.patch.image.digest | string | `"sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366"` | |
+| controller.admissionWebhooks.patch.image.digest | string | `"sha256:a320a50cc91bd15fd2d6fa6de58bd98c1bd64b9a6f926ce23a600d87043455a3"` | |
| controller.admissionWebhooks.patch.image.image | string | `"ingress-nginx/kube-webhook-certgen"` | |
| controller.admissionWebhooks.patch.image.pullPolicy | string | `"IfNotPresent"` | |
| controller.admissionWebhooks.patch.image.registry | string | `"registry.k8s.io"` | |
-| controller.admissionWebhooks.patch.image.tag | string | `"v1.4.1"` | |
+| controller.admissionWebhooks.patch.image.tag | string | `"v1.4.3"` | |
| controller.admissionWebhooks.patch.labels | object | `{}` | Labels to be added to patch job resources |
| controller.admissionWebhooks.patch.networkPolicy.enabled | bool | `false` | Enable 'networkPolicy' or not |
| controller.admissionWebhooks.patch.nodeSelector."kubernetes.io/os" | string | `"linux"` | |
@@ -402,11 +402,11 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
| controller.opentelemetry.containerSecurityContext.runAsUser | int | `65532` | The image's default user, inherited from its base image `cgr.dev/chainguard/static`. |
| controller.opentelemetry.containerSecurityContext.seccompProfile.type | string | `"RuntimeDefault"` | |
| controller.opentelemetry.enabled | bool | `false` | |
-| controller.opentelemetry.image.digest | string | `"sha256:13bee3f5223883d3ca62fee7309ad02d22ec00ff0d7033e3e9aca7a9f60fd472"` | |
+| controller.opentelemetry.image.digest | string | `"sha256:f7604ac0547ed64d79b98d92133234e66c2c8aade3c1f4809fed5eec1fb7f922"` | |
| controller.opentelemetry.image.distroless | bool | `true` | |
-| controller.opentelemetry.image.image | string | `"ingress-nginx/opentelemetry"` | |
+| controller.opentelemetry.image.image | string | `"ingress-nginx/opentelemetry-1.25.3"` | |
| controller.opentelemetry.image.registry | string | `"registry.k8s.io"` | |
-| controller.opentelemetry.image.tag | string | `"v20230721-3e2062ee5"` | |
+| controller.opentelemetry.image.tag | string | `"v20240813-b933310d"` | |
| controller.opentelemetry.name | string | `"opentelemetry"` | |
| controller.opentelemetry.resources | object | `{}` | |
| controller.podAnnotations | object | `{}` | Annotations to be added to controller pods # |
diff --git a/charts/ingress-nginx/values.yaml b/charts/ingress-nginx/values.yaml
index 9d309627d..026a43f43 100644
--- a/charts/ingress-nginx/values.yaml
+++ b/charts/ingress-nginx/values.yaml
@@ -711,12 +711,12 @@ controller:
name: opentelemetry
image:
registry: registry.k8s.io
- image: ingress-nginx/opentelemetry
+ image: ingress-nginx/opentelemetry-1.25.3
## for backwards compatibility consider setting the full image url via the repository value below
## use *either* current default registry/image or repository format or installing chart by providing the values.yaml will fail
## repository:
- tag: "v20230721-3e2062ee5"
- digest: sha256:13bee3f5223883d3ca62fee7309ad02d22ec00ff0d7033e3e9aca7a9f60fd472
+ tag: v20240813-b933310d
+ digest: sha256:f7604ac0547ed64d79b98d92133234e66c2c8aade3c1f4809fed5eec1fb7f922
distroless: true
containerSecurityContext:
runAsNonRoot: true
@@ -812,8 +812,8 @@ controller:
## for backwards compatibility consider setting the full image url via the repository value below
## use *either* current default registry/image or repository format or installing chart by providing the values.yaml will fail
## repository:
- tag: v1.4.1
- digest: sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
+ tag: v1.4.3
+ digest: sha256:a320a50cc91bd15fd2d6fa6de58bd98c1bd64b9a6f926ce23a600d87043455a3
pullPolicy: IfNotPresent
# -- Provide a priority class name to the webhook patching job
##
From d70b849d253749431aebc13e789c5981ee6f4538 Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Fri, 16 Aug 2024 09:25:07 +0200
Subject: [PATCH 187/283] Release controller v1.11.2/v1.10.4 & chart
v4.11.2/v4.10.4. (#11816)
---
README.md | 2 +
changelog/controller-1.10.4.md | 53 ++++++++++++++++++
changelog/controller-1.11.2.md | 54 +++++++++++++++++++
charts/ingress-nginx/Chart.yaml | 6 +--
charts/ingress-nginx/README.md | 8 +--
.../changelog/helm-chart-4.10.4.md | 9 ++++
.../changelog/helm-chart-4.11.2.md | 9 ++++
charts/ingress-nginx/values.yaml | 6 +--
deploy/static/provider/aws/deploy.yaml | 48 ++++++++---------
.../aws/nlb-with-tls-termination/deploy.yaml | 48 ++++++++---------
deploy/static/provider/baremetal/deploy.yaml | 48 ++++++++---------
deploy/static/provider/cloud/deploy.yaml | 48 ++++++++---------
deploy/static/provider/do/deploy.yaml | 48 ++++++++---------
deploy/static/provider/exoscale/deploy.yaml | 48 ++++++++---------
deploy/static/provider/kind/deploy.yaml | 48 ++++++++---------
deploy/static/provider/oracle/deploy.yaml | 48 ++++++++---------
deploy/static/provider/scw/deploy.yaml | 48 ++++++++---------
docs/deploy/index.md | 20 +++----
docs/e2e-tests.md | 3 ++
19 files changed, 366 insertions(+), 236 deletions(-)
create mode 100644 changelog/controller-1.10.4.md
create mode 100644 changelog/controller-1.11.2.md
create mode 100644 charts/ingress-nginx/changelog/helm-chart-4.10.4.md
create mode 100644 charts/ingress-nginx/changelog/helm-chart-4.11.2.md
diff --git a/README.md b/README.md
index 00960a4b7..b1cd22aa1 100644
--- a/README.md
+++ b/README.md
@@ -37,8 +37,10 @@ the versions listed. Ingress-Nginx versions **may** work on older versions, but
| Supported | Ingress-NGINX version | k8s supported version | Alpine Version | Nginx Version | Helm Chart Version |
| :-------: | --------------------- | ----------------------------- | -------------- | ------------- | ------------------ |
+| 🔄 | **v1.11.2** | 1.30, 1.29, 1.28, 1.27, 1.26 | 3.20.0 | 1.25.5 | 4.11.2 |
| 🔄 | **v1.11.1** | 1.30, 1.29, 1.28, 1.27, 1.26 | 3.20.0 | 1.25.5 | 4.11.1 |
| 🔄 | **v1.11.0** | 1.30, 1.29, 1.28, 1.27, 1.26 | 3.20.0 | 1.25.5 | 4.11.0 |
+| 🔄 | **v1.10.4** | 1.30, 1.29, 1.28, 1.27, 1.26 | 3.20.0 | 1.25.5 | 4.10.4 |
| 🔄 | **v1.10.3** | 1.30, 1.29, 1.28, 1.27, 1.26 | 3.20.0 | 1.25.5 | 4.10.3 |
| 🔄 | **v1.10.2** | 1.30, 1.29, 1.28, 1.27, 1.26 | 3.20.0 | 1.25.5 | 4.10.2 |
| 🔄 | **v1.10.1** | 1.30, 1.29, 1.28, 1.27, 1.26 | 3.19.1 | 1.25.3 | 4.10.1 |
diff --git a/changelog/controller-1.10.4.md b/changelog/controller-1.10.4.md
new file mode 100644
index 000000000..9a4e8025b
--- /dev/null
+++ b/changelog/controller-1.10.4.md
@@ -0,0 +1,53 @@
+# Changelog
+
+### controller-v1.10.4
+
+Images:
+
+* registry.k8s.io/ingress-nginx/controller:v1.10.4@sha256:505b9048c02dde3d6c8667bf0b52aba7b36adf7b03da34c47d5fa312d2d4c6fc
+* registry.k8s.io/ingress-nginx/controller-chroot:v1.10.4@sha256:bf71acf6e71830a4470e2183e3bc93c4f006b954f8a05fb434242ef0f8a24858
+
+### All changes:
+
+* Chart: Bump Kube Webhook CertGen & OpenTelemetry. (#11811)
+* Images: Trigger controller build. (#11808)
+* Tests & Docs: Bump images. (#11804)
+* Images: Trigger failed builds. (#11801)
+* Images: Trigger other builds. (#11797)
+* Controller: Fix panic in alternative backend merging. (#11793)
+* Tests: Bump `e2e-test-runner` to v20240812-3f0129aa. (#11791)
+* Images: Trigger `test-runner` build. (#11786)
+* Images: Bump `NGINX_BASE` to v0.0.12. (#11783)
+* Images: Trigger NGINX build. (#11780)
+* Cloud Build: Add missing config, remove unused ones. (#11776)
+* Generate correct output on NumCPU() when using cgroups2 (#11775)
+* Cloud Build: Tweak timeouts. (#11762)
+* Cloud Build: Fix substitutions. (#11759)
+* Cloud Build: Some chores. (#11756)
+* Go: Bump to v1.22.6. (#11748)
+* Images: Bump `NGINX_BASE` to v0.0.11. (#11744)
+* Images: Trigger NGINX build. (#11736)
+* docs: update OpenSSL Roadmap link (#11734)
+* Go: Bump to v1.22.5. (#11731)
+* Docs: Fix typo in AWS LB Controller reference (#11724)
+* Perform some cleaning operations on line breaks. (#11722)
+* Missing anchors in regular expression. (#11718)
+* Docs: Fix `from-to-www` redirect description. (#11715)
+* Chart: Remove `isControllerTagValid`. (#11714)
+* Tests: Bump `e2e-test-runner` to v20240729-04899b27. (#11704)
+* Docs: Clarify `from-to-www` redirect direction. (#11692)
+* added real-client-ip faq (#11665)
+* Docs: Format NGINX configuration table. (#11660)
+
+### Dependency updates:
+
+* Bump github.com/onsi/ginkgo/v2 from 2.19.1 to 2.20.0 (#11772)
+* Bump the all group with 2 updates (#11770)
+* Bump golang.org/x/crypto from 0.25.0 to 0.26.0 (#11768)
+* Bump the all group with 3 updates (#11729)
+* Bump github.com/onsi/ginkgo/v2 from 2.19.0 to 2.19.1 in the all group (#11700)
+* Bump the all group with 2 updates (#11697)
+* Bump the all group with 4 updates (#11676)
+* Bump the all group with 2 updates (#11674)
+
+**Full Changelog**: https://github.com/kubernetes/ingress-nginx/compare/controller-v1.10.3...controller-v1.10.4
diff --git a/changelog/controller-1.11.2.md b/changelog/controller-1.11.2.md
new file mode 100644
index 000000000..0979af15d
--- /dev/null
+++ b/changelog/controller-1.11.2.md
@@ -0,0 +1,54 @@
+# Changelog
+
+### controller-v1.11.2
+
+Images:
+
+* registry.k8s.io/ingress-nginx/controller:v1.11.2@sha256:d5f8217feeac4887cb1ed21f27c2674e58be06bd8f5184cacea2a69abaf78dce
+* registry.k8s.io/ingress-nginx/controller-chroot:v1.11.2@sha256:21b55a2f0213a18b91612a8c0850167e00a8e34391fd595139a708f9c047e7a8
+
+### All changes:
+
+* Chart: Bump Kube Webhook CertGen & OpenTelemetry. (#11812)
+* Images: Trigger controller build. (#11807)
+* Tests & Docs: Bump images. (#11805)
+* Images: Trigger failed builds. (#11802)
+* Images: Trigger other builds. (#11798)
+* Controller: Fix panic in alternative backend merging. (#11794)
+* Tests: Bump `e2e-test-runner` to v20240812-3f0129aa. (#11792)
+* Images: Trigger `test-runner` build. (#11787)
+* Images: Bump `NGINX_BASE` to v0.0.12. (#11784)
+* Images: Trigger NGINX build. (#11781)
+* Cloud Build: Add missing config, remove unused ones. (#11777)
+* Generate correct output on NumCPU() when using cgroups2 (#11778)
+* Cloud Build: Tweak timeouts. (#11763)
+* Cloud Build: Fix substitutions. (#11760)
+* Cloud Build: Some chores. (#11757)
+* Go: Bump to v1.22.6. (#11749)
+* Images: Bump `NGINX_BASE` to v0.0.11. (#11743)
+* Images: Trigger NGINX build. (#11737)
+* docs: update OpenSSL Roadmap link (#11733)
+* Go: Bump to v1.22.5. (#11732)
+* Docs: Fix typo in AWS LB Controller reference (#11725)
+* Perform some cleaning operations on line breaks. (#11721)
+* Missing anchors in regular expression. (#11719)
+* Docs: Fix `from-to-www` redirect description. (#11716)
+* Chart: Remove `isControllerTagValid`. (#11713)
+* Tests: Bump `e2e-test-runner` to v20240729-04899b27. (#11705)
+* Docs: Clarify `from-to-www` redirect direction. (#11693)
+* added real-client-ip faq (#11664)
+* Docs: Format NGINX configuration table. (#11662)
+* Docs: Update version in `deploy/index.md`. (#11652)
+
+### Dependency updates:
+
+* Bump github.com/onsi/ginkgo/v2 from 2.19.1 to 2.20.0 (#11773)
+* Bump the all group with 2 updates (#11771)
+* Bump golang.org/x/crypto from 0.25.0 to 0.26.0 (#11769)
+* Bump the all group with 3 updates (#11728)
+* Bump github.com/onsi/ginkgo/v2 from 2.19.0 to 2.19.1 in the all group (#11701)
+* Bump the all group with 2 updates (#11698)
+* Bump the all group with 4 updates (#11677)
+* Bump the all group with 2 updates (#11675)
+
+**Full Changelog**: https://github.com/kubernetes/ingress-nginx/compare/controller-v1.11.1...controller-v1.11.2
diff --git a/charts/ingress-nginx/Chart.yaml b/charts/ingress-nginx/Chart.yaml
index 62c880fc9..fd7b81030 100644
--- a/charts/ingress-nginx/Chart.yaml
+++ b/charts/ingress-nginx/Chart.yaml
@@ -1,9 +1,9 @@
annotations:
artifacthub.io/changes: |
- - Update Ingress-Nginx version controller-v1.11.1
+ - Update Ingress-Nginx version controller-v1.11.2
artifacthub.io/prerelease: "false"
apiVersion: v2
-appVersion: 1.11.1
+appVersion: 1.11.2
description: Ingress controller for Kubernetes using NGINX as a reverse proxy and
load balancer
home: https://github.com/kubernetes/ingress-nginx
@@ -22,4 +22,4 @@ maintainers:
name: ingress-nginx
sources:
- https://github.com/kubernetes/ingress-nginx
-version: 4.11.1
+version: 4.11.2
diff --git a/charts/ingress-nginx/README.md b/charts/ingress-nginx/README.md
index 3b10e8ee7..c1d1dfb66 100644
--- a/charts/ingress-nginx/README.md
+++ b/charts/ingress-nginx/README.md
@@ -2,7 +2,7 @@
[ingress-nginx](https://github.com/kubernetes/ingress-nginx) Ingress controller for Kubernetes using NGINX as a reverse proxy and load balancer
- 
+ 
To use, add `ingressClassName: nginx` spec field or the `kubernetes.io/ingress.class: nginx` annotation to your Ingress resources.
@@ -325,8 +325,8 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
| controller.hostname | object | `{}` | Optionally customize the pod hostname. |
| controller.image.allowPrivilegeEscalation | bool | `false` | |
| controller.image.chroot | bool | `false` | |
-| controller.image.digest | string | `"sha256:e6439a12b52076965928e83b7b56aae6731231677b01e81818bce7fa5c60161a"` | |
-| controller.image.digestChroot | string | `"sha256:7cabe4bd7558bfdf5b707976d7be56fd15ffece735d7c90fc238b6eda290fd8d"` | |
+| controller.image.digest | string | `"sha256:d5f8217feeac4887cb1ed21f27c2674e58be06bd8f5184cacea2a69abaf78dce"` | |
+| controller.image.digestChroot | string | `"sha256:21b55a2f0213a18b91612a8c0850167e00a8e34391fd595139a708f9c047e7a8"` | |
| controller.image.image | string | `"ingress-nginx/controller"` | |
| controller.image.pullPolicy | string | `"IfNotPresent"` | |
| controller.image.readOnlyRootFilesystem | bool | `false` | |
@@ -335,7 +335,7 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
| controller.image.runAsNonRoot | bool | `true` | |
| controller.image.runAsUser | int | `101` | This value must not be changed using the official image. uid=101(www-data) gid=82(www-data) groups=82(www-data) |
| controller.image.seccompProfile.type | string | `"RuntimeDefault"` | |
-| controller.image.tag | string | `"v1.11.1"` | |
+| controller.image.tag | string | `"v1.11.2"` | |
| controller.ingressClass | string | `"nginx"` | For backwards compatibility with ingress.class annotation, use ingressClass. Algorithm is as follows, first ingressClassName is considered, if not present, controller looks for ingress.class annotation |
| controller.ingressClassByName | bool | `false` | Process IngressClass per name (additionally as per spec.controller). |
| controller.ingressClassResource | object | `{"aliases":[],"annotations":{},"controllerValue":"k8s.io/ingress-nginx","default":false,"enabled":true,"name":"nginx","parameters":{}}` | This section refers to the creation of the IngressClass resource. IngressClasses are immutable and cannot be changed after creation. We do not support namespaced IngressClasses, yet, so a ClusterRole and a ClusterRoleBinding is required. |
diff --git a/charts/ingress-nginx/changelog/helm-chart-4.10.4.md b/charts/ingress-nginx/changelog/helm-chart-4.10.4.md
new file mode 100644
index 000000000..661d3c9bb
--- /dev/null
+++ b/charts/ingress-nginx/changelog/helm-chart-4.10.4.md
@@ -0,0 +1,9 @@
+# Changelog
+
+This file documents all notable changes to [ingress-nginx](https://github.com/kubernetes/ingress-nginx) Helm Chart. The release numbering uses [semantic versioning](http://semver.org).
+
+### 4.10.4
+
+* Update Ingress-Nginx version controller-v1.10.4
+
+**Full Changelog**: https://github.com/kubernetes/ingress-nginx/compare/helm-chart-4.10.3...helm-chart-4.10.4
diff --git a/charts/ingress-nginx/changelog/helm-chart-4.11.2.md b/charts/ingress-nginx/changelog/helm-chart-4.11.2.md
new file mode 100644
index 000000000..c7645a5b6
--- /dev/null
+++ b/charts/ingress-nginx/changelog/helm-chart-4.11.2.md
@@ -0,0 +1,9 @@
+# Changelog
+
+This file documents all notable changes to [ingress-nginx](https://github.com/kubernetes/ingress-nginx) Helm Chart. The release numbering uses [semantic versioning](http://semver.org).
+
+### 4.11.2
+
+* Update Ingress-Nginx version controller-v1.11.2
+
+**Full Changelog**: https://github.com/kubernetes/ingress-nginx/compare/helm-chart-4.11.1...helm-chart-4.11.2
diff --git a/charts/ingress-nginx/values.yaml b/charts/ingress-nginx/values.yaml
index 026a43f43..55d6c9a92 100644
--- a/charts/ingress-nginx/values.yaml
+++ b/charts/ingress-nginx/values.yaml
@@ -26,9 +26,9 @@ controller:
## for backwards compatibility consider setting the full image url via the repository value below
## use *either* current default registry/image or repository format or installing chart by providing the values.yaml will fail
## repository:
- tag: "v1.11.1"
- digest: sha256:e6439a12b52076965928e83b7b56aae6731231677b01e81818bce7fa5c60161a
- digestChroot: sha256:7cabe4bd7558bfdf5b707976d7be56fd15ffece735d7c90fc238b6eda290fd8d
+ tag: "v1.11.2"
+ digest: sha256:d5f8217feeac4887cb1ed21f27c2674e58be06bd8f5184cacea2a69abaf78dce
+ digestChroot: sha256:21b55a2f0213a18b91612a8c0850167e00a8e34391fd595139a708f9c047e7a8
pullPolicy: IfNotPresent
runAsNonRoot: true
# -- This value must not be changed using the official image.
diff --git a/deploy/static/provider/aws/deploy.yaml b/deploy/static/provider/aws/deploy.yaml
index f74fa7fab..fb4a91472 100644
--- a/deploy/static/provider/aws/deploy.yaml
+++ b/deploy/static/provider/aws/deploy.yaml
@@ -15,7 +15,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
namespace: ingress-nginx
---
@@ -28,7 +28,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
namespace: ingress-nginx
---
@@ -40,7 +40,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
namespace: ingress-nginx
rules:
@@ -130,7 +130,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
namespace: ingress-nginx
rules:
@@ -149,7 +149,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
rules:
- apiGroups:
@@ -231,7 +231,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
rules:
- apiGroups:
@@ -250,7 +250,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
namespace: ingress-nginx
roleRef:
@@ -270,7 +270,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
namespace: ingress-nginx
roleRef:
@@ -289,7 +289,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -308,7 +308,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -329,7 +329,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller
namespace: ingress-nginx
---
@@ -345,7 +345,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -378,7 +378,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller-admission
namespace: ingress-nginx
spec:
@@ -401,7 +401,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -423,7 +423,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
spec:
containers:
- args:
@@ -448,7 +448,7 @@ spec:
fieldPath: metadata.namespace
- name: LD_PRELOAD
value: /usr/local/lib/libmimalloc.so
- image: registry.k8s.io/ingress-nginx/controller:v1.11.1@sha256:e6439a12b52076965928e83b7b56aae6731231677b01e81818bce7fa5c60161a
+ image: registry.k8s.io/ingress-nginx/controller:v1.11.2@sha256:d5f8217feeac4887cb1ed21f27c2674e58be06bd8f5184cacea2a69abaf78dce
imagePullPolicy: IfNotPresent
lifecycle:
preStop:
@@ -524,7 +524,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-create
namespace: ingress-nginx
spec:
@@ -535,7 +535,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-create
spec:
containers:
@@ -549,7 +549,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.3@sha256:a320a50cc91bd15fd2d6fa6de58bd98c1bd64b9a6f926ce23a600d87043455a3
imagePullPolicy: IfNotPresent
name: create
securityContext:
@@ -575,7 +575,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-patch
namespace: ingress-nginx
spec:
@@ -586,7 +586,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-patch
spec:
containers:
@@ -602,7 +602,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.3@sha256:a320a50cc91bd15fd2d6fa6de58bd98c1bd64b9a6f926ce23a600d87043455a3
imagePullPolicy: IfNotPresent
name: patch
securityContext:
@@ -628,7 +628,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: nginx
spec:
controller: k8s.io/ingress-nginx
@@ -641,7 +641,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
webhooks:
- admissionReviewVersions:
diff --git a/deploy/static/provider/aws/nlb-with-tls-termination/deploy.yaml b/deploy/static/provider/aws/nlb-with-tls-termination/deploy.yaml
index 683e96446..4fff060c1 100644
--- a/deploy/static/provider/aws/nlb-with-tls-termination/deploy.yaml
+++ b/deploy/static/provider/aws/nlb-with-tls-termination/deploy.yaml
@@ -15,7 +15,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
namespace: ingress-nginx
---
@@ -28,7 +28,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
namespace: ingress-nginx
---
@@ -40,7 +40,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
namespace: ingress-nginx
rules:
@@ -130,7 +130,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
namespace: ingress-nginx
rules:
@@ -149,7 +149,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
rules:
- apiGroups:
@@ -231,7 +231,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
rules:
- apiGroups:
@@ -250,7 +250,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
namespace: ingress-nginx
roleRef:
@@ -270,7 +270,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
namespace: ingress-nginx
roleRef:
@@ -289,7 +289,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -308,7 +308,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -336,7 +336,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller
namespace: ingress-nginx
---
@@ -354,7 +354,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -387,7 +387,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller-admission
namespace: ingress-nginx
spec:
@@ -410,7 +410,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -432,7 +432,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
spec:
containers:
- args:
@@ -457,7 +457,7 @@ spec:
fieldPath: metadata.namespace
- name: LD_PRELOAD
value: /usr/local/lib/libmimalloc.so
- image: registry.k8s.io/ingress-nginx/controller:v1.11.1@sha256:e6439a12b52076965928e83b7b56aae6731231677b01e81818bce7fa5c60161a
+ image: registry.k8s.io/ingress-nginx/controller:v1.11.2@sha256:d5f8217feeac4887cb1ed21f27c2674e58be06bd8f5184cacea2a69abaf78dce
imagePullPolicy: IfNotPresent
lifecycle:
preStop:
@@ -536,7 +536,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-create
namespace: ingress-nginx
spec:
@@ -547,7 +547,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-create
spec:
containers:
@@ -561,7 +561,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.3@sha256:a320a50cc91bd15fd2d6fa6de58bd98c1bd64b9a6f926ce23a600d87043455a3
imagePullPolicy: IfNotPresent
name: create
securityContext:
@@ -587,7 +587,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-patch
namespace: ingress-nginx
spec:
@@ -598,7 +598,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-patch
spec:
containers:
@@ -614,7 +614,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.3@sha256:a320a50cc91bd15fd2d6fa6de58bd98c1bd64b9a6f926ce23a600d87043455a3
imagePullPolicy: IfNotPresent
name: patch
securityContext:
@@ -640,7 +640,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: nginx
spec:
controller: k8s.io/ingress-nginx
@@ -653,7 +653,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
webhooks:
- admissionReviewVersions:
diff --git a/deploy/static/provider/baremetal/deploy.yaml b/deploy/static/provider/baremetal/deploy.yaml
index 481ede02e..8cad92d4c 100644
--- a/deploy/static/provider/baremetal/deploy.yaml
+++ b/deploy/static/provider/baremetal/deploy.yaml
@@ -15,7 +15,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
namespace: ingress-nginx
---
@@ -28,7 +28,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
namespace: ingress-nginx
---
@@ -40,7 +40,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
namespace: ingress-nginx
rules:
@@ -130,7 +130,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
namespace: ingress-nginx
rules:
@@ -149,7 +149,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
rules:
- apiGroups:
@@ -231,7 +231,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
rules:
- apiGroups:
@@ -250,7 +250,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
namespace: ingress-nginx
roleRef:
@@ -270,7 +270,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
namespace: ingress-nginx
roleRef:
@@ -289,7 +289,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -308,7 +308,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -329,7 +329,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller
namespace: ingress-nginx
---
@@ -341,7 +341,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -373,7 +373,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller-admission
namespace: ingress-nginx
spec:
@@ -396,7 +396,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -418,7 +418,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
spec:
containers:
- args:
@@ -442,7 +442,7 @@ spec:
fieldPath: metadata.namespace
- name: LD_PRELOAD
value: /usr/local/lib/libmimalloc.so
- image: registry.k8s.io/ingress-nginx/controller:v1.11.1@sha256:e6439a12b52076965928e83b7b56aae6731231677b01e81818bce7fa5c60161a
+ image: registry.k8s.io/ingress-nginx/controller:v1.11.2@sha256:d5f8217feeac4887cb1ed21f27c2674e58be06bd8f5184cacea2a69abaf78dce
imagePullPolicy: IfNotPresent
lifecycle:
preStop:
@@ -518,7 +518,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-create
namespace: ingress-nginx
spec:
@@ -529,7 +529,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-create
spec:
containers:
@@ -543,7 +543,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.3@sha256:a320a50cc91bd15fd2d6fa6de58bd98c1bd64b9a6f926ce23a600d87043455a3
imagePullPolicy: IfNotPresent
name: create
securityContext:
@@ -569,7 +569,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-patch
namespace: ingress-nginx
spec:
@@ -580,7 +580,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-patch
spec:
containers:
@@ -596,7 +596,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.3@sha256:a320a50cc91bd15fd2d6fa6de58bd98c1bd64b9a6f926ce23a600d87043455a3
imagePullPolicy: IfNotPresent
name: patch
securityContext:
@@ -622,7 +622,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: nginx
spec:
controller: k8s.io/ingress-nginx
@@ -635,7 +635,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
webhooks:
- admissionReviewVersions:
diff --git a/deploy/static/provider/cloud/deploy.yaml b/deploy/static/provider/cloud/deploy.yaml
index 13e1163c1..f9ad071c6 100644
--- a/deploy/static/provider/cloud/deploy.yaml
+++ b/deploy/static/provider/cloud/deploy.yaml
@@ -15,7 +15,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
namespace: ingress-nginx
---
@@ -28,7 +28,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
namespace: ingress-nginx
---
@@ -40,7 +40,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
namespace: ingress-nginx
rules:
@@ -130,7 +130,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
namespace: ingress-nginx
rules:
@@ -149,7 +149,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
rules:
- apiGroups:
@@ -231,7 +231,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
rules:
- apiGroups:
@@ -250,7 +250,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
namespace: ingress-nginx
roleRef:
@@ -270,7 +270,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
namespace: ingress-nginx
roleRef:
@@ -289,7 +289,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -308,7 +308,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -329,7 +329,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller
namespace: ingress-nginx
---
@@ -341,7 +341,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -374,7 +374,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller-admission
namespace: ingress-nginx
spec:
@@ -397,7 +397,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -419,7 +419,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
spec:
containers:
- args:
@@ -444,7 +444,7 @@ spec:
fieldPath: metadata.namespace
- name: LD_PRELOAD
value: /usr/local/lib/libmimalloc.so
- image: registry.k8s.io/ingress-nginx/controller:v1.11.1@sha256:e6439a12b52076965928e83b7b56aae6731231677b01e81818bce7fa5c60161a
+ image: registry.k8s.io/ingress-nginx/controller:v1.11.2@sha256:d5f8217feeac4887cb1ed21f27c2674e58be06bd8f5184cacea2a69abaf78dce
imagePullPolicy: IfNotPresent
lifecycle:
preStop:
@@ -520,7 +520,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-create
namespace: ingress-nginx
spec:
@@ -531,7 +531,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-create
spec:
containers:
@@ -545,7 +545,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.3@sha256:a320a50cc91bd15fd2d6fa6de58bd98c1bd64b9a6f926ce23a600d87043455a3
imagePullPolicy: IfNotPresent
name: create
securityContext:
@@ -571,7 +571,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-patch
namespace: ingress-nginx
spec:
@@ -582,7 +582,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-patch
spec:
containers:
@@ -598,7 +598,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.3@sha256:a320a50cc91bd15fd2d6fa6de58bd98c1bd64b9a6f926ce23a600d87043455a3
imagePullPolicy: IfNotPresent
name: patch
securityContext:
@@ -624,7 +624,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: nginx
spec:
controller: k8s.io/ingress-nginx
@@ -637,7 +637,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
webhooks:
- admissionReviewVersions:
diff --git a/deploy/static/provider/do/deploy.yaml b/deploy/static/provider/do/deploy.yaml
index e0729e116..43affe0f7 100644
--- a/deploy/static/provider/do/deploy.yaml
+++ b/deploy/static/provider/do/deploy.yaml
@@ -15,7 +15,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
namespace: ingress-nginx
---
@@ -28,7 +28,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
namespace: ingress-nginx
---
@@ -40,7 +40,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
namespace: ingress-nginx
rules:
@@ -130,7 +130,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
namespace: ingress-nginx
rules:
@@ -149,7 +149,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
rules:
- apiGroups:
@@ -231,7 +231,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
rules:
- apiGroups:
@@ -250,7 +250,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
namespace: ingress-nginx
roleRef:
@@ -270,7 +270,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
namespace: ingress-nginx
roleRef:
@@ -289,7 +289,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -308,7 +308,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -330,7 +330,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller
namespace: ingress-nginx
---
@@ -344,7 +344,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -377,7 +377,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller-admission
namespace: ingress-nginx
spec:
@@ -400,7 +400,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -422,7 +422,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
spec:
containers:
- args:
@@ -447,7 +447,7 @@ spec:
fieldPath: metadata.namespace
- name: LD_PRELOAD
value: /usr/local/lib/libmimalloc.so
- image: registry.k8s.io/ingress-nginx/controller:v1.11.1@sha256:e6439a12b52076965928e83b7b56aae6731231677b01e81818bce7fa5c60161a
+ image: registry.k8s.io/ingress-nginx/controller:v1.11.2@sha256:d5f8217feeac4887cb1ed21f27c2674e58be06bd8f5184cacea2a69abaf78dce
imagePullPolicy: IfNotPresent
lifecycle:
preStop:
@@ -523,7 +523,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-create
namespace: ingress-nginx
spec:
@@ -534,7 +534,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-create
spec:
containers:
@@ -548,7 +548,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.3@sha256:a320a50cc91bd15fd2d6fa6de58bd98c1bd64b9a6f926ce23a600d87043455a3
imagePullPolicy: IfNotPresent
name: create
securityContext:
@@ -574,7 +574,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-patch
namespace: ingress-nginx
spec:
@@ -585,7 +585,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-patch
spec:
containers:
@@ -601,7 +601,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.3@sha256:a320a50cc91bd15fd2d6fa6de58bd98c1bd64b9a6f926ce23a600d87043455a3
imagePullPolicy: IfNotPresent
name: patch
securityContext:
@@ -627,7 +627,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: nginx
spec:
controller: k8s.io/ingress-nginx
@@ -640,7 +640,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
webhooks:
- admissionReviewVersions:
diff --git a/deploy/static/provider/exoscale/deploy.yaml b/deploy/static/provider/exoscale/deploy.yaml
index 584ebe1d7..5639e287b 100644
--- a/deploy/static/provider/exoscale/deploy.yaml
+++ b/deploy/static/provider/exoscale/deploy.yaml
@@ -15,7 +15,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
namespace: ingress-nginx
---
@@ -28,7 +28,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
namespace: ingress-nginx
---
@@ -40,7 +40,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
namespace: ingress-nginx
rules:
@@ -130,7 +130,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
namespace: ingress-nginx
rules:
@@ -149,7 +149,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
rules:
- apiGroups:
@@ -231,7 +231,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
rules:
- apiGroups:
@@ -250,7 +250,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
namespace: ingress-nginx
roleRef:
@@ -270,7 +270,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
namespace: ingress-nginx
roleRef:
@@ -289,7 +289,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -308,7 +308,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -329,7 +329,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller
namespace: ingress-nginx
---
@@ -350,7 +350,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -383,7 +383,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller-admission
namespace: ingress-nginx
spec:
@@ -406,7 +406,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -424,7 +424,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
spec:
containers:
- args:
@@ -449,7 +449,7 @@ spec:
fieldPath: metadata.namespace
- name: LD_PRELOAD
value: /usr/local/lib/libmimalloc.so
- image: registry.k8s.io/ingress-nginx/controller:v1.11.1@sha256:e6439a12b52076965928e83b7b56aae6731231677b01e81818bce7fa5c60161a
+ image: registry.k8s.io/ingress-nginx/controller:v1.11.2@sha256:d5f8217feeac4887cb1ed21f27c2674e58be06bd8f5184cacea2a69abaf78dce
imagePullPolicy: IfNotPresent
lifecycle:
preStop:
@@ -529,7 +529,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-create
namespace: ingress-nginx
spec:
@@ -540,7 +540,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-create
spec:
containers:
@@ -554,7 +554,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.3@sha256:a320a50cc91bd15fd2d6fa6de58bd98c1bd64b9a6f926ce23a600d87043455a3
imagePullPolicy: IfNotPresent
name: create
securityContext:
@@ -580,7 +580,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-patch
namespace: ingress-nginx
spec:
@@ -591,7 +591,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-patch
spec:
containers:
@@ -607,7 +607,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.3@sha256:a320a50cc91bd15fd2d6fa6de58bd98c1bd64b9a6f926ce23a600d87043455a3
imagePullPolicy: IfNotPresent
name: patch
securityContext:
@@ -633,7 +633,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: nginx
spec:
controller: k8s.io/ingress-nginx
@@ -646,7 +646,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
webhooks:
- admissionReviewVersions:
diff --git a/deploy/static/provider/kind/deploy.yaml b/deploy/static/provider/kind/deploy.yaml
index a11e4b253..8da72399b 100644
--- a/deploy/static/provider/kind/deploy.yaml
+++ b/deploy/static/provider/kind/deploy.yaml
@@ -15,7 +15,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
namespace: ingress-nginx
---
@@ -28,7 +28,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
namespace: ingress-nginx
---
@@ -40,7 +40,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
namespace: ingress-nginx
rules:
@@ -130,7 +130,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
namespace: ingress-nginx
rules:
@@ -149,7 +149,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
rules:
- apiGroups:
@@ -231,7 +231,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
rules:
- apiGroups:
@@ -250,7 +250,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
namespace: ingress-nginx
roleRef:
@@ -270,7 +270,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
namespace: ingress-nginx
roleRef:
@@ -289,7 +289,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -308,7 +308,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -329,7 +329,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller
namespace: ingress-nginx
---
@@ -341,7 +341,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -373,7 +373,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller-admission
namespace: ingress-nginx
spec:
@@ -396,7 +396,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -418,7 +418,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
spec:
containers:
- args:
@@ -444,7 +444,7 @@ spec:
fieldPath: metadata.namespace
- name: LD_PRELOAD
value: /usr/local/lib/libmimalloc.so
- image: registry.k8s.io/ingress-nginx/controller:v1.11.1@sha256:e6439a12b52076965928e83b7b56aae6731231677b01e81818bce7fa5c60161a
+ image: registry.k8s.io/ingress-nginx/controller:v1.11.2@sha256:d5f8217feeac4887cb1ed21f27c2674e58be06bd8f5184cacea2a69abaf78dce
imagePullPolicy: IfNotPresent
lifecycle:
preStop:
@@ -530,7 +530,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-create
namespace: ingress-nginx
spec:
@@ -541,7 +541,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-create
spec:
containers:
@@ -555,7 +555,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.3@sha256:a320a50cc91bd15fd2d6fa6de58bd98c1bd64b9a6f926ce23a600d87043455a3
imagePullPolicy: IfNotPresent
name: create
securityContext:
@@ -581,7 +581,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-patch
namespace: ingress-nginx
spec:
@@ -592,7 +592,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-patch
spec:
containers:
@@ -608,7 +608,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.3@sha256:a320a50cc91bd15fd2d6fa6de58bd98c1bd64b9a6f926ce23a600d87043455a3
imagePullPolicy: IfNotPresent
name: patch
securityContext:
@@ -634,7 +634,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: nginx
spec:
controller: k8s.io/ingress-nginx
@@ -647,7 +647,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
webhooks:
- admissionReviewVersions:
diff --git a/deploy/static/provider/oracle/deploy.yaml b/deploy/static/provider/oracle/deploy.yaml
index 86be29206..a85e0166f 100644
--- a/deploy/static/provider/oracle/deploy.yaml
+++ b/deploy/static/provider/oracle/deploy.yaml
@@ -15,7 +15,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
namespace: ingress-nginx
---
@@ -28,7 +28,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
namespace: ingress-nginx
---
@@ -40,7 +40,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
namespace: ingress-nginx
rules:
@@ -130,7 +130,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
namespace: ingress-nginx
rules:
@@ -149,7 +149,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
rules:
- apiGroups:
@@ -231,7 +231,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
rules:
- apiGroups:
@@ -250,7 +250,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
namespace: ingress-nginx
roleRef:
@@ -270,7 +270,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
namespace: ingress-nginx
roleRef:
@@ -289,7 +289,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -308,7 +308,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -329,7 +329,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller
namespace: ingress-nginx
---
@@ -345,7 +345,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -378,7 +378,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller-admission
namespace: ingress-nginx
spec:
@@ -401,7 +401,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -423,7 +423,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
spec:
containers:
- args:
@@ -448,7 +448,7 @@ spec:
fieldPath: metadata.namespace
- name: LD_PRELOAD
value: /usr/local/lib/libmimalloc.so
- image: registry.k8s.io/ingress-nginx/controller:v1.11.1@sha256:e6439a12b52076965928e83b7b56aae6731231677b01e81818bce7fa5c60161a
+ image: registry.k8s.io/ingress-nginx/controller:v1.11.2@sha256:d5f8217feeac4887cb1ed21f27c2674e58be06bd8f5184cacea2a69abaf78dce
imagePullPolicy: IfNotPresent
lifecycle:
preStop:
@@ -524,7 +524,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-create
namespace: ingress-nginx
spec:
@@ -535,7 +535,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-create
spec:
containers:
@@ -549,7 +549,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.3@sha256:a320a50cc91bd15fd2d6fa6de58bd98c1bd64b9a6f926ce23a600d87043455a3
imagePullPolicy: IfNotPresent
name: create
securityContext:
@@ -575,7 +575,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-patch
namespace: ingress-nginx
spec:
@@ -586,7 +586,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-patch
spec:
containers:
@@ -602,7 +602,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.3@sha256:a320a50cc91bd15fd2d6fa6de58bd98c1bd64b9a6f926ce23a600d87043455a3
imagePullPolicy: IfNotPresent
name: patch
securityContext:
@@ -628,7 +628,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: nginx
spec:
controller: k8s.io/ingress-nginx
@@ -641,7 +641,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
webhooks:
- admissionReviewVersions:
diff --git a/deploy/static/provider/scw/deploy.yaml b/deploy/static/provider/scw/deploy.yaml
index f37ff01d2..92c8ce880 100644
--- a/deploy/static/provider/scw/deploy.yaml
+++ b/deploy/static/provider/scw/deploy.yaml
@@ -15,7 +15,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
namespace: ingress-nginx
---
@@ -28,7 +28,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
namespace: ingress-nginx
---
@@ -40,7 +40,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
namespace: ingress-nginx
rules:
@@ -130,7 +130,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
namespace: ingress-nginx
rules:
@@ -149,7 +149,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
rules:
- apiGroups:
@@ -231,7 +231,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
rules:
- apiGroups:
@@ -250,7 +250,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
namespace: ingress-nginx
roleRef:
@@ -270,7 +270,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
namespace: ingress-nginx
roleRef:
@@ -289,7 +289,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -308,7 +308,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -330,7 +330,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller
namespace: ingress-nginx
---
@@ -344,7 +344,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -377,7 +377,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller-admission
namespace: ingress-nginx
spec:
@@ -400,7 +400,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
@@ -422,7 +422,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
spec:
containers:
- args:
@@ -447,7 +447,7 @@ spec:
fieldPath: metadata.namespace
- name: LD_PRELOAD
value: /usr/local/lib/libmimalloc.so
- image: registry.k8s.io/ingress-nginx/controller:v1.11.1@sha256:e6439a12b52076965928e83b7b56aae6731231677b01e81818bce7fa5c60161a
+ image: registry.k8s.io/ingress-nginx/controller:v1.11.2@sha256:d5f8217feeac4887cb1ed21f27c2674e58be06bd8f5184cacea2a69abaf78dce
imagePullPolicy: IfNotPresent
lifecycle:
preStop:
@@ -523,7 +523,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-create
namespace: ingress-nginx
spec:
@@ -534,7 +534,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-create
spec:
containers:
@@ -548,7 +548,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.3@sha256:a320a50cc91bd15fd2d6fa6de58bd98c1bd64b9a6f926ce23a600d87043455a3
imagePullPolicy: IfNotPresent
name: create
securityContext:
@@ -574,7 +574,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-patch
namespace: ingress-nginx
spec:
@@ -585,7 +585,7 @@ spec:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission-patch
spec:
containers:
@@ -601,7 +601,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1@sha256:36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.3@sha256:a320a50cc91bd15fd2d6fa6de58bd98c1bd64b9a6f926ce23a600d87043455a3
imagePullPolicy: IfNotPresent
name: patch
securityContext:
@@ -627,7 +627,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: nginx
spec:
controller: k8s.io/ingress-nginx
@@ -640,7 +640,7 @@ metadata:
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.11.1
+ app.kubernetes.io/version: 1.11.2
name: ingress-nginx-admission
webhooks:
- admissionReviewVersions:
diff --git a/docs/deploy/index.md b/docs/deploy/index.md
index 214bc4f70..e298cb27f 100644
--- a/docs/deploy/index.md
+++ b/docs/deploy/index.md
@@ -87,7 +87,7 @@ helm show values ingress-nginx --repo https://kubernetes.github.io/ingress-nginx
**If you don't have Helm** or if you prefer to use a YAML manifest, you can run the following command instead:
```console
-kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.11.1/deploy/static/provider/cloud/deploy.yaml
+kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.11.2/deploy/static/provider/cloud/deploy.yaml
```
!!! info
@@ -270,7 +270,7 @@ In AWS, we use a Network load balancer (NLB) to expose the Ingress-Nginx Control
##### Network Load Balancer (NLB)
```console
-kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.11.1/deploy/static/provider/aws/deploy.yaml
+kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.11.2/deploy/static/provider/aws/deploy.yaml
```
##### TLS termination in AWS Load Balancer (NLB)
@@ -278,10 +278,10 @@ kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/cont
By default, TLS is terminated in the ingress controller. But it is also possible to terminate TLS in the Load Balancer.
This section explains how to do that on AWS using an NLB.
-1. Download the [deploy.yaml](https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.11.1/deploy/static/provider/aws/nlb-with-tls-termination/deploy.yaml) template
+1. Download the [deploy.yaml](https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.11.2/deploy/static/provider/aws/nlb-with-tls-termination/deploy.yaml) template
```console
- wget https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.11.1/deploy/static/provider/aws/nlb-with-tls-termination/deploy.yaml
+ wget https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.11.2/deploy/static/provider/aws/nlb-with-tls-termination/deploy.yaml
```
2. Edit the file and change the VPC CIDR in use for the Kubernetes cluster:
@@ -329,7 +329,7 @@ kubectl create clusterrolebinding cluster-admin-binding \
Then, the ingress controller can be installed like this:
```console
-kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.11.1/deploy/static/provider/cloud/deploy.yaml
+kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.11.2/deploy/static/provider/cloud/deploy.yaml
```
!!! warning
@@ -346,7 +346,7 @@ Proxy-protocol is supported in GCE check the [Official Documentations on how to
#### Azure
```console
-kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.11.1/deploy/static/provider/cloud/deploy.yaml
+kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.11.2/deploy/static/provider/cloud/deploy.yaml
```
More information with regard to Azure annotations for ingress controller can be found in the [official AKS documentation](https://docs.microsoft.com/en-us/azure/aks/ingress-internal-ip#create-an-ingress-controller).
@@ -354,7 +354,7 @@ More information with regard to Azure annotations for ingress controller can be
#### Digital Ocean
```console
-kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.11.1/deploy/static/provider/do/deploy.yaml
+kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.11.2/deploy/static/provider/do/deploy.yaml
```
- By default the service object of the ingress-nginx-controller for Digital-Ocean, only configures one annotation. Its this one `service.beta.kubernetes.io/do-loadbalancer-enable-proxy-protocol: "true"`. While this makes the service functional, it was reported that the Digital-Ocean LoadBalancer graphs shows `no data`, unless a few other annotations are also configured. Some of these other annotations require values that can not be generic and hence not forced in a out-of-the-box installation. These annotations and a discussion on them is well documented in [this issue](https://github.com/kubernetes/ingress-nginx/issues/8965). Please refer to the issue to add annotations, with values specific to user, to get graphs of the DO-LB populated with data.
@@ -362,7 +362,7 @@ kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/cont
#### Scaleway
```console
-kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.11.1/deploy/static/provider/scw/deploy.yaml
+kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.11.2/deploy/static/provider/scw/deploy.yaml
```
Refer to the [dedicated tutorial](https://www.scaleway.com/en/docs/tutorials/proxy-protocol-v2-load-balancer/#configuring-proxy-protocol-for-ingress-nginx) in the Scaleway documentation for configuring the proxy protocol for ingress-nginx with the Scaleway load balancer.
@@ -379,7 +379,7 @@ The full list of annotations supported by Exoscale is available in the Exoscale
#### Oracle Cloud Infrastructure
```console
-kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.11.1/deploy/static/provider/cloud/deploy.yaml
+kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.11.2/deploy/static/provider/cloud/deploy.yaml
```
A
@@ -406,7 +406,7 @@ For quick testing, you can use a
This should work on almost every cluster, but it will typically use a port in the range 30000-32767.
```console
-kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.11.1/deploy/static/provider/baremetal/deploy.yaml
+kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.11.2/deploy/static/provider/baremetal/deploy.yaml
```
For more information about bare metal deployments (and how to use port 80 instead of a random port in the 30000-32767 range),
diff --git a/docs/e2e-tests.md b/docs/e2e-tests.md
index ca64b98c1..f288ec82f 100644
--- a/docs/e2e-tests.md
+++ b/docs/e2e-tests.md
@@ -268,6 +268,9 @@ Do not try to edit it manually.
### [x-forwarded-prefix](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/xforwardedprefix.go#L28)
- [should set the X-Forwarded-Prefix to the annotation value](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/xforwardedprefix.go#L35)
- [should not add X-Forwarded-Prefix if the annotation value is empty](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/xforwardedprefix.go#L57)
+### [[CGroups] cgroups](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/cgroups/cgroups.go#L32)
+- [detects cgroups version v1](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/cgroups/cgroups.go#L40)
+- [detect cgroups version v2](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/cgroups/cgroups.go#L83)
### [Debug CLI](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/dbg/main.go#L29)
- [should list the backend servers](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/dbg/main.go#L37)
- [should get information for a specific backend server](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/dbg/main.go#L56)
From eee2760907f029b808d95cd90abf290a9f0f09dd Mon Sep 17 00:00:00 2001
From: chengjoey <30427474+chengjoey@users.noreply.github.com>
Date: Fri, 16 Aug 2024 16:53:12 +0800
Subject: [PATCH 188/283] Metrics: Remove `ingress_upstream_latency_seconds`.
(#11795)
Signed-off-by: joey
---
docs/user-guide/monitoring.md | 6 ---
internal/ingress/metric/collectors/socket.go | 54 ++------------------
2 files changed, 4 insertions(+), 56 deletions(-)
diff --git a/docs/user-guide/monitoring.md b/docs/user-guide/monitoring.md
index 28608e850..b96914e1b 100644
--- a/docs/user-guide/monitoring.md
+++ b/docs/user-guide/monitoring.md
@@ -386,10 +386,6 @@ Prometheus metrics are exposed on port 10254.
The number of bytes sent to a client. **Deprecated**, use `nginx_ingress_controller_response_size`\
nginx var: `bytes_sent`
-* `nginx_ingress_controller_ingress_upstream_latency_seconds` Summary\
- Upstream service latency per Ingress. **Deprecated**, use `nginx_ingress_controller_connect_duration_seconds`\
- nginx var: `upstream_connect_time`
-
```
# HELP nginx_ingress_controller_bytes_sent The number of bytes sent to a client. DEPRECATED! Use nginx_ingress_controller_response_size
# TYPE nginx_ingress_controller_bytes_sent histogram
@@ -397,8 +393,6 @@ Prometheus metrics are exposed on port 10254.
# TYPE nginx_ingress_controller_connect_duration_seconds nginx_ingress_controller_connect_duration_seconds
* HELP nginx_ingress_controller_header_duration_seconds The time spent on receiving first header from the upstream server
# TYPE nginx_ingress_controller_header_duration_seconds histogram
-# HELP nginx_ingress_controller_ingress_upstream_latency_seconds Upstream service latency per Ingress DEPRECATED! Use nginx_ingress_controller_connect_duration_seconds
-# TYPE nginx_ingress_controller_ingress_upstream_latency_seconds summary
# HELP nginx_ingress_controller_request_duration_seconds The request processing time in milliseconds
# TYPE nginx_ingress_controller_request_duration_seconds histogram
# HELP nginx_ingress_controller_request_size The request length (including request line, header, and request body)
diff --git a/internal/ingress/metric/collectors/socket.go b/internal/ingress/metric/collectors/socket.go
index 248f23f63..863bbb62e 100644
--- a/internal/ingress/metric/collectors/socket.go
+++ b/internal/ingress/metric/collectors/socket.go
@@ -64,11 +64,10 @@ type metricMapping map[string]prometheus.Collector
type SocketCollector struct {
prometheus.Collector
- upstreamLatency *prometheus.SummaryVec // TODO: DEPRECATED, remove
- connectTime *prometheus.HistogramVec
- headerTime *prometheus.HistogramVec
- requestTime *prometheus.HistogramVec
- responseTime *prometheus.HistogramVec
+ connectTime *prometheus.HistogramVec
+ headerTime *prometheus.HistogramVec
+ requestTime *prometheus.HistogramVec
+ responseTime *prometheus.HistogramVec
requestLength *prometheus.HistogramVec
responseLength *prometheus.HistogramVec
@@ -98,10 +97,6 @@ var requestTags = []string{
"canary",
}
-// DefObjectives was removed in https://github.com/prometheus/client_golang/pull/262
-// updating the library to latest version changed the output of the metrics
-var defObjectives = map[float64]float64{0.5: 0.05, 0.9: 0.01, 0.99: 0.001}
-
// NewSocketCollector creates a new SocketCollector instance using
// the ingress watch namespace and class used by the controller
func NewSocketCollector(pod, namespace, class string, metricsPerHost, reportStatusClasses bool, buckets HistogramBuckets, excludeMetrics []string) (*SocketCollector, error) {
@@ -248,19 +243,6 @@ func NewSocketCollector(pod, namespace, class string, metricsPerHost, reportStat
em,
mm,
),
-
- upstreamLatency: summaryMetric(
- &prometheus.SummaryOpts{
- Name: "ingress_upstream_latency_seconds",
- Help: "DEPRECATED Upstream service latency per Ingress",
- Namespace: PrometheusNamespace,
- ConstLabels: constLabels,
- Objectives: defObjectives,
- },
- []string{"ingress", "namespace", "service", "canary"},
- em,
- mm,
- ),
}
sc.metricMapping = mm
@@ -275,18 +257,6 @@ func containsMetric(excludeMetrics map[string]struct{}, name string) bool {
return false
}
-func summaryMetric(opts *prometheus.SummaryOpts, requestTags []string, excludeMetrics map[string]struct{}, metricMapping metricMapping) *prometheus.SummaryVec {
- if containsMetric(excludeMetrics, opts.Name) {
- return nil
- }
- m := prometheus.NewSummaryVec(
- *opts,
- requestTags,
- )
- metricMapping[prometheus.BuildFQName(PrometheusNamespace, "", opts.Name)] = m
- return m
-}
-
func counterMetric(opts *prometheus.CounterOpts, requestTags []string, excludeMetrics map[string]struct{}, metricMapping metricMapping) *prometheus.CounterVec {
if containsMetric(excludeMetrics, opts.Name) {
return nil
@@ -358,13 +328,6 @@ func (sc *SocketCollector) handleMessage(msg []byte) {
collectorLabels["host"] = stats.Host
}
- latencyLabels := prometheus.Labels{
- "namespace": stats.Namespace,
- "ingress": stats.Ingress,
- "service": stats.Service,
- "canary": stats.Canary,
- }
-
if sc.requests != nil {
requestsMetric, err := sc.requests.GetMetricWith(collectorLabels)
if err != nil {
@@ -383,15 +346,6 @@ func (sc *SocketCollector) handleMessage(msg []byte) {
connectTimeMetric.Observe(stats.Latency)
}
}
-
- if sc.upstreamLatency != nil {
- latencyMetric, err := sc.upstreamLatency.GetMetricWith(latencyLabels)
- if err != nil {
- klog.ErrorS(err, "Error fetching latency metric")
- } else {
- latencyMetric.Observe(stats.Latency)
- }
- }
}
if stats.HeaderTime != -1 && sc.headerTime != nil {
From cf8e374290b48b336355f5d45d3127e4eec8071c Mon Sep 17 00:00:00 2001
From: Ricardo Katz
Date: Sun, 18 Aug 2024 20:13:18 -0300
Subject: [PATCH 189/283] Auto-generate annotation docs (#11820)
---
.github/workflows/ci.yaml | 23 +++
Makefile | 3 +
cmd/annotations/annotations.tmpl | 7 +
cmd/annotations/main.go | 91 +++++++++++
.../nginx-configuration/annotations-risk.md | 142 ++++++++++++++++++
hack/update-annotation-doc.sh | 23 +++
hack/verify-annotation-docs.sh | 46 ++++++
internal/ingress/annotations/annotations.go | 109 +++++++-------
internal/ingress/annotations/parser/main.go | 15 ++
mkdocs.yml | 1 +
10 files changed, 407 insertions(+), 53 deletions(-)
create mode 100644 cmd/annotations/annotations.tmpl
create mode 100644 cmd/annotations/main.go
create mode 100755 docs/user-guide/nginx-configuration/annotations-risk.md
create mode 100755 hack/update-annotation-doc.sh
create mode 100755 hack/verify-annotation-docs.sh
diff --git a/.github/workflows/ci.yaml b/.github/workflows/ci.yaml
index f3af49d37..49b39a7a3 100644
--- a/.github/workflows/ci.yaml
+++ b/.github/workflows/ci.yaml
@@ -69,6 +69,8 @@ jobs:
baseimage:
- 'NGINX_BASE'
- 'images/nginx-1.25/**'
+ docs:
+ - '**/*.md'
test-go:
runs-on: ubuntu-latest
@@ -92,6 +94,27 @@ jobs:
- name: Run test
run: make test
+
+ verify-docs:
+ name: Verify Doc generation
+ runs-on: ubuntu-latest
+ needs: changes
+ if: |
+ (needs.changes.outputs.go == 'true') || (needs.changes.outputs.docs == 'true') || ${{ github.event.workflow_dispatch.run_e2e == 'true' }}
+ steps:
+ - name: Checkout
+ uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
+ - name: Get go version
+ run: echo "GOLANG_VERSION=$(cat GOLANG_VERSION)" >> $GITHUB_ENV
+ - name: Set up Go
+ id: go
+ uses: actions/setup-go@0a12ed9d6a96ab950c8f026ed9f722fe0da7ef32 # v5.0.2
+ with:
+ go-version: ${{ env.GOLANG_VERSION }}
+ check-latest: true
+ - name: Verify Docs
+ run: make verify-docs
+
build:
name: Build
runs-on: ubuntu-latest
diff --git a/Makefile b/Makefile
index a99e1540c..1c35c12b2 100644
--- a/Makefile
+++ b/Makefile
@@ -124,6 +124,9 @@ build: ## Build ingress controller, debug tool and pre-stop hook.
clean: ## Remove .gocache directory.
rm -rf bin/ .gocache/ .cache/
+.PHONY: verify-docs
+verify-docs: ## Verify doc generation
+ hack/verify-annotation-docs.sh
.PHONY: static-check
static-check: ## Run verification script for boilerplate, codegen, gofmt, golint, lualint and chart-lint.
diff --git a/cmd/annotations/annotations.tmpl b/cmd/annotations/annotations.tmpl
new file mode 100644
index 000000000..91dd21de8
--- /dev/null
+++ b/cmd/annotations/annotations.tmpl
@@ -0,0 +1,7 @@
+# Annotations Scope and Risk
+
+|Group |Annotation | Risk | Scope |
+|--------|------------------|------|-------|
+{{- range $doc := . }}
+| {{ $doc.Group }} | {{ $doc.Annotation }} | {{ $doc.Risk }} | {{ $doc.Scope }} |
+{{- end }}
diff --git a/cmd/annotations/main.go b/cmd/annotations/main.go
new file mode 100644
index 000000000..78f26099c
--- /dev/null
+++ b/cmd/annotations/main.go
@@ -0,0 +1,91 @@
+/*
+Copyright 2024 The Kubernetes Authors.
+
+Licensed under the Apache License, Version 2.0 (the "License");
+you may not use this file except in compliance with the License.
+You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law or agreed to in writing, software
+distributed under the License is distributed on an "AS IS" BASIS,
+WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+See the License for the specific language governing permissions and
+limitations under the License.
+*/
+
+package main
+
+import (
+ "bytes"
+ "embed"
+ "flag"
+ "fmt"
+ "os"
+ "slices"
+ "strings"
+ "text/template"
+
+ anns "k8s.io/ingress-nginx/internal/ingress/annotations"
+)
+
+type Documentation struct {
+ Group string
+ Annotation string
+ Risk string
+ Scope string
+}
+
+var output string
+
+//go:embed annotations.tmpl
+var content embed.FS
+
+func main() {
+ flag.StringVar(&output, "output", "", "where to write documentation")
+ flag.Parse()
+ if output == "" {
+ panic(fmt.Errorf("output field is required"))
+ }
+ docEntries := make([]Documentation, 0)
+ annotationFactory := anns.NewAnnotationFactory(nil)
+ for group, val := range annotationFactory {
+ annotations := val.GetDocumentation()
+ intermediateDocs := make([]Documentation, len(annotations))
+ i := 0
+ for annotation, values := range annotations {
+ doc := Documentation{
+ Group: group,
+ Annotation: annotation,
+ Scope: string(values.Scope),
+ Risk: values.Risk.ToString(),
+ }
+ intermediateDocs[i] = doc
+ i++
+ }
+ slices.SortStableFunc(intermediateDocs, func(a, b Documentation) int {
+ return strings.Compare(a.Annotation, b.Annotation)
+ })
+ docEntries = append(docEntries, intermediateDocs...)
+ }
+ slices.SortStableFunc(docEntries, func(a, b Documentation) int {
+ return strings.Compare(a.Group, b.Group)
+ })
+
+ tmpl, err := template.New("annotations.tmpl").ParseFS(content, "annotations.tmpl")
+ if err != nil {
+ panic(fmt.Errorf("error parsing template: %s", err))
+ }
+
+ tplBuffer := new(bytes.Buffer)
+ err = tmpl.Execute(tplBuffer, docEntries)
+ if err != nil {
+ panic(err)
+ }
+ tplBuffer.WriteString("\n")
+
+ //nolint:gosec // no need to check file permission here
+ if err := os.WriteFile(output, tplBuffer.Bytes(), 0o755); err != nil {
+ panic(err)
+ }
+}
diff --git a/docs/user-guide/nginx-configuration/annotations-risk.md b/docs/user-guide/nginx-configuration/annotations-risk.md
new file mode 100755
index 000000000..b53860174
--- /dev/null
+++ b/docs/user-guide/nginx-configuration/annotations-risk.md
@@ -0,0 +1,142 @@
+# Annotations Scope and Risk
+
+|Group |Annotation | Risk | Scope |
+|--------|------------------|------|-------|
+| Aliases | server-alias | High | ingress |
+| Allowlist | allowlist-source-range | Medium | location |
+| BackendProtocol | backend-protocol | Low | location |
+| BasicDigestAuth | auth-realm | Medium | location |
+| BasicDigestAuth | auth-secret | Medium | location |
+| BasicDigestAuth | auth-secret-type | Low | location |
+| BasicDigestAuth | auth-type | Low | location |
+| Canary | canary | Low | ingress |
+| Canary | canary-by-cookie | Medium | ingress |
+| Canary | canary-by-header | Medium | ingress |
+| Canary | canary-by-header-pattern | Medium | ingress |
+| Canary | canary-by-header-value | Medium | ingress |
+| Canary | canary-weight | Low | ingress |
+| Canary | canary-weight-total | Low | ingress |
+| CertificateAuth | auth-tls-error-page | High | location |
+| CertificateAuth | auth-tls-match-cn | High | location |
+| CertificateAuth | auth-tls-pass-certificate-to-upstream | Low | location |
+| CertificateAuth | auth-tls-secret | Medium | location |
+| CertificateAuth | auth-tls-verify-client | Medium | location |
+| CertificateAuth | auth-tls-verify-depth | Low | location |
+| ClientBodyBufferSize | client-body-buffer-size | Low | location |
+| ConfigurationSnippet | configuration-snippet | Critical | location |
+| Connection | connection-proxy-header | Low | location |
+| CorsConfig | cors-allow-credentials | Low | ingress |
+| CorsConfig | cors-allow-headers | Medium | ingress |
+| CorsConfig | cors-allow-methods | Medium | ingress |
+| CorsConfig | cors-allow-origin | Medium | ingress |
+| CorsConfig | cors-expose-headers | Medium | ingress |
+| CorsConfig | cors-max-age | Low | ingress |
+| CorsConfig | enable-cors | Low | ingress |
+| CustomHTTPErrors | custom-http-errors | Low | location |
+| CustomHeaders | custom-headers | Medium | location |
+| DefaultBackend | default-backend | Low | location |
+| Denylist | denylist-source-range | Medium | location |
+| DisableProxyInterceptErrors | disable-proxy-intercept-errors | Low | location |
+| EnableGlobalAuth | enable-global-auth | Low | location |
+| ExternalAuth | auth-always-set-cookie | Low | location |
+| ExternalAuth | auth-cache-duration | Medium | location |
+| ExternalAuth | auth-cache-key | Medium | location |
+| ExternalAuth | auth-keepalive | Low | location |
+| ExternalAuth | auth-keepalive-requests | Low | location |
+| ExternalAuth | auth-keepalive-share-vars | Low | location |
+| ExternalAuth | auth-keepalive-timeout | Low | location |
+| ExternalAuth | auth-method | Low | location |
+| ExternalAuth | auth-proxy-set-headers | Medium | location |
+| ExternalAuth | auth-request-redirect | Medium | location |
+| ExternalAuth | auth-response-headers | Medium | location |
+| ExternalAuth | auth-signin | High | location |
+| ExternalAuth | auth-signin-redirect-param | Medium | location |
+| ExternalAuth | auth-snippet | Critical | location |
+| ExternalAuth | auth-url | High | location |
+| FastCGI | fastcgi-index | Medium | location |
+| FastCGI | fastcgi-params-configmap | Medium | location |
+| GlobalRateLimit | global-rate-limit | Low | ingress |
+| GlobalRateLimit | global-rate-limit-ignored-cidrs | Medium | ingress |
+| GlobalRateLimit | global-rate-limit-key | High | ingress |
+| GlobalRateLimit | global-rate-limit-window | Low | ingress |
+| HTTP2PushPreload | http2-push-preload | Low | location |
+| LoadBalancing | load-balance | Low | location |
+| Logs | enable-access-log | Low | location |
+| Logs | enable-rewrite-log | Low | location |
+| Mirror | mirror-host | High | ingress |
+| Mirror | mirror-request-body | Low | ingress |
+| Mirror | mirror-target | High | ingress |
+| ModSecurity | enable-modsecurity | Low | ingress |
+| ModSecurity | enable-owasp-core-rules | Low | ingress |
+| ModSecurity | modsecurity-snippet | Critical | ingress |
+| ModSecurity | modsecurity-transaction-id | High | ingress |
+| Opentelemetry | enable-opentelemetry | Low | location |
+| Opentelemetry | opentelemetry-operation-name | Medium | location |
+| Opentelemetry | opentelemetry-trust-incoming-span | Low | location |
+| Proxy | proxy-body-size | Medium | location |
+| Proxy | proxy-buffer-size | Low | location |
+| Proxy | proxy-buffering | Low | location |
+| Proxy | proxy-buffers-number | Low | location |
+| Proxy | proxy-connect-timeout | Low | location |
+| Proxy | proxy-cookie-domain | Medium | location |
+| Proxy | proxy-cookie-path | Medium | location |
+| Proxy | proxy-http-version | Low | location |
+| Proxy | proxy-max-temp-file-size | Low | location |
+| Proxy | proxy-next-upstream | Medium | location |
+| Proxy | proxy-next-upstream-timeout | Low | location |
+| Proxy | proxy-next-upstream-tries | Low | location |
+| Proxy | proxy-read-timeout | Low | location |
+| Proxy | proxy-redirect-from | Medium | location |
+| Proxy | proxy-redirect-to | Medium | location |
+| Proxy | proxy-request-buffering | Low | location |
+| Proxy | proxy-send-timeout | Low | location |
+| ProxySSL | proxy-ssl-ciphers | Medium | ingress |
+| ProxySSL | proxy-ssl-name | High | ingress |
+| ProxySSL | proxy-ssl-protocols | Low | ingress |
+| ProxySSL | proxy-ssl-secret | Medium | ingress |
+| ProxySSL | proxy-ssl-server-name | Low | ingress |
+| ProxySSL | proxy-ssl-verify | Low | ingress |
+| ProxySSL | proxy-ssl-verify-depth | Low | ingress |
+| RateLimit | limit-allowlist | Low | location |
+| RateLimit | limit-burst-multiplier | Low | location |
+| RateLimit | limit-connections | Low | location |
+| RateLimit | limit-rate | Low | location |
+| RateLimit | limit-rate-after | Low | location |
+| RateLimit | limit-rpm | Low | location |
+| RateLimit | limit-rps | Low | location |
+| Redirect | from-to-www-redirect | Low | location |
+| Redirect | permanent-redirect | Medium | location |
+| Redirect | permanent-redirect-code | Low | location |
+| Redirect | temporal-redirect | Medium | location |
+| Rewrite | app-root | Medium | location |
+| Rewrite | force-ssl-redirect | Medium | location |
+| Rewrite | preserve-trailing-slash | Medium | location |
+| Rewrite | rewrite-target | Medium | ingress |
+| Rewrite | ssl-redirect | Low | location |
+| Rewrite | use-regex | Low | location |
+| SSLCipher | ssl-ciphers | Low | ingress |
+| SSLCipher | ssl-prefer-server-ciphers | Low | ingress |
+| SSLPassthrough | ssl-passthrough | Low | ingress |
+| Satisfy | satisfy | Low | location |
+| ServerSnippet | server-snippet | Critical | ingress |
+| ServiceUpstream | service-upstream | Low | ingress |
+| SessionAffinity | affinity | Low | ingress |
+| SessionAffinity | affinity-canary-behavior | Low | ingress |
+| SessionAffinity | affinity-mode | Medium | ingress |
+| SessionAffinity | session-cookie-change-on-failure | Low | ingress |
+| SessionAffinity | session-cookie-conditional-samesite-none | Low | ingress |
+| SessionAffinity | session-cookie-domain | Medium | ingress |
+| SessionAffinity | session-cookie-expires | Medium | ingress |
+| SessionAffinity | session-cookie-max-age | Medium | ingress |
+| SessionAffinity | session-cookie-name | Medium | ingress |
+| SessionAffinity | session-cookie-path | Medium | ingress |
+| SessionAffinity | session-cookie-samesite | Low | ingress |
+| SessionAffinity | session-cookie-secure | Low | ingress |
+| StreamSnippet | stream-snippet | Critical | ingress |
+| UpstreamHashBy | upstream-hash-by | High | location |
+| UpstreamHashBy | upstream-hash-by-subset | Low | location |
+| UpstreamHashBy | upstream-hash-by-subset-size | Low | location |
+| UpstreamVhost | upstream-vhost | Low | location |
+| UsePortInRedirects | use-port-in-redirects | Low | location |
+| XForwardedPrefix | x-forwarded-prefix | Medium | location |
+
diff --git a/hack/update-annotation-doc.sh b/hack/update-annotation-doc.sh
new file mode 100755
index 000000000..c4feb41ce
--- /dev/null
+++ b/hack/update-annotation-doc.sh
@@ -0,0 +1,23 @@
+#!/bin/bash
+
+# Copyright 2024 The Kubernetes Authors.
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+
+set -o errexit
+set -o nounset
+
+SCRIPT_ROOT=$(dirname "${BASH_SOURCE}")/..
+ANNOTATIONFILE="${SCRIPT_ROOT}/docs/user-guide/nginx-configuration/annotations-risk.md"
+
+go run "${SCRIPT_ROOT}"/cmd/annotations/main.go -output "${ANNOTATIONFILE}"
\ No newline at end of file
diff --git a/hack/verify-annotation-docs.sh b/hack/verify-annotation-docs.sh
new file mode 100755
index 000000000..54034539b
--- /dev/null
+++ b/hack/verify-annotation-docs.sh
@@ -0,0 +1,46 @@
+#!/bin/bash
+
+# Copyright 2024 The Kubernetes Authors.
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+
+set -o errexit
+set -o nounset
+set -o pipefail
+
+SCRIPT_ROOT=$(dirname "${BASH_SOURCE}")/..
+
+ANNOTATIONFILE="${SCRIPT_ROOT}/docs/user-guide/nginx-configuration/annotations-risk.md"
+TMP_DIFFROOT="${SCRIPT_ROOT}/_tmp"
+TMP_FILE="${TMP_DIFFROOT}/annotations-risk.md"
+
+cleanup() {
+ rm -rf "${TMP_DIFFROOT}"
+}
+trap "cleanup" EXIT SIGINT
+
+cleanup
+
+mkdir -p "${TMP_DIFFROOT}"
+
+go run cmd/annotations/main.go -output "${TMP_FILE}"
+echo "diffing ${ANNOTATIONFILE} against freshly generated annotation doc"
+ret=0
+diff -Naupr --no-dereference "${ANNOTATIONFILE}" "${TMP_FILE}" || ret=1
+
+if [[ $ret -eq 0 ]]; then
+ echo "${ANNOTATIONFILE} up to date."
+else
+ echo "${ANNOTATIONFILE} is out of date. Please run hack/update-annotation-doc.sh"
+ exit 1
+fi
diff --git a/internal/ingress/annotations/annotations.go b/internal/ingress/annotations/annotations.go
index 0bb2ac7b8..4c073246c 100644
--- a/internal/ingress/annotations/annotations.go
+++ b/internal/ingress/annotations/annotations.go
@@ -19,19 +19,10 @@ package annotations
import (
"dario.cat/mergo"
- "k8s.io/ingress-nginx/internal/ingress/annotations/canary"
- "k8s.io/ingress-nginx/internal/ingress/annotations/customheaders"
- "k8s.io/ingress-nginx/internal/ingress/annotations/disableproxyintercepterrors"
- "k8s.io/ingress-nginx/internal/ingress/annotations/modsecurity"
- "k8s.io/ingress-nginx/internal/ingress/annotations/opentelemetry"
- "k8s.io/ingress-nginx/internal/ingress/annotations/proxyssl"
- "k8s.io/ingress-nginx/internal/ingress/annotations/sslcipher"
- "k8s.io/ingress-nginx/internal/ingress/annotations/streamsnippet"
- "k8s.io/klog/v2"
-
apiv1 "k8s.io/api/core/v1"
networking "k8s.io/api/networking/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
+ "k8s.io/klog/v2"
"k8s.io/ingress-nginx/internal/ingress/annotations/alias"
"k8s.io/ingress-nginx/internal/ingress/annotations/auth"
@@ -39,11 +30,14 @@ import (
"k8s.io/ingress-nginx/internal/ingress/annotations/authreqglobal"
"k8s.io/ingress-nginx/internal/ingress/annotations/authtls"
"k8s.io/ingress-nginx/internal/ingress/annotations/backendprotocol"
+ "k8s.io/ingress-nginx/internal/ingress/annotations/canary"
"k8s.io/ingress-nginx/internal/ingress/annotations/clientbodybuffersize"
"k8s.io/ingress-nginx/internal/ingress/annotations/connection"
"k8s.io/ingress-nginx/internal/ingress/annotations/cors"
+ "k8s.io/ingress-nginx/internal/ingress/annotations/customheaders"
"k8s.io/ingress-nginx/internal/ingress/annotations/customhttperrors"
"k8s.io/ingress-nginx/internal/ingress/annotations/defaultbackend"
+ "k8s.io/ingress-nginx/internal/ingress/annotations/disableproxyintercepterrors"
"k8s.io/ingress-nginx/internal/ingress/annotations/fastcgi"
"k8s.io/ingress-nginx/internal/ingress/annotations/globalratelimit"
"k8s.io/ingress-nginx/internal/ingress/annotations/http2pushpreload"
@@ -52,9 +46,12 @@ import (
"k8s.io/ingress-nginx/internal/ingress/annotations/loadbalancing"
"k8s.io/ingress-nginx/internal/ingress/annotations/log"
"k8s.io/ingress-nginx/internal/ingress/annotations/mirror"
+ "k8s.io/ingress-nginx/internal/ingress/annotations/modsecurity"
+ "k8s.io/ingress-nginx/internal/ingress/annotations/opentelemetry"
"k8s.io/ingress-nginx/internal/ingress/annotations/parser"
"k8s.io/ingress-nginx/internal/ingress/annotations/portinredirect"
"k8s.io/ingress-nginx/internal/ingress/annotations/proxy"
+ "k8s.io/ingress-nginx/internal/ingress/annotations/proxyssl"
"k8s.io/ingress-nginx/internal/ingress/annotations/ratelimit"
"k8s.io/ingress-nginx/internal/ingress/annotations/redirect"
"k8s.io/ingress-nginx/internal/ingress/annotations/rewrite"
@@ -63,7 +60,9 @@ import (
"k8s.io/ingress-nginx/internal/ingress/annotations/serviceupstream"
"k8s.io/ingress-nginx/internal/ingress/annotations/sessionaffinity"
"k8s.io/ingress-nginx/internal/ingress/annotations/snippet"
+ "k8s.io/ingress-nginx/internal/ingress/annotations/sslcipher"
"k8s.io/ingress-nginx/internal/ingress/annotations/sslpassthrough"
+ "k8s.io/ingress-nginx/internal/ingress/annotations/streamsnippet"
"k8s.io/ingress-nginx/internal/ingress/annotations/upstreamhashby"
"k8s.io/ingress-nginx/internal/ingress/annotations/upstreamvhost"
"k8s.io/ingress-nginx/internal/ingress/annotations/xforwardedprefix"
@@ -126,52 +125,56 @@ type Extractor struct {
annotations map[string]parser.IngressAnnotation
}
+func NewAnnotationFactory(cfg resolver.Resolver) map[string]parser.IngressAnnotation {
+ return map[string]parser.IngressAnnotation{
+ "Aliases": alias.NewParser(cfg),
+ "BasicDigestAuth": auth.NewParser(auth.AuthDirectory, cfg),
+ "Canary": canary.NewParser(cfg),
+ "CertificateAuth": authtls.NewParser(cfg),
+ "ClientBodyBufferSize": clientbodybuffersize.NewParser(cfg),
+ "CustomHeaders": customheaders.NewParser(cfg),
+ "ConfigurationSnippet": snippet.NewParser(cfg),
+ "Connection": connection.NewParser(cfg),
+ "CorsConfig": cors.NewParser(cfg),
+ "CustomHTTPErrors": customhttperrors.NewParser(cfg),
+ "DisableProxyInterceptErrors": disableproxyintercepterrors.NewParser(cfg),
+ "DefaultBackend": defaultbackend.NewParser(cfg),
+ "FastCGI": fastcgi.NewParser(cfg),
+ "ExternalAuth": authreq.NewParser(cfg),
+ "EnableGlobalAuth": authreqglobal.NewParser(cfg),
+ "HTTP2PushPreload": http2pushpreload.NewParser(cfg),
+ "Opentelemetry": opentelemetry.NewParser(cfg),
+ "Proxy": proxy.NewParser(cfg),
+ "ProxySSL": proxyssl.NewParser(cfg),
+ "RateLimit": ratelimit.NewParser(cfg),
+ "GlobalRateLimit": globalratelimit.NewParser(cfg),
+ "Redirect": redirect.NewParser(cfg),
+ "Rewrite": rewrite.NewParser(cfg),
+ "Satisfy": satisfy.NewParser(cfg),
+ "ServerSnippet": serversnippet.NewParser(cfg),
+ "ServiceUpstream": serviceupstream.NewParser(cfg),
+ "SessionAffinity": sessionaffinity.NewParser(cfg),
+ "SSLPassthrough": sslpassthrough.NewParser(cfg),
+ "UsePortInRedirects": portinredirect.NewParser(cfg),
+ "UpstreamHashBy": upstreamhashby.NewParser(cfg),
+ "LoadBalancing": loadbalancing.NewParser(cfg),
+ "UpstreamVhost": upstreamvhost.NewParser(cfg),
+ "Allowlist": ipallowlist.NewParser(cfg),
+ "Denylist": ipdenylist.NewParser(cfg),
+ "XForwardedPrefix": xforwardedprefix.NewParser(cfg),
+ "SSLCipher": sslcipher.NewParser(cfg),
+ "Logs": log.NewParser(cfg),
+ "BackendProtocol": backendprotocol.NewParser(cfg),
+ "ModSecurity": modsecurity.NewParser(cfg),
+ "Mirror": mirror.NewParser(cfg),
+ "StreamSnippet": streamsnippet.NewParser(cfg),
+ }
+}
+
// NewAnnotationExtractor creates a new annotations extractor
func NewAnnotationExtractor(cfg resolver.Resolver) Extractor {
return Extractor{
- map[string]parser.IngressAnnotation{
- "Aliases": alias.NewParser(cfg),
- "BasicDigestAuth": auth.NewParser(auth.AuthDirectory, cfg),
- "Canary": canary.NewParser(cfg),
- "CertificateAuth": authtls.NewParser(cfg),
- "ClientBodyBufferSize": clientbodybuffersize.NewParser(cfg),
- "CustomHeaders": customheaders.NewParser(cfg),
- "ConfigurationSnippet": snippet.NewParser(cfg),
- "Connection": connection.NewParser(cfg),
- "CorsConfig": cors.NewParser(cfg),
- "CustomHTTPErrors": customhttperrors.NewParser(cfg),
- "DisableProxyInterceptErrors": disableproxyintercepterrors.NewParser(cfg),
- "DefaultBackend": defaultbackend.NewParser(cfg),
- "FastCGI": fastcgi.NewParser(cfg),
- "ExternalAuth": authreq.NewParser(cfg),
- "EnableGlobalAuth": authreqglobal.NewParser(cfg),
- "HTTP2PushPreload": http2pushpreload.NewParser(cfg),
- "Opentelemetry": opentelemetry.NewParser(cfg),
- "Proxy": proxy.NewParser(cfg),
- "ProxySSL": proxyssl.NewParser(cfg),
- "RateLimit": ratelimit.NewParser(cfg),
- "GlobalRateLimit": globalratelimit.NewParser(cfg),
- "Redirect": redirect.NewParser(cfg),
- "Rewrite": rewrite.NewParser(cfg),
- "Satisfy": satisfy.NewParser(cfg),
- "ServerSnippet": serversnippet.NewParser(cfg),
- "ServiceUpstream": serviceupstream.NewParser(cfg),
- "SessionAffinity": sessionaffinity.NewParser(cfg),
- "SSLPassthrough": sslpassthrough.NewParser(cfg),
- "UsePortInRedirects": portinredirect.NewParser(cfg),
- "UpstreamHashBy": upstreamhashby.NewParser(cfg),
- "LoadBalancing": loadbalancing.NewParser(cfg),
- "UpstreamVhost": upstreamvhost.NewParser(cfg),
- "Allowlist": ipallowlist.NewParser(cfg),
- "Denylist": ipdenylist.NewParser(cfg),
- "XForwardedPrefix": xforwardedprefix.NewParser(cfg),
- "SSLCipher": sslcipher.NewParser(cfg),
- "Logs": log.NewParser(cfg),
- "BackendProtocol": backendprotocol.NewParser(cfg),
- "ModSecurity": modsecurity.NewParser(cfg),
- "Mirror": mirror.NewParser(cfg),
- "StreamSnippet": streamsnippet.NewParser(cfg),
- },
+ NewAnnotationFactory(cfg),
}
}
diff --git a/internal/ingress/annotations/parser/main.go b/internal/ingress/annotations/parser/main.go
index 554ad9dde..3137afbfd 100644
--- a/internal/ingress/annotations/parser/main.go
+++ b/internal/ingress/annotations/parser/main.go
@@ -210,6 +210,21 @@ func StringRiskToRisk(risk string) AnnotationRisk {
}
}
+func (a AnnotationRisk) ToString() string {
+ switch a {
+ case AnnotationRiskCritical:
+ return "Critical"
+ case AnnotationRiskHigh:
+ return "High"
+ case AnnotationRiskMedium:
+ return "Medium"
+ case AnnotationRiskLow:
+ return "Low"
+ default:
+ return "Unknown"
+ }
+}
+
func normalizeString(input string) string {
trimmedContent := []string{}
for _, line := range strings.Split(input, "\n") {
diff --git a/mkdocs.yml b/mkdocs.yml
index cbc2988ce..4b010c5ff 100644
--- a/mkdocs.yml
+++ b/mkdocs.yml
@@ -83,6 +83,7 @@ nav:
- Introduction: "user-guide/nginx-configuration/index.md"
- Basic usage: "user-guide/basic-usage.md"
- Annotations: "user-guide/nginx-configuration/annotations.md"
+ - Annotations Risks: "user-guide/nginx-configuration/annotations-risk.md"
- ConfigMap: "user-guide/nginx-configuration/configmap.md"
- Custom NGINX template: "user-guide/nginx-configuration/custom-template.md"
- Log format: "user-guide/nginx-configuration/log-format.md"
From 1dc8865cb8d33aed0a9f94aa0289c21ec91e9a3c Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Tue, 20 Aug 2024 09:01:36 -0700
Subject: [PATCH 190/283] Bump github/codeql-action from 3.26.0 to 3.26.2 in
the all group (#11826)
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
.github/workflows/scorecards.yml | 2 +-
.github/workflows/vulnerability-scans.yaml | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/.github/workflows/scorecards.yml b/.github/workflows/scorecards.yml
index a6b64d408..3301b12cf 100644
--- a/.github/workflows/scorecards.yml
+++ b/.github/workflows/scorecards.yml
@@ -59,6 +59,6 @@ jobs:
# Upload the results to GitHub's code scanning dashboard.
- name: "Upload to code-scanning"
- uses: github/codeql-action/upload-sarif@eb055d739abdc2e8de2e5f4ba1a8b246daa779aa # v3.26.0
+ uses: github/codeql-action/upload-sarif@429e1977040da7a23b6822b13c129cd1ba93dbb2 # v3.26.2
with:
sarif_file: results.sarif
diff --git a/.github/workflows/vulnerability-scans.yaml b/.github/workflows/vulnerability-scans.yaml
index cc3240931..dcf012368 100644
--- a/.github/workflows/vulnerability-scans.yaml
+++ b/.github/workflows/vulnerability-scans.yaml
@@ -75,7 +75,7 @@ jobs:
# This step checks out a copy of your repository.
- name: Upload SARIF file
- uses: github/codeql-action/upload-sarif@eb055d739abdc2e8de2e5f4ba1a8b246daa779aa # v3.26.0
+ uses: github/codeql-action/upload-sarif@429e1977040da7a23b6822b13c129cd1ba93dbb2 # v3.26.2
with:
token: ${{ github.token }}
# Path to SARIF file relative to the root of the repository
From 1b5be3ee57e8c763e4e1d698583cf08d869bef4c Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Tue, 20 Aug 2024 09:59:26 -0700
Subject: [PATCH 191/283] Bump k8s.io/component-base from 0.30.3 to 0.31.0
(#11825)
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 22 ++++++++++++++--------
go.sum | 40 ++++++++++++++++++++++++----------------
2 files changed, 38 insertions(+), 24 deletions(-)
diff --git a/go.mod b/go.mod
index ae4974c4a..a98e1a788 100644
--- a/go.mod
+++ b/go.mod
@@ -16,7 +16,7 @@ require (
github.com/ncabatoff/process-exporter v0.8.3
github.com/onsi/ginkgo/v2 v2.20.0
github.com/opencontainers/runc v1.1.13
- github.com/pmezard/go-difflib v1.0.0
+ github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2
github.com/prometheus/client_golang v1.19.1
github.com/prometheus/client_model v0.6.1
github.com/prometheus/common v0.55.0
@@ -31,20 +31,26 @@ require (
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab
gopkg.in/go-playground/pool.v3 v3.1.1
gopkg.in/mcuadros/go-syslog.v2 v2.3.0
- k8s.io/api v0.30.3
+ k8s.io/api v0.31.0
k8s.io/apiextensions-apiserver v0.30.1
- k8s.io/apimachinery v0.30.3
+ k8s.io/apimachinery v0.31.0
k8s.io/apiserver v0.30.1
k8s.io/cli-runtime v0.30.0
- k8s.io/client-go v0.30.3
+ k8s.io/client-go v0.31.0
k8s.io/code-generator v0.30.1
- k8s.io/component-base v0.30.3
+ k8s.io/component-base v0.31.0
k8s.io/klog/v2 v2.130.1
pault.ag/go/sniff v0.0.0-20200207005214-cf7e4d167732
sigs.k8s.io/controller-runtime v0.18.4
sigs.k8s.io/mdtoc v1.1.0
)
+require (
+ github.com/fxamacker/cbor/v2 v2.7.0 // indirect
+ github.com/x448/float16 v0.8.4 // indirect
+ gopkg.in/evanphx/json-patch.v4 v4.12.0 // indirect
+)
+
require (
github.com/Anddd7/pb v0.0.0-20240425032658-369b0f6a404c
github.com/Azure/go-ansiterm v0.0.0-20230124172434-306776ec8161 // indirect
@@ -54,7 +60,7 @@ require (
github.com/cespare/xxhash/v2 v2.3.0 // indirect
github.com/coreos/go-systemd/v22 v22.5.0 // indirect
github.com/cyphar/filepath-securejoin v0.2.4 // indirect
- github.com/davecgh/go-spew v1.1.1 // indirect
+ github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc // indirect
github.com/eapache/queue v1.1.0 // indirect
github.com/emicklei/go-restful/v3 v3.12.0 // indirect
github.com/evanphx/json-patch v5.9.0+incompatible // indirect
@@ -115,7 +121,7 @@ require (
golang.org/x/text v0.17.0 // indirect
golang.org/x/time v0.5.0 // indirect
golang.org/x/tools v0.24.0 // indirect
- google.golang.org/genproto/googleapis/rpc v0.0.0-20240528184218-531527333157 // indirect
+ google.golang.org/genproto/googleapis/rpc v0.0.0-20240701130421-f6361c86f094 // indirect
google.golang.org/protobuf v1.34.2 // indirect
gopkg.in/evanphx/json-patch.v5 v5.9.0 // indirect
gopkg.in/go-playground/assert.v1 v1.2.1 // indirect
@@ -124,7 +130,7 @@ require (
gopkg.in/yaml.v3 v3.0.1 // indirect
k8s.io/gengo/v2 v2.0.0-20240404160639-a0386bf69313 // indirect
k8s.io/kube-openapi v0.0.0-20240430033511-f0e62f92d13f // indirect
- k8s.io/utils v0.0.0-20240502163921-fe8a2dddb1d0 // indirect
+ k8s.io/utils v0.0.0-20240711033017-18e509b52bc8 // indirect
sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd // indirect
sigs.k8s.io/kustomize/api v0.16.0 // indirect
sigs.k8s.io/kustomize/kyaml v0.16.0 // indirect
diff --git a/go.sum b/go.sum
index 48031be86..e29fb889a 100644
--- a/go.sum
+++ b/go.sum
@@ -23,8 +23,9 @@ github.com/creack/pty v1.1.18/go.mod h1:MOBLtS5ELjhRRrroQr9kyvTxUAFNvYEK993ew/Vr
github.com/cyphar/filepath-securejoin v0.2.4 h1:Ugdm7cg7i6ZK6x3xDF1oEu1nfkyfH53EtKeQYTC3kyg=
github.com/cyphar/filepath-securejoin v0.2.4/go.mod h1:aPGpWjXOXUn2NCNjFvBE6aRxGGx79pTxQpKOJNYHHl4=
github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
-github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c=
github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
+github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc h1:U9qPSI2PIWSS1VwoXQT9A3Wy9MM3WgvqSxFWenqJduM=
+github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
github.com/eapache/channels v1.1.0 h1:F1taHcn7/F0i8DYqKXJnyhJcVpp2kgFcNePxXtnyu4k=
github.com/eapache/channels v1.1.0/go.mod h1:jMm2qB5Ubtg9zLd+inMZd2/NUvXgzmWXsDaLyQIGfH0=
github.com/eapache/queue v1.1.0 h1:YOEu7KNc61ntiQlcEeUIoDTJ2o8mQznoNvUhiigpIqc=
@@ -42,6 +43,8 @@ github.com/fsnotify/fsnotify v1.7.0/go.mod h1:40Bi/Hjc2AVfZrqy+aj+yEI+/bRxZnMJyT
github.com/fullsailor/pkcs7 v0.0.0-20160414161337-2585af45975b/go.mod h1:KnogPXtdwXqoenmZCw6S+25EAm2MkxbG0deNDu4cbSA=
github.com/fullsailor/pkcs7 v0.0.0-20190404230743-d7302db945fa h1:RDBNVkRviHZtvDvId8XSGPu3rmpmSe+wKRcEWNgsfWU=
github.com/fullsailor/pkcs7 v0.0.0-20190404230743-d7302db945fa/go.mod h1:KnogPXtdwXqoenmZCw6S+25EAm2MkxbG0deNDu4cbSA=
+github.com/fxamacker/cbor/v2 v2.7.0 h1:iM5WgngdRBanHcxugY4JySA0nk1wZorNOpTgCMedv5E=
+github.com/fxamacker/cbor/v2 v2.7.0/go.mod h1:pxXPTn3joSm21Gbwsv0w9OSA2y1HFR9qXEeXQVeNoDQ=
github.com/go-errors/errors v1.5.1 h1:ZwEMSLRCapFLflTpT7NKaAc7ukJ8ZPEjzlxt8rPN8bk=
github.com/go-errors/errors v1.5.1/go.mod h1:sIVyrIiJhuEF+Pj9Ebtd6P/rEYROXFi3BopGUQ5a5Og=
github.com/go-logr/logr v1.4.2 h1:6pFjapn8bFcIbiKo3XT4j/BhANplGihG6tvd+8rYgrY=
@@ -174,8 +177,9 @@ github.com/peterbourgon/diskv v2.0.1+incompatible h1:UBdAOUP5p4RWqPBg048CAvpKN+v
github.com/peterbourgon/diskv v2.0.1+incompatible/go.mod h1:uqqh8zWWbv1HBMNONnaR/tNboyR3/BZd58JJSHlUSCU=
github.com/pkg/errors v0.9.1 h1:FEBLx1zS214owpjy7qsBeixbURkuhQAwrK5UwLGTwt4=
github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
-github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
+github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 h1:Jamvg5psRIccs7FGNTlIRMkT8wgtp5eCXdBlqhYGL6U=
+github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
github.com/prometheus/client_golang v1.19.1 h1:wZWJDwK+NameRJuPGDhlnFgx8e8HN3XHQeLaYJFJBOE=
github.com/prometheus/client_golang v1.19.1/go.mod h1:mP78NwGzrVks5S2H6ab8+ZZGJLZUq1hoULYBAYBw1Ho=
github.com/prometheus/client_model v0.6.1 h1:ZKSh/rekM+n3CeS952MLRAdFwIKqeY8b62p8ais2e9E=
@@ -184,8 +188,8 @@ github.com/prometheus/common v0.55.0 h1:KEi6DK7lXW/m7Ig5i47x0vRzuBsHuvJdi5ee6Y3G
github.com/prometheus/common v0.55.0/go.mod h1:2SECS4xJG1kd8XF9IcM1gMX6510RAEL65zxzNImwdc8=
github.com/prometheus/procfs v0.15.1 h1:YagwOFzUgYfKKHX6Dr+sHT7km/hxC76UB0learggepc=
github.com/prometheus/procfs v0.15.1/go.mod h1:fB45yRUv8NstnjriLhBQLuOUt+WW4BsoGhij/e3PBqk=
-github.com/rogpeppe/go-internal v1.11.0 h1:cWPaGQEPrBb5/AsnsZesgZZ9yb1OQ+GOISoDNXVBh4M=
-github.com/rogpeppe/go-internal v1.11.0/go.mod h1:ddIwULY96R17DhadqLgMfk9H9tvdUzkipdSkR5nkCZA=
+github.com/rogpeppe/go-internal v1.12.0 h1:exVL4IDcn6na9z1rAb56Vxr+CgyK3nn3O+epU5NdKM8=
+github.com/rogpeppe/go-internal v1.12.0/go.mod h1:E+RYuTGaKKdloAfM02xzb0FW3Paa99yedzYV+kq4uf4=
github.com/russross/blackfriday/v2 v2.1.0/go.mod h1:+Rmxgy9KzJVeS9/2gXHxylqXiyQDYRxCVz55jmeOWTM=
github.com/sergi/go-diff v1.3.1 h1:xkr+Oxo4BOQKmkn/B9eMK0g5Kg/983T9DqqPHwYqD+8=
github.com/sergi/go-diff v1.3.1/go.mod h1:aMJSSKb2lpPvRNec0+w3fl7LP9IOFzdc9Pa4NFbPK1I=
@@ -206,6 +210,8 @@ github.com/stretchr/testify v1.7.0/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/
github.com/stretchr/testify v1.9.0 h1:HtqpIVDClZ4nwg75+f6Lvsy/wHu+3BoSGCbBAcpTsTg=
github.com/stretchr/testify v1.9.0/go.mod h1:r2ic/lqez/lEtzL7wO/rwa5dbSLXVDPFyf8C91i36aY=
github.com/urfave/cli v1.17.1-0.20160602030128-01a33823596e/go.mod h1:70zkFmudgCuE/ngEzBv17Jvp/497gISqfk5gWijbERA=
+github.com/x448/float16 v0.8.4 h1:qLwI1I70+NjRFUR3zs1JPUCgaCXSh3SW62uAKT1mSBM=
+github.com/x448/float16 v0.8.4/go.mod h1:14CWIYCyZA/cWjXOioeEpHeN/83MdbZDRQHoFcYsOfg=
github.com/xlab/treeprint v1.2.0 h1:HzHnuAF1plUN2zGlAFHbSQP2qJ0ZAD3XF5XD7OesXRQ=
github.com/xlab/treeprint v1.2.0/go.mod h1:gj5Gd3gPdKtR1ikdDK6fnFLdmIS0X30kTTuNd/WEJu0=
github.com/yudai/gojsondiff v1.0.0 h1:27cbfqXLVEJ1o8I6v3y9lg8Ydm53EKqHXAOMxEGlCOA=
@@ -291,8 +297,8 @@ golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8T
golang.org/x/xerrors v0.0.0-20200804184101-5ec99f83aff1/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
gomodules.xyz/jsonpatch/v2 v2.4.0 h1:Ci3iUJyx9UeRx7CeFN8ARgGbkESwJK+KB9lLcWxY/Zw=
gomodules.xyz/jsonpatch/v2 v2.4.0/go.mod h1:AH3dM2RI6uoBZxn3LVrfvJ3E0/9dG4cSrbuBJT4moAY=
-google.golang.org/genproto/googleapis/rpc v0.0.0-20240528184218-531527333157 h1:Zy9XzmMEflZ/MAaA7vNcoebnRAld7FsPW1EeBB7V0m8=
-google.golang.org/genproto/googleapis/rpc v0.0.0-20240528184218-531527333157/go.mod h1:EfXuqaE1J41VCDicxHzUDm+8rk+7ZdXzHV0IhO/I6s0=
+google.golang.org/genproto/googleapis/rpc v0.0.0-20240701130421-f6361c86f094 h1:BwIjyKYGsK9dMCBOorzRri8MQwmi7mT9rGHsCEinZkA=
+google.golang.org/genproto/googleapis/rpc v0.0.0-20240701130421-f6361c86f094/go.mod h1:Ue6ibwXGpU+dqIcODieyLOcgj7z8+IcskoNIgZxtrFY=
google.golang.org/grpc v1.65.0 h1:bs/cUb4lp1G5iImFFd3u5ixQzweKizoZJAwBNLR42lc=
google.golang.org/grpc v1.65.0/go.mod h1:WgYC2ypjlB0EiQi6wdKixMqukr6lBc0Vo+oOgjrM5ZQ=
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab h1:tg8hvIl5RmFBuXlcJMuL0h4Psh1gx5Q5xEMwzBZIzWA=
@@ -309,6 +315,8 @@ gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8
gopkg.in/check.v1 v1.0.0-20190902080502-41f04d3bba15/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c h1:Hei/4ADfdWqJk1ZMxUNpqntNwaWcugrBjAiHlqqRiVk=
gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c/go.mod h1:JHkPIbrfpd72SG/EVd6muEfDQjcINNoR0C8j2r3qZ4Q=
+gopkg.in/evanphx/json-patch.v4 v4.12.0 h1:n6jtcsulIzXPJaxegRbvFNNrZDjbij7ny3gmSPG+6V4=
+gopkg.in/evanphx/json-patch.v4 v4.12.0/go.mod h1:p8EYWUEYMpynmqDbY58zCKCFZw8pRWMG4EsWvDvM72M=
gopkg.in/evanphx/json-patch.v5 v5.9.0 h1:hx1VU2SGj4F8r9b8GUwJLdc8DNO8sy79ZGui0G05GLo=
gopkg.in/evanphx/json-patch.v5 v5.9.0/go.mod h1:/kvTRh1TVm5wuM6OkHxqXtE/1nUZZpihg29RtuIyfvk=
gopkg.in/fsnotify.v1 v1.4.7/go.mod h1:Tz8NjZHkW78fSQdbUxIjBTcgA1z1m8ZHf0WmKUhAMys=
@@ -331,30 +339,30 @@ gopkg.in/yaml.v2 v2.4.0/go.mod h1:RDklbk79AGWmwhnvt/jBztapEOGDOx6ZbXqjP6csGnQ=
gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA=
gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
-k8s.io/api v0.30.3 h1:ImHwK9DCsPA9uoU3rVh4QHAHHK5dTSv1nxJUapx8hoQ=
-k8s.io/api v0.30.3/go.mod h1:GPc8jlzoe5JG3pb0KJCSLX5oAFIW3/qNJITlDj8BH04=
+k8s.io/api v0.31.0 h1:b9LiSjR2ym/SzTOlfMHm1tr7/21aD7fSkqgD/CVJBCo=
+k8s.io/api v0.31.0/go.mod h1:0YiFF+JfFxMM6+1hQei8FY8M7s1Mth+z/q7eF1aJkTE=
k8s.io/apiextensions-apiserver v0.30.1 h1:4fAJZ9985BmpJG6PkoxVRpXv9vmPUOVzl614xarePws=
k8s.io/apiextensions-apiserver v0.30.1/go.mod h1:R4GuSrlhgq43oRY9sF2IToFh7PVlF1JjfWdoG3pixk4=
-k8s.io/apimachinery v0.30.3 h1:q1laaWCmrszyQuSQCfNB8cFgCuDAoPszKY4ucAjDwHc=
-k8s.io/apimachinery v0.30.3/go.mod h1:iexa2somDaxdnj7bha06bhb43Zpa6eWH8N8dbqVjTUc=
+k8s.io/apimachinery v0.31.0 h1:m9jOiSr3FoSSL5WO9bjm1n6B9KROYYgNZOb4tyZ1lBc=
+k8s.io/apimachinery v0.31.0/go.mod h1:rsPdaZJfTfLsNJSQzNHQvYoTmxhoOEofxtOsF3rtsMo=
k8s.io/apiserver v0.30.1 h1:BEWEe8bzS12nMtDKXzCF5Q5ovp6LjjYkSp8qOPk8LZ8=
k8s.io/apiserver v0.30.1/go.mod h1:i87ZnQ+/PGAmSbD/iEKM68bm1D5reX8fO4Ito4B01mo=
k8s.io/cli-runtime v0.30.0 h1:0vn6/XhOvn1RJ2KJOC6IRR2CGqrpT6QQF4+8pYpWQ48=
k8s.io/cli-runtime v0.30.0/go.mod h1:vATpDMATVTMA79sZ0YUCzlMelf6rUjoBzlp+RnoM+cg=
-k8s.io/client-go v0.30.3 h1:bHrJu3xQZNXIi8/MoxYtZBBWQQXwy16zqJwloXXfD3k=
-k8s.io/client-go v0.30.3/go.mod h1:8d4pf8vYu665/kUbsxWAQ/JDBNWqfFeZnvFiVdmx89U=
+k8s.io/client-go v0.31.0 h1:QqEJzNjbN2Yv1H79SsS+SWnXkBgVu4Pj3CJQgbx0gI8=
+k8s.io/client-go v0.31.0/go.mod h1:Y9wvC76g4fLjmU0BA+rV+h2cncoadjvjjkkIGoTLcGU=
k8s.io/code-generator v0.30.1 h1:ZsG++q5Vt0ScmKCeLhynUuWgcwFGg1Hl1AGfatqPJBI=
k8s.io/code-generator v0.30.1/go.mod h1:hFgxRsvOUg79mbpbVKfjJvRhVz1qLoe40yZDJ/hwRH4=
-k8s.io/component-base v0.30.3 h1:Ci0UqKWf4oiwy8hr1+E3dsnliKnkMLZMVbWzeorlk7s=
-k8s.io/component-base v0.30.3/go.mod h1:C1SshT3rGPCuNtBs14RmVD2xW0EhRSeLvBh7AGk1quA=
+k8s.io/component-base v0.31.0 h1:/KIzGM5EvPNQcYgwq5NwoQBaOlVFrghoVGr8lG6vNRs=
+k8s.io/component-base v0.31.0/go.mod h1:TYVuzI1QmN4L5ItVdMSXKvH7/DtvIuas5/mm8YT3rTo=
k8s.io/gengo/v2 v2.0.0-20240404160639-a0386bf69313 h1:bKcdZJOPICVmIIuaM9+MXmapE94dn5AYv5ODs1jA43o=
k8s.io/gengo/v2 v2.0.0-20240404160639-a0386bf69313/go.mod h1:VH3AT8AaQOqiGjMF9p0/IM1Dj+82ZwjfxUP1IxaHE+8=
k8s.io/klog/v2 v2.130.1 h1:n9Xl7H1Xvksem4KFG4PYbdQCQxqc/tTUyrgXaOhHSzk=
k8s.io/klog/v2 v2.130.1/go.mod h1:3Jpz1GvMt720eyJH1ckRHK1EDfpxISzJ7I9OYgaDtPE=
k8s.io/kube-openapi v0.0.0-20240430033511-f0e62f92d13f h1:0LQagt0gDpKqvIkAMPaRGcXawNMouPECM1+F9BVxEaM=
k8s.io/kube-openapi v0.0.0-20240430033511-f0e62f92d13f/go.mod h1:S9tOR0FxgyusSNR+MboCuiDpVWkAifZvaYI1Q2ubgro=
-k8s.io/utils v0.0.0-20240502163921-fe8a2dddb1d0 h1:jgGTlFYnhF1PM1Ax/lAlxUPE+KfCIXHaathvJg1C3ak=
-k8s.io/utils v0.0.0-20240502163921-fe8a2dddb1d0/go.mod h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0=
+k8s.io/utils v0.0.0-20240711033017-18e509b52bc8 h1:pUdcCO1Lk/tbT5ztQWOBi5HBgbBP1J8+AsQnQCKsi8A=
+k8s.io/utils v0.0.0-20240711033017-18e509b52bc8/go.mod h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0=
pault.ag/go/sniff v0.0.0-20200207005214-cf7e4d167732 h1:SAElp8THCfmBdM+4lmWX5gebiSSkEr7PAYDVF91qpfg=
pault.ag/go/sniff v0.0.0-20200207005214-cf7e4d167732/go.mod h1:lpvCfhqEHNJSSpG5R5A2EgsVzG8RTt4RfPoQuRAcDmg=
sigs.k8s.io/controller-runtime v0.18.4 h1:87+guW1zhvuPLh1PHybKdYFLU0YJp4FhJRmiHvm5BZw=
From 3b8027c8a80142b81f08d60e531152b7b133e7ef Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Tue, 20 Aug 2024 10:23:57 -0700
Subject: [PATCH 192/283] Bump dario.cat/mergo from 1.0.0 to 1.0.1 in the all
group (#11822)
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 2 +-
go.sum | 4 ++--
2 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/go.mod b/go.mod
index a98e1a788..4d32e43a5 100644
--- a/go.mod
+++ b/go.mod
@@ -3,7 +3,7 @@ module k8s.io/ingress-nginx
go 1.22.6
require (
- dario.cat/mergo v1.0.0
+ dario.cat/mergo v1.0.1
github.com/armon/go-proxyproto v0.1.0
github.com/eapache/channels v1.1.0
github.com/fsnotify/fsnotify v1.7.0
diff --git a/go.sum b/go.sum
index e29fb889a..fc9f7b333 100644
--- a/go.sum
+++ b/go.sum
@@ -1,5 +1,5 @@
-dario.cat/mergo v1.0.0 h1:AGCNq9Evsj31mOgNPcLyXc+4PNABt905YmuqPYYpBWk=
-dario.cat/mergo v1.0.0/go.mod h1:uNxQE+84aUszobStD9th8a29P2fMDhsBdgRYvZOxGmk=
+dario.cat/mergo v1.0.1 h1:Ra4+bf83h2ztPIQYNP99R6m+Y7KfnARDfID+a+vLl4s=
+dario.cat/mergo v1.0.1/go.mod h1:uNxQE+84aUszobStD9th8a29P2fMDhsBdgRYvZOxGmk=
github.com/Anddd7/pb v0.0.0-20240425032658-369b0f6a404c h1:uhBf0CHXi7nCFZXxHV7l1cBcYFEEVRK4FYxvm1l9lKg=
github.com/Anddd7/pb v0.0.0-20240425032658-369b0f6a404c/go.mod h1:vYWKbnXd2KAZHUECLPzSE0Er3FgiEmOdPtxwSIRihck=
github.com/Azure/go-ansiterm v0.0.0-20230124172434-306776ec8161 h1:L/gRVlceqvL25UVaW/CKtUDjefjrs0SPonmDGUVOYP0=
From 656252cb9908f932c643e443c05af2bdc5739536 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Wed, 21 Aug 2024 07:27:29 +0100
Subject: [PATCH 193/283] Bump sigs.k8s.io/controller-runtime from 0.18.4 to
0.19.0 (#11823)
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 8 ++++----
go.sum | 16 ++++++++--------
2 files changed, 12 insertions(+), 12 deletions(-)
diff --git a/go.mod b/go.mod
index 4d32e43a5..060fdbf21 100644
--- a/go.mod
+++ b/go.mod
@@ -32,16 +32,16 @@ require (
gopkg.in/go-playground/pool.v3 v3.1.1
gopkg.in/mcuadros/go-syslog.v2 v2.3.0
k8s.io/api v0.31.0
- k8s.io/apiextensions-apiserver v0.30.1
+ k8s.io/apiextensions-apiserver v0.31.0
k8s.io/apimachinery v0.31.0
- k8s.io/apiserver v0.30.1
+ k8s.io/apiserver v0.31.0
k8s.io/cli-runtime v0.30.0
k8s.io/client-go v0.31.0
- k8s.io/code-generator v0.30.1
+ k8s.io/code-generator v0.31.0
k8s.io/component-base v0.31.0
k8s.io/klog/v2 v2.130.1
pault.ag/go/sniff v0.0.0-20200207005214-cf7e4d167732
- sigs.k8s.io/controller-runtime v0.18.4
+ sigs.k8s.io/controller-runtime v0.19.0
sigs.k8s.io/mdtoc v1.1.0
)
diff --git a/go.sum b/go.sum
index fc9f7b333..de380c386 100644
--- a/go.sum
+++ b/go.sum
@@ -341,18 +341,18 @@ gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA=
gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
k8s.io/api v0.31.0 h1:b9LiSjR2ym/SzTOlfMHm1tr7/21aD7fSkqgD/CVJBCo=
k8s.io/api v0.31.0/go.mod h1:0YiFF+JfFxMM6+1hQei8FY8M7s1Mth+z/q7eF1aJkTE=
-k8s.io/apiextensions-apiserver v0.30.1 h1:4fAJZ9985BmpJG6PkoxVRpXv9vmPUOVzl614xarePws=
-k8s.io/apiextensions-apiserver v0.30.1/go.mod h1:R4GuSrlhgq43oRY9sF2IToFh7PVlF1JjfWdoG3pixk4=
+k8s.io/apiextensions-apiserver v0.31.0 h1:fZgCVhGwsclj3qCw1buVXCV6khjRzKC5eCFt24kyLSk=
+k8s.io/apiextensions-apiserver v0.31.0/go.mod h1:b9aMDEYaEe5sdK+1T0KU78ApR/5ZVp4i56VacZYEHxk=
k8s.io/apimachinery v0.31.0 h1:m9jOiSr3FoSSL5WO9bjm1n6B9KROYYgNZOb4tyZ1lBc=
k8s.io/apimachinery v0.31.0/go.mod h1:rsPdaZJfTfLsNJSQzNHQvYoTmxhoOEofxtOsF3rtsMo=
-k8s.io/apiserver v0.30.1 h1:BEWEe8bzS12nMtDKXzCF5Q5ovp6LjjYkSp8qOPk8LZ8=
-k8s.io/apiserver v0.30.1/go.mod h1:i87ZnQ+/PGAmSbD/iEKM68bm1D5reX8fO4Ito4B01mo=
+k8s.io/apiserver v0.31.0 h1:p+2dgJjy+bk+B1Csz+mc2wl5gHwvNkC9QJV+w55LVrY=
+k8s.io/apiserver v0.31.0/go.mod h1:KI9ox5Yu902iBnnyMmy7ajonhKnkeZYJhTZ/YI+WEMk=
k8s.io/cli-runtime v0.30.0 h1:0vn6/XhOvn1RJ2KJOC6IRR2CGqrpT6QQF4+8pYpWQ48=
k8s.io/cli-runtime v0.30.0/go.mod h1:vATpDMATVTMA79sZ0YUCzlMelf6rUjoBzlp+RnoM+cg=
k8s.io/client-go v0.31.0 h1:QqEJzNjbN2Yv1H79SsS+SWnXkBgVu4Pj3CJQgbx0gI8=
k8s.io/client-go v0.31.0/go.mod h1:Y9wvC76g4fLjmU0BA+rV+h2cncoadjvjjkkIGoTLcGU=
-k8s.io/code-generator v0.30.1 h1:ZsG++q5Vt0ScmKCeLhynUuWgcwFGg1Hl1AGfatqPJBI=
-k8s.io/code-generator v0.30.1/go.mod h1:hFgxRsvOUg79mbpbVKfjJvRhVz1qLoe40yZDJ/hwRH4=
+k8s.io/code-generator v0.31.0 h1:w607nrMi1KeDKB3/F/J4lIoOgAwc+gV9ZKew4XRfMp8=
+k8s.io/code-generator v0.31.0/go.mod h1:84y4w3es8rOJOUUP1rLsIiGlO1JuEaPFXQPA9e/K6U0=
k8s.io/component-base v0.31.0 h1:/KIzGM5EvPNQcYgwq5NwoQBaOlVFrghoVGr8lG6vNRs=
k8s.io/component-base v0.31.0/go.mod h1:TYVuzI1QmN4L5ItVdMSXKvH7/DtvIuas5/mm8YT3rTo=
k8s.io/gengo/v2 v2.0.0-20240404160639-a0386bf69313 h1:bKcdZJOPICVmIIuaM9+MXmapE94dn5AYv5ODs1jA43o=
@@ -365,8 +365,8 @@ k8s.io/utils v0.0.0-20240711033017-18e509b52bc8 h1:pUdcCO1Lk/tbT5ztQWOBi5HBgbBP1
k8s.io/utils v0.0.0-20240711033017-18e509b52bc8/go.mod h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0=
pault.ag/go/sniff v0.0.0-20200207005214-cf7e4d167732 h1:SAElp8THCfmBdM+4lmWX5gebiSSkEr7PAYDVF91qpfg=
pault.ag/go/sniff v0.0.0-20200207005214-cf7e4d167732/go.mod h1:lpvCfhqEHNJSSpG5R5A2EgsVzG8RTt4RfPoQuRAcDmg=
-sigs.k8s.io/controller-runtime v0.18.4 h1:87+guW1zhvuPLh1PHybKdYFLU0YJp4FhJRmiHvm5BZw=
-sigs.k8s.io/controller-runtime v0.18.4/go.mod h1:TVoGrfdpbA9VRFaRnKgk9P5/atA0pMwq+f+msb9M8Sg=
+sigs.k8s.io/controller-runtime v0.19.0 h1:nWVM7aq+Il2ABxwiCizrVDSlmDcshi9llbaFbC0ji/Q=
+sigs.k8s.io/controller-runtime v0.19.0/go.mod h1:iRmWllt8IlaLjvTTDLhRBXIEtkCK6hwVBJJsYS9Ajf4=
sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd h1:EDPBXCAspyGV4jQlpZSudPeMmr1bNJefnuqLsRAsHZo=
sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd/go.mod h1:B8JuhiUyNFVKdsE8h686QcCxMaH6HrOAZj4vswFpcB0=
sigs.k8s.io/kustomize/api v0.16.0 h1:/zAR4FOQDCkgSDmVzV2uiFbuy9bhu3jEzthrHCuvm1g=
From bfd65d6c5939d9e982abcb9b84f98d63c01e522c Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Wed, 21 Aug 2024 07:29:39 +0100
Subject: [PATCH 194/283] Bump github.com/prometheus/client_golang from 1.19.1
to 1.20.1 (#11832)
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 3 ++-
go.sum | 6 ++++--
2 files changed, 6 insertions(+), 3 deletions(-)
diff --git a/go.mod b/go.mod
index 060fdbf21..95123b04b 100644
--- a/go.mod
+++ b/go.mod
@@ -17,7 +17,7 @@ require (
github.com/onsi/ginkgo/v2 v2.20.0
github.com/opencontainers/runc v1.1.13
github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2
- github.com/prometheus/client_golang v1.19.1
+ github.com/prometheus/client_golang v1.20.1
github.com/prometheus/client_model v0.6.1
github.com/prometheus/common v0.55.0
github.com/spf13/cobra v1.8.1
@@ -47,6 +47,7 @@ require (
require (
github.com/fxamacker/cbor/v2 v2.7.0 // indirect
+ github.com/klauspost/compress v1.17.9 // indirect
github.com/x448/float16 v0.8.4 // indirect
gopkg.in/evanphx/json-patch.v4 v4.12.0 // indirect
)
diff --git a/go.sum b/go.sum
index de380c386..790fd5215 100644
--- a/go.sum
+++ b/go.sum
@@ -111,6 +111,8 @@ github.com/json-iterator/go v1.1.12 h1:PV8peI4a0ysnczrg+LtxykD8LfKY9ML6u2jnxaEnr
github.com/json-iterator/go v1.1.12/go.mod h1:e30LSqwooZae/UwlEbR2852Gd8hjQvJoHmT4TnhNGBo=
github.com/kisielk/errcheck v1.5.0/go.mod h1:pFxgyoBC7bSaBwPgfKdkLd5X25qrDl4LWUI2bnpBCr8=
github.com/kisielk/gotool v1.0.0/go.mod h1:XhKaO+MFFWcvkIS/tQcRk01m1F5IRFswLeQ+oQHNcck=
+github.com/klauspost/compress v1.17.9 h1:6KIumPrER1LHsvBVuDa0r5xaG0Es51mhhB9BQB2qeMA=
+github.com/klauspost/compress v1.17.9/go.mod h1:Di0epgTjJY877eYKx5yC51cX2A2Vl2ibi7bDH9ttBbw=
github.com/kr/pretty v0.1.0/go.mod h1:dAy3ld7l9f0ibDNOQOHHMYYIIbhfbHSm3C4ZsoJORNo=
github.com/kr/pretty v0.3.1 h1:flRD4NNwYAUpkphVc1HcthR4KEIFJ65n8Mw5qdRn3LE=
github.com/kr/pretty v0.3.1/go.mod h1:hoEshYVHaxMs3cyo3Yncou5ZscifuDolrwPKZanG3xk=
@@ -180,8 +182,8 @@ github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINE
github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 h1:Jamvg5psRIccs7FGNTlIRMkT8wgtp5eCXdBlqhYGL6U=
github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
-github.com/prometheus/client_golang v1.19.1 h1:wZWJDwK+NameRJuPGDhlnFgx8e8HN3XHQeLaYJFJBOE=
-github.com/prometheus/client_golang v1.19.1/go.mod h1:mP78NwGzrVks5S2H6ab8+ZZGJLZUq1hoULYBAYBw1Ho=
+github.com/prometheus/client_golang v1.20.1 h1:IMJXHOD6eARkQpxo8KkhgEVFlBNm+nkrFUyGlIu7Na8=
+github.com/prometheus/client_golang v1.20.1/go.mod h1:PIEt8X02hGcP8JWbeHyeZ53Y/jReSnHgO035n//V5WE=
github.com/prometheus/client_model v0.6.1 h1:ZKSh/rekM+n3CeS952MLRAdFwIKqeY8b62p8ais2e9E=
github.com/prometheus/client_model v0.6.1/go.mod h1:OrxVMOVHjw3lKMa8+x6HeMGkHMQyHDk9E3jmP2AmGiY=
github.com/prometheus/common v0.55.0 h1:KEi6DK7lXW/m7Ig5i47x0vRzuBsHuvJdi5ee6Y3G1dc=
From 3bec99ecfce78a535b17d1cd87c5cae105328190 Mon Sep 17 00:00:00 2001
From: Ricardo Katz
Date: Wed, 21 Aug 2024 10:54:29 -0300
Subject: [PATCH 195/283] Remove 3rd party lua plugin support (#11821)
---
.../nginx-configuration/configmap.md | 5 --
internal/ingress/controller/config/config.go | 5 --
.../ingress/controller/template/configmap.go | 6 --
rootfs/etc/nginx/lua/plugins.lua | 61 -------------------
rootfs/etc/nginx/lua/plugins/README.md | 36 -----------
.../nginx/lua/plugins/hello_world/main.lua | 13 ----
.../plugins/hello_world/test/main_test.lua | 24 --------
rootfs/etc/nginx/lua/test/plugins_test.lua | 23 -------
rootfs/etc/nginx/template/nginx.tmpl | 19 ------
test/data/cleanConf.expected.conf | 4 --
test/data/cleanConf.src.conf | 7 +--
test/e2e/settings/plugins.go | 55 -----------------
test/test-lua.sh | 2 +-
13 files changed, 2 insertions(+), 258 deletions(-)
delete mode 100644 rootfs/etc/nginx/lua/plugins.lua
delete mode 100644 rootfs/etc/nginx/lua/plugins/README.md
delete mode 100644 rootfs/etc/nginx/lua/plugins/hello_world/main.lua
delete mode 100644 rootfs/etc/nginx/lua/plugins/hello_world/test/main_test.lua
delete mode 100644 rootfs/etc/nginx/lua/test/plugins_test.lua
delete mode 100644 test/e2e/settings/plugins.go
diff --git a/docs/user-guide/nginx-configuration/configmap.md b/docs/user-guide/nginx-configuration/configmap.md
index 0b8e03af1..51e4edfa3 100644
--- a/docs/user-guide/nginx-configuration/configmap.md
+++ b/docs/user-guide/nginx-configuration/configmap.md
@@ -82,7 +82,6 @@ The following table shows a configuration option's name, type, and the default v
| [server-name-hash-bucket-size](#server-name-hash-bucket-size) | int | `` |
| [proxy-headers-hash-max-size](#proxy-headers-hash-max-size) | int | 512 | |
| [proxy-headers-hash-bucket-size](#proxy-headers-hash-bucket-size) | int | 64 | |
-| [plugins](#plugins) | []string | | |
| [reuse-port](#reuse-port) | bool | "true" | |
| [server-tokens](#server-tokens) | bool | "false" | |
| [ssl-ciphers](#ssl-ciphers) | string | "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384" | |
@@ -612,10 +611,6 @@ _References:_
- [https://nginx.org/en/docs/hash.html](https://nginx.org/en/docs/hash.html)
- [https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_headers_hash_bucket_size](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_headers_hash_bucket_size)
-## plugins
-
-Activates plugins installed in `/etc/nginx/lua/plugins`. Refer to [ingress-nginx plugins README](https://github.com/kubernetes/ingress-nginx/blob/main/rootfs/etc/nginx/lua/plugins/README.md) for more information on how to write and install a plugin.
-
## server-tokens
Send NGINX Server header in responses and display NGINX version in error pages. _**default:**_ is disabled
diff --git a/internal/ingress/controller/config/config.go b/internal/ingress/controller/config/config.go
index 5e0ca2296..337cb9e86 100644
--- a/internal/ingress/controller/config/config.go
+++ b/internal/ingress/controller/config/config.go
@@ -318,11 +318,6 @@ type Configuration struct {
NginxStatusIpv4Whitelist []string `json:"nginx-status-ipv4-whitelist,omitempty"`
NginxStatusIpv6Whitelist []string `json:"nginx-status-ipv6-whitelist,omitempty"`
- // Plugins configures plugins to use placed in the directory /etc/nginx/lua/plugins.
- // Every plugin has to have main.lua in the root. Every plugin has to bundle all of its dependencies.
- // The execution order follows the definition.
- Plugins []string `json:"plugins,omitempty"`
-
// If UseProxyProtocol is enabled ProxyRealIPCIDR defines the default the IP/network address
// of your external load balancer
ProxyRealIPCIDR []string `json:"proxy-real-ip-cidr,omitempty"`
diff --git a/internal/ingress/controller/template/configmap.go b/internal/ingress/controller/template/configmap.go
index 1a7f15f1c..2f7b0a09c 100644
--- a/internal/ingress/controller/template/configmap.go
+++ b/internal/ingress/controller/template/configmap.go
@@ -67,7 +67,6 @@ const (
globalAuthCacheDuration = "global-auth-cache-duration"
globalAuthAlwaysSetCookie = "global-auth-always-set-cookie"
luaSharedDictsKey = "lua-shared-dicts"
- plugins = "plugins"
debugConnections = "debug-connections"
workerSerialReloads = "enable-serial-reloads"
)
@@ -416,11 +415,6 @@ func ReadConfig(src map[string]string) config.Configuration {
delete(conf, workerSerialReloads)
}
- if val, ok := conf[plugins]; ok {
- to.Plugins = splitAndTrimSpace(val, ",")
- delete(conf, plugins)
- }
-
if val, ok := conf[debugConnections]; ok {
delete(conf, debugConnections)
for _, i := range splitAndTrimSpace(val, ",") {
diff --git a/rootfs/etc/nginx/lua/plugins.lua b/rootfs/etc/nginx/lua/plugins.lua
deleted file mode 100644
index 55e208a32..000000000
--- a/rootfs/etc/nginx/lua/plugins.lua
+++ /dev/null
@@ -1,61 +0,0 @@
-local require = require
-local ngx = ngx
-local ipairs = ipairs
-local string_format = string.format
-local ngx_log = ngx.log
-local INFO = ngx.INFO
-local ERR = ngx.ERR
-local pcall = pcall
-
-local _M = {}
-local MAX_NUMBER_OF_PLUGINS = 20
-local plugins = {}
-
-local function load_plugin(name)
- local path = string_format("plugins.%s.main", name)
-
- local ok, plugin = pcall(require, path)
- if not ok then
- ngx_log(ERR, string_format("error loading plugin \"%s\": %s", path, plugin))
- return
- end
- local index = #plugins
- if (plugin.name == nil or plugin.name == '') then
- plugin.name = name
- end
- plugins[index + 1] = plugin
-end
-
-function _M.init(names)
- local count = 0
- for _, name in ipairs(names) do
- if count >= MAX_NUMBER_OF_PLUGINS then
- ngx_log(ERR, "the total number of plugins exceed the maximum number: ", MAX_NUMBER_OF_PLUGINS)
- break
- end
- load_plugin(name)
- count = count + 1 -- ignore loading failure, just count the total
- end
-end
-
-function _M.run()
- local phase = ngx.get_phase()
-
- for _, plugin in ipairs(plugins) do
- if plugin[phase] then
- ngx_log(INFO, string_format("running plugin \"%s\" in phase \"%s\"", plugin.name, phase))
-
- -- TODO: consider sandboxing this, should we?
- -- probably yes, at least prohibit plugin from accessing env vars etc
- -- but since the plugins are going to be installed by ingress-nginx
- -- operator they can be assumed to be safe also
- local ok, err = pcall(plugin[phase])
- if not ok then
- ngx_log(ERR, string_format("error while running plugin \"%s\" in phase \"%s\": %s",
- plugin.name, phase, err))
- end
- end
- end
-end
-
-return _M
diff --git a/rootfs/etc/nginx/lua/plugins/README.md b/rootfs/etc/nginx/lua/plugins/README.md
deleted file mode 100644
index 64f4912f0..000000000
--- a/rootfs/etc/nginx/lua/plugins/README.md
+++ /dev/null
@@ -1,36 +0,0 @@
-# Custom Lua plugins
-
-ingress-nginx uses [https://github.com/openresty/lua-nginx-module](https://github.com/openresty/lua-nginx-module) to run custom Lua code
-within Nginx workers. It is recommended to familiarize yourself with that ecosystem before deploying your custom Lua based ingress-nginx plugin.
-
-### Writing a plugin
-
-Every ingress-nginx Lua plugin is expected to have `main.lua` file and all of its dependencies.
-`main.lua` is the entry point of the plugin. The plugin manager uses convention over configuration
-strategy and automatically runs functions defined in `main.lua` in the corresponding Nginx phase based on their name.
-
-Nginx has different [request processing phases](https://nginx.org/en/docs/dev/development_guide.html#http_phases).
-By defining functions with the following names, you can run your custom Lua code in the corresponding Nginx phase:
-
- - `init_worker`: useful for initializing some data per Nginx worker process
- - `rewrite`: useful for modifying request, changing headers, redirection, dropping request, doing authentication etc
- - `header_filter`: this is called when backend response header is received, it is useful for modifying response headers
- - `body_filter`: this is called when response body is received, it is useful for logging response body
- - `log`: this is called when request processing is completed and a response is delivered to the client
-
-Check this [`hello_world`](https://github.com/kubernetes/ingress-nginx/tree/main/rootfs/etc/nginx/lua/plugins/hello_world) plugin as a simple example or refer to [OpenID Connect integration](https://github.com/ElvinEfendi/ingress-nginx-openidc/tree/master/rootfs/etc/nginx/lua/plugins/openidc) for more advanced usage.
-
-Do not forget to write tests for your plugin.
-
-### Installing a plugin
-
-There are two options:
-
- - mount your plugin into `/etc/nginx/lua/plugins/` in the ingress-nginx pod
- - build your own ingress-nginx image like it is done in the [example](https://github.com/ElvinEfendi/ingress-nginx-openidc/tree/master/rootfs/etc/nginx/lua/plugins/openidc) and install your plugin during image build
-
-Mounting is the quickest option.
-
-### Enabling plugins
-
-Once your plugin is ready you need to use [`plugins` configuration setting](https://kubernetes.github.io/ingress-nginx/user-guide/nginx-configuration/configmap/#plugins) to activate it. Let's say you want to activate `hello_world` and `open_idc` plugins, then you set `plugins` setting to `"hello_world, open_idc"`. _Note_ that the plugins will be executed in the given order.
diff --git a/rootfs/etc/nginx/lua/plugins/hello_world/main.lua b/rootfs/etc/nginx/lua/plugins/hello_world/main.lua
deleted file mode 100644
index 03316c3ee..000000000
--- a/rootfs/etc/nginx/lua/plugins/hello_world/main.lua
+++ /dev/null
@@ -1,13 +0,0 @@
-local ngx = ngx
-
-local _M = {}
-
-function _M.rewrite()
- local ua = ngx.var.http_user_agent
-
- if ua == "hello" then
- ngx.req.set_header("x-hello-world", "1")
- end
-end
-
-return _M
diff --git a/rootfs/etc/nginx/lua/plugins/hello_world/test/main_test.lua b/rootfs/etc/nginx/lua/plugins/hello_world/test/main_test.lua
deleted file mode 100644
index 5eda52259..000000000
--- a/rootfs/etc/nginx/lua/plugins/hello_world/test/main_test.lua
+++ /dev/null
@@ -1,24 +0,0 @@
-
-local main = require("plugins.hello_world.main")
-
--- The unit tests are run within a timer phase in a headless Nginx process.
--- Since `set_header` and `ngx.var.http_` API are disabled in this phase we have to stub it
--- to avoid `API disabled in the current context` error.
-
-describe("main", function()
- describe("rewrite", function()
- it("sets x-hello-world header to 1 when user agent is hello", function()
- ngx.var = { http_user_agent = "hello" }
- stub(ngx.req, "set_header")
- main.rewrite()
- assert.stub(ngx.req.set_header).was_called_with("x-hello-world", "1")
- end)
-
- it("does not set x-hello-world header to 1 when user agent is not hello", function()
- ngx.var = { http_user_agent = "not-hello" }
- stub(ngx.req, "set_header")
- main.rewrite()
- assert.stub(ngx.req.set_header).was_not_called_with("x-hello-world", "1")
- end)
- end)
-end)
diff --git a/rootfs/etc/nginx/lua/test/plugins_test.lua b/rootfs/etc/nginx/lua/test/plugins_test.lua
deleted file mode 100644
index d7f789d0f..000000000
--- a/rootfs/etc/nginx/lua/test/plugins_test.lua
+++ /dev/null
@@ -1,23 +0,0 @@
-describe("plugins", function()
- describe("#run", function()
- it("runs the plugins in the given order", function()
- ngx.get_phase = function() return "rewrite" end
- local plugins = require("plugins")
- local called_plugins = {}
- local plugins_to_mock = {"plugins.pluginfirst.main", "plugins.pluginsecond.main", "plugins.pluginthird.main"}
- for i=1, 3, 1
- do
- package.loaded[plugins_to_mock[i]] = {
- rewrite = function()
- called_plugins[#called_plugins + 1] = plugins_to_mock[i]
- end
- }
- end
- assert.has_no.errors(function()
- plugins.init({"pluginfirst", "pluginsecond", "pluginthird"})
- end)
- assert.has_no.errors(plugins.run)
- assert.are.same(plugins_to_mock, called_plugins)
- end)
- end)
-end)
\ No newline at end of file
diff --git a/rootfs/etc/nginx/template/nginx.tmpl b/rootfs/etc/nginx/template/nginx.tmpl
index 93a04e3e6..1c630bb4d 100644
--- a/rootfs/etc/nginx/template/nginx.tmpl
+++ b/rootfs/etc/nginx/template/nginx.tmpl
@@ -113,15 +113,6 @@ http {
certificate = res
certificate.is_ocsp_stapling_enabled = {{ $cfg.EnableOCSP }}
end
-
- ok, res = pcall(require, "plugins")
- if not ok then
- error("require failed: " .. tostring(res))
- else
- plugins = res
- end
- -- load all plugins that'll be used here
- plugins.init({ {{ range $idx, $plugin := $cfg.Plugins }}{{ if $idx }},{{ end }}{{ $plugin | quote }}{{ end }} })
}
init_worker_by_lua_block {
@@ -130,8 +121,6 @@ http {
{{ if $all.EnableMetrics }}
monitor.init_worker({{ $all.MonitorMaxBatchSize }})
{{ end }}
-
- plugins.run()
}
{{/* Enable the real_ip module only if we use either X-Forwarded headers or Proxy Protocol. */}}
@@ -1265,7 +1254,6 @@ stream {
rewrite_by_lua_block {
lua_ingress.rewrite({{ locationConfigForLua $location $all }})
balancer.rewrite()
- plugins.run()
}
# be careful with `access_by_lua_block` and `satisfy any` directives as satisfy any
@@ -1276,11 +1264,6 @@ stream {
header_filter_by_lua_block {
lua_ingress.header()
- plugins.run()
- }
-
- body_filter_by_lua_block {
- plugins.run()
}
log_by_lua_block {
@@ -1288,8 +1271,6 @@ stream {
{{ if $all.EnableMetrics }}
monitor.call()
{{ end }}
-
- plugins.run()
}
{{ if not $location.Logs.Access }}
diff --git a/test/data/cleanConf.expected.conf b/test/data/cleanConf.expected.conf
index 7c4a16824..9c0513b37 100644
--- a/test/data/cleanConf.expected.conf
+++ b/test/data/cleanConf.expected.conf
@@ -67,8 +67,6 @@ http {
balancer.init_worker()
monitor.init_worker(10000)
-
- plugins.run()
}
map $request_uri $loggable {
@@ -120,7 +118,6 @@ http {
use_port_in_redirects = false,
})
balancer.rewrite()
- plugins.run()
}
# be careful with `access_by_lua_block` and `satisfy any` directives as satisfy any
@@ -130,7 +127,6 @@ http {
header_filter_by_lua_block {
lua_ingress.header()
- plugins.run()
}
}
diff --git a/test/data/cleanConf.src.conf b/test/data/cleanConf.src.conf
index 89954cf0d..6da578106 100644
--- a/test/data/cleanConf.src.conf
+++ b/test/data/cleanConf.src.conf
@@ -86,11 +86,8 @@ lua_shared_dict ocsp_response_cache 5M;
init_worker_by_lua_block {
lua_ingress.init_worker()
balancer.init_worker()
-
- monitor.init_worker(10000)
-
- plugins.run()
+ monitor.init_worker(10000)
}
@@ -164,7 +161,6 @@ lua_shared_dict ocsp_response_cache 5M;
use_port_in_redirects = false,
})
balancer.rewrite()
- plugins.run()
}
# be careful with `access_by_lua_block` and `satisfy any` directives as satisfy any
@@ -174,7 +170,6 @@ lua_shared_dict ocsp_response_cache 5M;
header_filter_by_lua_block {
lua_ingress.header()
- plugins.run()
}
diff --git a/test/e2e/settings/plugins.go b/test/e2e/settings/plugins.go
deleted file mode 100644
index 659acd42c..000000000
--- a/test/e2e/settings/plugins.go
+++ /dev/null
@@ -1,55 +0,0 @@
-/*
-Copyright 2020 The Kubernetes Authors.
-
-Licensed under the Apache License, Version 2.0 (the "License");
-you may not use this file except in compliance with the License.
-You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
-Unless required by applicable law or agreed to in writing, software
-distributed under the License is distributed on an "AS IS" BASIS,
-WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-See the License for the specific language governing permissions and
-limitations under the License.
-*/
-
-package settings
-
-import (
- "fmt"
- "net/http"
- "strings"
-
- "github.com/onsi/ginkgo/v2"
- "k8s.io/ingress-nginx/test/e2e/framework"
-)
-
-var _ = framework.IngressNginxDescribe("plugins", func() {
- f := framework.NewDefaultFramework("plugins")
-
- ginkgo.BeforeEach(func() {
- f.NewEchoDeployment()
- })
-
- ginkgo.It("should exist a x-hello-world header", func() {
- f.UpdateNginxConfigMapData("plugins", "hello_world, invalid")
-
- host := "example.com"
- f.EnsureIngress(framework.NewSingleIngress(host, "/", host, f.Namespace, framework.EchoService, 80, nil))
-
- f.WaitForNginxConfiguration(
- func(server string) bool {
- return strings.Contains(server, fmt.Sprintf("server_name %v", host)) &&
- strings.Contains(server, `plugins.init({ "hello_world","invalid" })`)
- })
-
- f.HTTPTestClient().
- GET("/").
- WithHeader("Host", host).
- WithHeader("User-Agent", "hello").
- Expect().
- Status(http.StatusOK).
- Body().Contains("x-hello-world=1")
- })
-})
diff --git a/test/test-lua.sh b/test/test-lua.sh
index fc60023f8..1aff5f30c 100755
--- a/test/test-lua.sh
+++ b/test/test-lua.sh
@@ -41,7 +41,7 @@ SHDICT_ARGS=(
)
if [ $# -eq 0 ]; then
- resty "${SHDICT_ARGS[@]}" ./rootfs/etc/nginx/lua/test/ ./rootfs/etc/nginx/lua/plugins/**/test ${BUSTED_ARGS}
+ resty "${SHDICT_ARGS[@]}" ./rootfs/etc/nginx/lua/test/ ${BUSTED_ARGS}
else
resty "${SHDICT_ARGS[@]}" $@ ${BUSTED_ARGS}
fi
From b79551287e42ec15306fecc31f3d8dee23b7f840 Mon Sep 17 00:00:00 2001
From: Hen Itzhaki <44509873+HenItzhaki@users.noreply.github.com>
Date: Fri, 23 Aug 2024 01:39:20 +0300
Subject: [PATCH 196/283] docs: Add deployment for AWS NLB Proxy. (#9565)
Co-authored-by: HenItzhaki
---
.../deploy.yaml | 673 ++++++++++++++++++
.../kustomization.yaml | 11 +
2 files changed, 684 insertions(+)
create mode 100644 deploy/static/provider/aws/nlb-proxy-with-tls-termination/deploy.yaml
create mode 100644 deploy/static/provider/aws/nlb-proxy-with-tls-termination/kustomization.yaml
diff --git a/deploy/static/provider/aws/nlb-proxy-with-tls-termination/deploy.yaml b/deploy/static/provider/aws/nlb-proxy-with-tls-termination/deploy.yaml
new file mode 100644
index 000000000..5a3987875
--- /dev/null
+++ b/deploy/static/provider/aws/nlb-proxy-with-tls-termination/deploy.yaml
@@ -0,0 +1,673 @@
+apiVersion: v1
+kind: Namespace
+metadata:
+ labels:
+ app.kubernetes.io/instance: ingress-nginx
+ app.kubernetes.io/name: ingress-nginx
+ name: ingress-nginx
+---
+apiVersion: v1
+automountServiceAccountToken: true
+kind: ServiceAccount
+metadata:
+ labels:
+ app.kubernetes.io/component: controller
+ app.kubernetes.io/instance: ingress-nginx
+ app.kubernetes.io/name: ingress-nginx
+ app.kubernetes.io/part-of: ingress-nginx
+ app.kubernetes.io/version: 1.5.1
+ name: ingress-nginx
+ namespace: ingress-nginx
+---
+apiVersion: v1
+kind: ServiceAccount
+metadata:
+ labels:
+ app.kubernetes.io/component: admission-webhook
+ app.kubernetes.io/instance: ingress-nginx
+ app.kubernetes.io/name: ingress-nginx
+ app.kubernetes.io/part-of: ingress-nginx
+ app.kubernetes.io/version: 1.5.1
+ name: ingress-nginx-admission
+ namespace: ingress-nginx
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: Role
+metadata:
+ labels:
+ app.kubernetes.io/component: controller
+ app.kubernetes.io/instance: ingress-nginx
+ app.kubernetes.io/name: ingress-nginx
+ app.kubernetes.io/part-of: ingress-nginx
+ app.kubernetes.io/version: 1.5.1
+ name: ingress-nginx
+ namespace: ingress-nginx
+rules:
+- apiGroups:
+ - ""
+ resources:
+ - namespaces
+ verbs:
+ - get
+- apiGroups:
+ - ""
+ resources:
+ - configmaps
+ - pods
+ - secrets
+ - endpoints
+ verbs:
+ - get
+ - list
+ - watch
+- apiGroups:
+ - ""
+ resources:
+ - services
+ verbs:
+ - get
+ - list
+ - watch
+- apiGroups:
+ - networking.k8s.io
+ resources:
+ - ingresses
+ verbs:
+ - get
+ - list
+ - watch
+- apiGroups:
+ - networking.k8s.io
+ resources:
+ - ingresses/status
+ verbs:
+ - update
+- apiGroups:
+ - networking.k8s.io
+ resources:
+ - ingressclasses
+ verbs:
+ - get
+ - list
+ - watch
+- apiGroups:
+ - ""
+ resourceNames:
+ - ingress-nginx-leader
+ resources:
+ - configmaps
+ verbs:
+ - get
+ - update
+- apiGroups:
+ - ""
+ resources:
+ - configmaps
+ verbs:
+ - create
+- apiGroups:
+ - coordination.k8s.io
+ resourceNames:
+ - ingress-nginx-leader
+ resources:
+ - leases
+ verbs:
+ - get
+ - update
+- apiGroups:
+ - coordination.k8s.io
+ resources:
+ - leases
+ verbs:
+ - create
+- apiGroups:
+ - ""
+ resources:
+ - events
+ verbs:
+ - create
+ - patch
+- apiGroups:
+ - discovery.k8s.io
+ resources:
+ - endpointslices
+ verbs:
+ - list
+ - watch
+ - get
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: Role
+metadata:
+ labels:
+ app.kubernetes.io/component: admission-webhook
+ app.kubernetes.io/instance: ingress-nginx
+ app.kubernetes.io/name: ingress-nginx
+ app.kubernetes.io/part-of: ingress-nginx
+ app.kubernetes.io/version: 1.5.1
+ name: ingress-nginx-admission
+ namespace: ingress-nginx
+rules:
+- apiGroups:
+ - ""
+ resources:
+ - secrets
+ verbs:
+ - get
+ - create
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRole
+metadata:
+ labels:
+ app.kubernetes.io/instance: ingress-nginx
+ app.kubernetes.io/name: ingress-nginx
+ app.kubernetes.io/part-of: ingress-nginx
+ app.kubernetes.io/version: 1.5.1
+ name: ingress-nginx
+rules:
+- apiGroups:
+ - ""
+ resources:
+ - configmaps
+ - endpoints
+ - nodes
+ - pods
+ - secrets
+ - namespaces
+ verbs:
+ - list
+ - watch
+- apiGroups:
+ - coordination.k8s.io
+ resources:
+ - leases
+ verbs:
+ - list
+ - watch
+- apiGroups:
+ - ""
+ resources:
+ - nodes
+ verbs:
+ - get
+- apiGroups:
+ - ""
+ resources:
+ - services
+ verbs:
+ - get
+ - list
+ - watch
+- apiGroups:
+ - networking.k8s.io
+ resources:
+ - ingresses
+ verbs:
+ - get
+ - list
+ - watch
+- apiGroups:
+ - ""
+ resources:
+ - events
+ verbs:
+ - create
+ - patch
+- apiGroups:
+ - networking.k8s.io
+ resources:
+ - ingresses/status
+ verbs:
+ - update
+- apiGroups:
+ - networking.k8s.io
+ resources:
+ - ingressclasses
+ verbs:
+ - get
+ - list
+ - watch
+- apiGroups:
+ - discovery.k8s.io
+ resources:
+ - endpointslices
+ verbs:
+ - list
+ - watch
+ - get
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRole
+metadata:
+ labels:
+ app.kubernetes.io/component: admission-webhook
+ app.kubernetes.io/instance: ingress-nginx
+ app.kubernetes.io/name: ingress-nginx
+ app.kubernetes.io/part-of: ingress-nginx
+ app.kubernetes.io/version: 1.5.1
+ name: ingress-nginx-admission
+rules:
+- apiGroups:
+ - admissionregistration.k8s.io
+ resources:
+ - validatingwebhookconfigurations
+ verbs:
+ - get
+ - update
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: RoleBinding
+metadata:
+ labels:
+ app.kubernetes.io/component: controller
+ app.kubernetes.io/instance: ingress-nginx
+ app.kubernetes.io/name: ingress-nginx
+ app.kubernetes.io/part-of: ingress-nginx
+ app.kubernetes.io/version: 1.5.1
+ name: ingress-nginx
+ namespace: ingress-nginx
+roleRef:
+ apiGroup: rbac.authorization.k8s.io
+ kind: Role
+ name: ingress-nginx
+subjects:
+- kind: ServiceAccount
+ name: ingress-nginx
+ namespace: ingress-nginx
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: RoleBinding
+metadata:
+ labels:
+ app.kubernetes.io/component: admission-webhook
+ app.kubernetes.io/instance: ingress-nginx
+ app.kubernetes.io/name: ingress-nginx
+ app.kubernetes.io/part-of: ingress-nginx
+ app.kubernetes.io/version: 1.5.1
+ name: ingress-nginx-admission
+ namespace: ingress-nginx
+roleRef:
+ apiGroup: rbac.authorization.k8s.io
+ kind: Role
+ name: ingress-nginx-admission
+subjects:
+- kind: ServiceAccount
+ name: ingress-nginx-admission
+ namespace: ingress-nginx
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRoleBinding
+metadata:
+ labels:
+ app.kubernetes.io/instance: ingress-nginx
+ app.kubernetes.io/name: ingress-nginx
+ app.kubernetes.io/part-of: ingress-nginx
+ app.kubernetes.io/version: 1.5.1
+ name: ingress-nginx
+roleRef:
+ apiGroup: rbac.authorization.k8s.io
+ kind: ClusterRole
+ name: ingress-nginx
+subjects:
+- kind: ServiceAccount
+ name: ingress-nginx
+ namespace: ingress-nginx
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRoleBinding
+metadata:
+ labels:
+ app.kubernetes.io/component: admission-webhook
+ app.kubernetes.io/instance: ingress-nginx
+ app.kubernetes.io/name: ingress-nginx
+ app.kubernetes.io/part-of: ingress-nginx
+ app.kubernetes.io/version: 1.5.1
+ name: ingress-nginx-admission
+roleRef:
+ apiGroup: rbac.authorization.k8s.io
+ kind: ClusterRole
+ name: ingress-nginx-admission
+subjects:
+- kind: ServiceAccount
+ name: ingress-nginx-admission
+ namespace: ingress-nginx
+---
+apiVersion: v1
+data:
+ allow-snippet-annotations: "true"
+ proxy-body-size: "8m"
+ ssl-redirect: "false"
+ use-forwarded-headers: "true"
+ compute-full-forwarded-for: "true"
+ use-proxy-protocol: "true" # No modify X-Forwarded-* HTTPS from NLB TLS.
+ force-ssl-redirect: "true" # Redirect HTTP -> HTTPS.
+
+kind: ConfigMap
+metadata:
+ labels:
+ app.kubernetes.io/component: controller
+ app.kubernetes.io/instance: ingress-nginx
+ app.kubernetes.io/name: ingress-nginx
+ app.kubernetes.io/part-of: ingress-nginx
+ app.kubernetes.io/version: 1.5.1
+ name: ingress-nginx-controller
+ namespace: ingress-nginx
+---
+apiVersion: v1
+kind: Service
+metadata:
+ annotations:
+ service.beta.kubernetes.io/aws-load-balancer-type: "external"
+ service.beta.kubernetes.io/aws-load-balancer-backend-protocol: "tcp"
+ service.beta.kubernetes.io/aws-load-balancer-nlb-target-type: "ip"
+ service.beta.kubernetes.io/aws-load-balancer-scheme: "internet-facing"
+ service.beta.kubernetes.io/aws-load-balancer-proxy-protocol: "*"
+ service.beta.kubernetes.io/aws-load-balancer-ssl-cert: "arn:aws:acm:us-west-2:XXXXXXXX:certificate/XXXXXX-XXXXXXX-XXXXXXX-XXXXXXXX"
+ service.beta.kubernetes.io/aws-load-balancer-ssl-ports: "443"
+ labels:
+ app.kubernetes.io/component: controller
+ app.kubernetes.io/instance: ingress-nginx
+ app.kubernetes.io/name: ingress-nginx
+ app.kubernetes.io/part-of: ingress-nginx
+ app.kubernetes.io/version: 1.5.1
+ name: ingress-nginx-controller
+ namespace: ingress-nginx
+spec:
+ externalTrafficPolicy: Local
+ ipFamilies:
+ - IPv4
+ ipFamilyPolicy: SingleStack
+ ports:
+ - appProtocol: http
+ name: http
+ port: 80
+ protocol: TCP
+ targetPort: http
+ - appProtocol: https
+ name: https
+ port: 443
+ protocol: TCP
+ targetPort: https
+ selector:
+ app.kubernetes.io/component: controller
+ app.kubernetes.io/instance: ingress-nginx
+ app.kubernetes.io/name: ingress-nginx
+ type: LoadBalancer
+---
+apiVersion: v1
+kind: Service
+metadata:
+ labels:
+ app.kubernetes.io/component: controller
+ app.kubernetes.io/instance: ingress-nginx
+ app.kubernetes.io/name: ingress-nginx
+ app.kubernetes.io/part-of: ingress-nginx
+ app.kubernetes.io/version: 1.5.1
+ name: ingress-nginx-controller-admission
+ namespace: ingress-nginx
+spec:
+ ports:
+ - appProtocol: https
+ name: https-webhook
+ port: 443
+ targetPort: webhook
+ selector:
+ app.kubernetes.io/component: controller
+ app.kubernetes.io/instance: ingress-nginx
+ app.kubernetes.io/name: ingress-nginx
+ type: ClusterIP
+---
+apiVersion: apps/v1
+kind: Deployment
+metadata:
+ labels:
+ app.kubernetes.io/component: controller
+ app.kubernetes.io/instance: ingress-nginx
+ app.kubernetes.io/name: ingress-nginx
+ app.kubernetes.io/part-of: ingress-nginx
+ app.kubernetes.io/version: 1.5.1
+ name: ingress-nginx-controller
+ namespace: ingress-nginx
+spec:
+ minReadySeconds: 0
+ revisionHistoryLimit: 10
+ selector:
+ matchLabels:
+ app.kubernetes.io/component: controller
+ app.kubernetes.io/instance: ingress-nginx
+ app.kubernetes.io/name: ingress-nginx
+ template:
+ metadata:
+ labels:
+ app.kubernetes.io/component: controller
+ app.kubernetes.io/instance: ingress-nginx
+ app.kubernetes.io/name: ingress-nginx
+ spec:
+ containers:
+ - args:
+ - /nginx-ingress-controller
+ - --publish-service=$(POD_NAMESPACE)/ingress-nginx-controller
+ - --election-id=ingress-nginx-leader
+ - --controller-class=k8s.io/ingress-nginx
+ - --ingress-class=nginx
+ - --configmap=$(POD_NAMESPACE)/ingress-nginx-controller
+ - --validating-webhook=:8443
+ - --validating-webhook-certificate=/usr/local/certificates/cert
+ - --validating-webhook-key=/usr/local/certificates/key
+ env:
+ - name: POD_NAME
+ valueFrom:
+ fieldRef:
+ fieldPath: metadata.name
+ - name: POD_NAMESPACE
+ valueFrom:
+ fieldRef:
+ fieldPath: metadata.namespace
+ - name: LD_PRELOAD
+ value: /usr/local/lib/libmimalloc.so
+ image: registry.k8s.io/ingress-nginx/controller:v1.5.1@sha256:4ba73c697770664c1e00e9f968de14e08f606ff961c76e5d7033a4a9c593c629
+ imagePullPolicy: IfNotPresent
+ lifecycle:
+ preStop:
+ exec:
+ command:
+ - /wait-shutdown
+ livenessProbe:
+ failureThreshold: 5
+ httpGet:
+ path: /healthz
+ port: 10254
+ scheme: HTTP
+ initialDelaySeconds: 10
+ periodSeconds: 10
+ successThreshold: 1
+ timeoutSeconds: 1
+ name: controller
+ ports:
+ - containerPort: 80
+ name: http
+ protocol: TCP
+ - containerPort: 443
+ name: https
+ protocol: TCP
+ - containerPort: 8443
+ name: webhook
+ protocol: TCP
+ readinessProbe:
+ failureThreshold: 3
+ httpGet:
+ path: /healthz
+ port: 10254
+ scheme: HTTP
+ initialDelaySeconds: 10
+ periodSeconds: 10
+ successThreshold: 1
+ timeoutSeconds: 1
+ resources:
+ requests:
+ cpu: 100m
+ memory: 90Mi
+ securityContext:
+ allowPrivilegeEscalation: true
+ capabilities:
+ add:
+ - NET_BIND_SERVICE
+ drop:
+ - ALL
+ runAsUser: 101
+ volumeMounts:
+ - mountPath: /usr/local/certificates/
+ name: webhook-cert
+ readOnly: true
+ dnsPolicy: ClusterFirst
+ nodeSelector:
+ kubernetes.io/os: linux
+ serviceAccountName: ingress-nginx
+ terminationGracePeriodSeconds: 300
+ volumes:
+ - name: webhook-cert
+ secret:
+ secretName: ingress-nginx-admission
+---
+apiVersion: batch/v1
+kind: Job
+metadata:
+ labels:
+ app.kubernetes.io/component: admission-webhook
+ app.kubernetes.io/instance: ingress-nginx
+ app.kubernetes.io/name: ingress-nginx
+ app.kubernetes.io/part-of: ingress-nginx
+ app.kubernetes.io/version: 1.5.1
+ name: ingress-nginx-admission-create
+ namespace: ingress-nginx
+spec:
+ template:
+ metadata:
+ labels:
+ app.kubernetes.io/component: admission-webhook
+ app.kubernetes.io/instance: ingress-nginx
+ app.kubernetes.io/name: ingress-nginx
+ app.kubernetes.io/part-of: ingress-nginx
+ app.kubernetes.io/version: 1.5.1
+ name: ingress-nginx-admission-create
+ spec:
+ containers:
+ - args:
+ - create
+ - --host=ingress-nginx-controller-admission,ingress-nginx-controller-admission.$(POD_NAMESPACE).svc
+ - --namespace=$(POD_NAMESPACE)
+ - --secret-name=ingress-nginx-admission
+ env:
+ - name: POD_NAMESPACE
+ valueFrom:
+ fieldRef:
+ fieldPath: metadata.namespace
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v20220916-gd32f8c343@sha256:39c5b2e3310dc4264d638ad28d9d1d96c4cbb2b2dcfb52368fe4e3c63f61e10f
+ imagePullPolicy: IfNotPresent
+ name: create
+ securityContext:
+ allowPrivilegeEscalation: false
+ nodeSelector:
+ kubernetes.io/os: linux
+ restartPolicy: OnFailure
+ securityContext:
+ fsGroup: 2000
+ runAsNonRoot: true
+ runAsUser: 2000
+ serviceAccountName: ingress-nginx-admission
+---
+apiVersion: batch/v1
+kind: Job
+metadata:
+ labels:
+ app.kubernetes.io/component: admission-webhook
+ app.kubernetes.io/instance: ingress-nginx
+ app.kubernetes.io/name: ingress-nginx
+ app.kubernetes.io/part-of: ingress-nginx
+ app.kubernetes.io/version: 1.5.1
+ name: ingress-nginx-admission-patch
+ namespace: ingress-nginx
+spec:
+ template:
+ metadata:
+ labels:
+ app.kubernetes.io/component: admission-webhook
+ app.kubernetes.io/instance: ingress-nginx
+ app.kubernetes.io/name: ingress-nginx
+ app.kubernetes.io/part-of: ingress-nginx
+ app.kubernetes.io/version: 1.5.1
+ name: ingress-nginx-admission-patch
+ spec:
+ containers:
+ - args:
+ - patch
+ - --webhook-name=ingress-nginx-admission
+ - --namespace=$(POD_NAMESPACE)
+ - --patch-mutating=false
+ - --secret-name=ingress-nginx-admission
+ - --patch-failure-policy=Fail
+ env:
+ - name: POD_NAMESPACE
+ valueFrom:
+ fieldRef:
+ fieldPath: metadata.namespace
+ image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v20220916-gd32f8c343@sha256:39c5b2e3310dc4264d638ad28d9d1d96c4cbb2b2dcfb52368fe4e3c63f61e10f
+ imagePullPolicy: IfNotPresent
+ name: patch
+ securityContext:
+ allowPrivilegeEscalation: false
+ nodeSelector:
+ kubernetes.io/os: linux
+ restartPolicy: OnFailure
+ securityContext:
+ fsGroup: 2000
+ runAsNonRoot: true
+ runAsUser: 2000
+ serviceAccountName: ingress-nginx-admission
+---
+apiVersion: networking.k8s.io/v1
+kind: IngressClass
+metadata:
+ labels:
+ app.kubernetes.io/component: controller
+ app.kubernetes.io/instance: ingress-nginx
+ app.kubernetes.io/name: ingress-nginx
+ app.kubernetes.io/part-of: ingress-nginx
+ app.kubernetes.io/version: 1.5.1
+ name: nginx
+spec:
+ controller: k8s.io/ingress-nginx
+---
+apiVersion: admissionregistration.k8s.io/v1
+kind: ValidatingWebhookConfiguration
+metadata:
+ labels:
+ app.kubernetes.io/component: admission-webhook
+ app.kubernetes.io/instance: ingress-nginx
+ app.kubernetes.io/name: ingress-nginx
+ app.kubernetes.io/part-of: ingress-nginx
+ app.kubernetes.io/version: 1.5.1
+ name: ingress-nginx-admission
+webhooks:
+- admissionReviewVersions:
+ - v1
+ clientConfig:
+ service:
+ name: ingress-nginx-controller-admission
+ namespace: ingress-nginx
+ path: /networking/v1/ingresses
+ failurePolicy: Fail
+ matchPolicy: Equivalent
+ name: validate.nginx.ingress.kubernetes.io
+ rules:
+ - apiGroups:
+ - networking.k8s.io
+ apiVersions:
+ - v1
+ operations:
+ - CREATE
+ - UPDATE
+ resources:
+ - ingresses
+ sideEffects: None
diff --git a/deploy/static/provider/aws/nlb-proxy-with-tls-termination/kustomization.yaml b/deploy/static/provider/aws/nlb-proxy-with-tls-termination/kustomization.yaml
new file mode 100644
index 000000000..51c1513c9
--- /dev/null
+++ b/deploy/static/provider/aws/nlb-proxy-with-tls-termination/kustomization.yaml
@@ -0,0 +1,11 @@
+# NOTE: kustomize is not supported. This file exists only to be able to reference it from bases.
+# https://kubectl.docs.kubernetes.io/references/kustomize/bases/
+#
+# ```
+# namespace: ingress-nginx
+# bases:
+# - github.com/kubernetes/ingress-nginx/tree/main/deploy/static/provider/aws/nlb-with-tls-termination
+# ```
+
+resources:
+ - deploy.yaml
From 7b4e4e2fa15f3d06e460c1b1c944a0c6a68f35e8 Mon Sep 17 00:00:00 2001
From: Ricardo Katz
Date: Fri, 23 Aug 2024 00:45:51 -0300
Subject: [PATCH 197/283] Enable security features by default (#11819)
---
.github/workflows/ci.yaml | 21 +-----
.github/workflows/zz-tmpl-k8s-e2e.yaml | 1 -
charts/ingress-nginx/README.md | 2 +-
charts/ingress-nginx/values.yaml | 2 +-
docs/user-guide/cli-arguments.md | 2 +-
internal/ingress/controller/config/config.go | 6 +-
pkg/flags/flags.go | 2 +-
test/e2e/admission/admission.go | 30 ++------
test/e2e/annotations/auth.go | 21 +-----
test/e2e/annotations/fromtowwwredirect.go | 10 +--
test/e2e/annotations/grpc.go | 10 +--
.../annotations/modsecurity/modsecurity.go | 75 ++++++-------------
test/e2e/annotations/serversnippet.go | 25 +------
test/e2e/annotations/snippet.go | 13 +---
test/e2e/annotations/streamsnippet.go | 10 +--
test/e2e/framework/exec.go | 6 +-
test/e2e/framework/framework.go | 14 ++++
test/e2e/ingress/multiple_rules.go | 10 +--
test/e2e/ingress/pathtype_exact.go | 10 +--
test/e2e/ingress/pathtype_mixed.go | 10 +--
test/e2e/run-e2e-suite.sh | 1 -
test/e2e/run-kind-e2e.sh | 1 -
test/e2e/settings/badannotationvalues.go | 43 +++--------
test/e2e/settings/geoip2.go | 12 +--
test/e2e/settings/proxy_host.go | 13 ++--
test/e2e/settings/server_snippet.go | 4 +
test/e2e/settings/validations/validations.go | 8 +-
test/e2e/wait-for-nginx.sh | 3 +-
28 files changed, 103 insertions(+), 262 deletions(-)
diff --git a/.github/workflows/ci.yaml b/.github/workflows/ci.yaml
index 49b39a7a3..d240181c3 100644
--- a/.github/workflows/ci.yaml
+++ b/.github/workflows/ci.yaml
@@ -258,7 +258,7 @@ jobs:
strategy:
matrix:
- k8s: [v1.26.15, v1.27.13, v1.28.9, v1.29.4, v1.30.0]
+ k8s: [v1.28.13, v1.29.8, v1.30.4, v1.31.0]
steps:
- name: Checkout
@@ -309,26 +309,11 @@ jobs:
(needs.changes.outputs.go == 'true') || (needs.changes.outputs.baseimage == 'true') || ${{ github.event.workflow_dispatch.run_e2e == 'true' }}
strategy:
matrix:
- k8s: [v1.26.15, v1.27.13, v1.28.9, v1.29.4, v1.30.0]
+ k8s: [v1.28.13, v1.29.8, v1.30.4, v1.31.0]
uses: ./.github/workflows/zz-tmpl-k8s-e2e.yaml
with:
k8s-version: ${{ matrix.k8s }}
- kubernetes-validations:
- name: Kubernetes with Validations
- needs:
- - changes
- - build
- if: |
- (needs.changes.outputs.go == 'true') || (needs.changes.outputs.baseimage == 'true') || ${{ github.event.workflow_dispatch.run_e2e == 'true' }}
- strategy:
- matrix:
- k8s: [v1.26.15, v1.27.13, v1.28.9, v1.29.4, v1.30.0]
- uses: ./.github/workflows/zz-tmpl-k8s-e2e.yaml
- with:
- k8s-version: ${{ matrix.k8s }}
- variation: "VALIDATIONS"
-
kubernetes-chroot:
name: Kubernetes chroot
needs:
@@ -338,7 +323,7 @@ jobs:
(needs.changes.outputs.go == 'true') || (needs.changes.outputs.baseimage == 'true') || ${{ github.event.workflow_dispatch.run_e2e == 'true' }}
strategy:
matrix:
- k8s: [v1.26.15, v1.27.13, v1.28.9, v1.29.4, v1.30.0]
+ k8s: [v1.28.13, v1.29.8, v1.30.4, v1.31.0]
uses: ./.github/workflows/zz-tmpl-k8s-e2e.yaml
with:
k8s-version: ${{ matrix.k8s }}
diff --git a/.github/workflows/zz-tmpl-k8s-e2e.yaml b/.github/workflows/zz-tmpl-k8s-e2e.yaml
index adf1dc0e8..7ab75feab 100644
--- a/.github/workflows/zz-tmpl-k8s-e2e.yaml
+++ b/.github/workflows/zz-tmpl-k8s-e2e.yaml
@@ -43,7 +43,6 @@ jobs:
SKIP_CLUSTER_CREATION: true
SKIP_INGRESS_IMAGE_CREATION: true
SKIP_E2E_IMAGE_CREATION: true
- ENABLE_VALIDATIONS: ${{ inputs.variation == 'VALIDATIONS' }}
IS_CHROOT: ${{ inputs.variation == 'CHROOT' }}
run: |
kind get kubeconfig > $HOME/.kube/kind-config-kind
diff --git a/charts/ingress-nginx/README.md b/charts/ingress-nginx/README.md
index c1d1dfb66..f69d2951b 100644
--- a/charts/ingress-nginx/README.md
+++ b/charts/ingress-nginx/README.md
@@ -304,7 +304,7 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
| controller.dnsPolicy | string | `"ClusterFirst"` | Optionally change this to ClusterFirstWithHostNet in case you have 'hostNetwork: true'. By default, while using host network, name resolution uses the host's DNS. If you wish nginx-controller to keep resolving names inside the k8s network, use ClusterFirstWithHostNet. |
| controller.electionID | string | `""` | Election ID to use for status update, by default it uses the controller name combined with a suffix of 'leader' |
| controller.electionTTL | string | `""` | Duration a leader election is valid before it's getting re-elected, e.g. `15s`, `10m` or `1h`. (Default: 30s) |
-| controller.enableAnnotationValidations | bool | `false` | |
+| controller.enableAnnotationValidations | bool | `true` | |
| controller.enableMimalloc | bool | `true` | Enable mimalloc as a drop-in replacement for malloc. # ref: https://github.com/microsoft/mimalloc # |
| controller.enableTopologyAwareRouting | bool | `false` | This configuration enables Topology Aware Routing feature, used together with service annotation service.kubernetes.io/topology-mode="auto" Defaults to false |
| controller.existingPsp | string | `""` | Use an existing PSP instead of creating one |
diff --git a/charts/ingress-nginx/values.yaml b/charts/ingress-nginx/values.yaml
index 55d6c9a92..89cb718c4 100644
--- a/charts/ingress-nginx/values.yaml
+++ b/charts/ingress-nginx/values.yaml
@@ -17,7 +17,7 @@ commonLabels: {}
controller:
name: controller
- enableAnnotationValidations: false
+ enableAnnotationValidations: true
image:
## Keep false as default for now!
chroot: false
diff --git a/docs/user-guide/cli-arguments.md b/docs/user-guide/cli-arguments.md
index f8fdc2ddb..8ada854bf 100644
--- a/docs/user-guide/cli-arguments.md
+++ b/docs/user-guide/cli-arguments.md
@@ -15,7 +15,7 @@ They are set in the container spec of the `ingress-nginx-controller` Deployment
| `--default-backend-service` | Service used to serve HTTP requests not matching any known server name (catch-all). Takes the form "namespace/name". The controller configures NGINX to forward requests to the first port of this Service. |
| `--default-server-port` | Port to use for exposing the default server (catch-all). (default 8181) |
| `--default-ssl-certificate` | Secret containing a SSL certificate to be used by the default HTTPS server (catch-all). Takes the form "namespace/name". |
-| `--enable-annotation-validation` | If true, will enable the annotation validation feature. This value will be defaulted to true on a future release. |
+| `--enable-annotation-validation` | If true, will enable the annotation validation feature. Defaults to true |
| `--disable-catch-all` | Disable support for catch-all Ingresses. (default false) |
| `--disable-full-test` | Disable full test of all merged ingresses at the admission stage and tests the template of the ingress being created or updated (full test of all ingresses is enabled by default). |
| `--disable-svc-external-name` | Disable support for Services of type ExternalName. (default false) |
diff --git a/internal/ingress/controller/config/config.go b/internal/ingress/controller/config/config.go
index 337cb9e86..63029bbbe 100644
--- a/internal/ingress/controller/config/config.go
+++ b/internal/ingress/controller/config/config.go
@@ -776,10 +776,10 @@ func NewDefault() Configuration {
cfg := Configuration{
AllowSnippetAnnotations: false,
- AllowCrossNamespaceResources: true,
+ AllowCrossNamespaceResources: false,
AllowBackendServerHeader: false,
AnnotationValueWordBlocklist: "",
- AnnotationsRiskLevel: "Critical",
+ AnnotationsRiskLevel: "High",
AccessLogPath: "/var/log/nginx/access.log",
AccessLogParams: "",
EnableAccessLogForDefaultBackend: false,
@@ -924,7 +924,7 @@ func NewDefault() Configuration {
GlobalRateLimitMemcachedPoolSize: 50,
GlobalRateLimitStatusCode: 429,
DebugConnections: []string{},
- StrictValidatePathType: false, // TODO: This will be true in future releases
+ StrictValidatePathType: true,
GRPCBufferSizeKb: 0,
}
diff --git a/pkg/flags/flags.go b/pkg/flags/flags.go
index 5891f636b..aed7d5c9a 100644
--- a/pkg/flags/flags.go
+++ b/pkg/flags/flags.go
@@ -158,7 +158,7 @@ Requires the update-status parameter.`)
annotationsPrefix = flags.String("annotations-prefix", parser.DefaultAnnotationsPrefix,
`Prefix of the Ingress annotations specific to the NGINX controller.`)
- enableAnnotationValidation = flags.Bool("enable-annotation-validation", false,
+ enableAnnotationValidation = flags.Bool("enable-annotation-validation", true,
`If true, will enable the annotation validation feature. This value will be defaulted to true on a future release`)
enableSSLChainCompletion = flags.Bool("enable-ssl-chain-completion", false,
diff --git a/test/e2e/admission/admission.go b/test/e2e/admission/admission.go
index c41105e2d..124e1784d 100644
--- a/test/e2e/admission/admission.go
+++ b/test/e2e/admission/admission.go
@@ -127,14 +127,8 @@ var _ = framework.IngressNginxDescribeSerial("[Admission] admission controller",
})
ginkgo.It("should return an error if there is an error validating the ingress definition", func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "true",
- })
- defer func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "false",
- })
- }()
+ disableSnippet := f.AllowSnippetConfiguration()
+ defer disableSnippet()
host := admissionTestHost
@@ -241,14 +235,8 @@ var _ = framework.IngressNginxDescribeSerial("[Admission] admission controller",
})
ginkgo.It("should return an error if the Ingress V1 definition contains invalid annotations", func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "true",
- })
- defer func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "false",
- })
- }()
+ disableSnippet := f.AllowSnippetConfiguration()
+ defer disableSnippet()
out, err := createIngress(f.Namespace, invalidV1Ingress)
assert.Empty(ginkgo.GinkgoT(), out)
@@ -261,14 +249,8 @@ var _ = framework.IngressNginxDescribeSerial("[Admission] admission controller",
})
ginkgo.It("should not return an error for an invalid Ingress when it has unknown class", func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "true",
- })
- defer func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "false",
- })
- }()
+ disableSnippet := f.AllowSnippetConfiguration()
+ defer disableSnippet()
out, err := createIngress(f.Namespace, invalidV1IngressWithOtherClass)
assert.Equal(ginkgo.GinkgoT(), "ingress.networking.k8s.io/extensions-invalid-other created\n", out)
assert.Nil(ginkgo.GinkgoT(), err, "creating an invalid ingress with unknown class using kubectl")
diff --git a/test/e2e/annotations/auth.go b/test/e2e/annotations/auth.go
index ea33fdf32..01c14be39 100644
--- a/test/e2e/annotations/auth.go
+++ b/test/e2e/annotations/auth.go
@@ -277,14 +277,8 @@ var _ = framework.DescribeAnnotation("auth-*", func() {
"nginx.ingress.kubernetes.io/auth-snippet": `
proxy_set_header My-Custom-Header 42;`,
}
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "true",
- })
- defer func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "false",
- })
- }()
+ disableSnippet := f.AllowSnippetConfiguration()
+ defer disableSnippet()
ing := framework.NewSingleIngress(host, "/", host, f.Namespace, framework.EchoService, 80, annotations)
f.EnsureIngress(ing)
@@ -297,15 +291,8 @@ var _ = framework.DescribeAnnotation("auth-*", func() {
ginkgo.It(`should not set snippet "proxy_set_header My-Custom-Header 42;" when external auth is not configured`, func() {
host := authHost
-
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "true",
- })
- defer func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "false",
- })
- }()
+ disableSnippet := f.AllowSnippetConfiguration()
+ defer disableSnippet()
annotations := map[string]string{
"nginx.ingress.kubernetes.io/auth-snippet": `
diff --git a/test/e2e/annotations/fromtowwwredirect.go b/test/e2e/annotations/fromtowwwredirect.go
index b69cce93e..f578963ed 100644
--- a/test/e2e/annotations/fromtowwwredirect.go
+++ b/test/e2e/annotations/fromtowwwredirect.go
@@ -62,14 +62,8 @@ var _ = framework.DescribeAnnotation("from-to-www-redirect", func() {
})
ginkgo.It("should redirect from www HTTPS to HTTPS", func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "true",
- })
- defer func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "false",
- })
- }()
+ disableSnippet := f.AllowSnippetConfiguration()
+ defer disableSnippet()
ginkgo.By("setting up server for redirect from www")
diff --git a/test/e2e/annotations/grpc.go b/test/e2e/annotations/grpc.go
index 530d16729..2a9c5a983 100644
--- a/test/e2e/annotations/grpc.go
+++ b/test/e2e/annotations/grpc.go
@@ -193,14 +193,8 @@ var _ = framework.DescribeAnnotation("backend-protocol - GRPC", func() {
ginkgo.It("should return OK for service with backend protocol GRPCS", func() {
f.NewGRPCBinDeployment()
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "true",
- })
- defer func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "false",
- })
- }()
+ disableSnippet := f.AllowSnippetConfiguration()
+ defer disableSnippet()
host := echoHost
diff --git a/test/e2e/annotations/modsecurity/modsecurity.go b/test/e2e/annotations/modsecurity/modsecurity.go
index a3e7d80ba..730fc76e7 100644
--- a/test/e2e/annotations/modsecurity/modsecurity.go
+++ b/test/e2e/annotations/modsecurity/modsecurity.go
@@ -100,14 +100,8 @@ var _ = framework.DescribeAnnotation("modsecurity owasp", func() {
})
ginkgo.It("should enable modsecurity with snippet", func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "true",
- })
- defer func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "false",
- })
- }()
+ disableSnippet := f.AllowSnippetConfiguration()
+ defer disableSnippet()
host := modSecurityFooHost
nameSpace := f.Namespace
@@ -173,14 +167,8 @@ var _ = framework.DescribeAnnotation("modsecurity owasp", func() {
})
ginkgo.It("should enable modsecurity with snippet and block requests", func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "true",
- })
- defer func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "false",
- })
- }()
+ disableSnippet := f.AllowSnippetConfiguration()
+ defer disableSnippet()
host := modSecurityFooHost
nameSpace := f.Namespace
@@ -212,14 +200,8 @@ var _ = framework.DescribeAnnotation("modsecurity owasp", func() {
})
ginkgo.It("should enable modsecurity globally and with modsecurity-snippet block requests", func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "true",
- })
- defer func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "false",
- })
- }()
+ disableSnippet := f.AllowSnippetConfiguration()
+ defer disableSnippet()
host := modSecurityFooHost
nameSpace := f.Namespace
@@ -251,16 +233,11 @@ var _ = framework.DescribeAnnotation("modsecurity owasp", func() {
})
ginkgo.It("should enable modsecurity when enable-owasp-modsecurity-crs is set to true", func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "true",
- "enable-modsecurity": "true",
- "enable-owasp-modsecurity-crs": "true",
- })
- defer func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "false",
- })
- }()
+ disableSnippet := f.AllowSnippetConfiguration()
+ defer disableSnippet()
+
+ f.UpdateNginxConfigMapData("enable-modsecurity", "true")
+ f.UpdateNginxConfigMapData("enable-owasp-modsecurity-crs", "true")
host := modSecurityFooHost
nameSpace := f.Namespace
@@ -290,6 +267,8 @@ var _ = framework.DescribeAnnotation("modsecurity owasp", func() {
})
ginkgo.It("should enable modsecurity through the config map", func() {
+ disableSnippet := f.AllowSnippetConfiguration()
+ defer disableSnippet()
host := modSecurityFooHost
nameSpace := f.Namespace
@@ -310,17 +289,9 @@ var _ = framework.DescribeAnnotation("modsecurity owasp", func() {
f.EnsureIngress(ing)
expectedComment := "SecRuleEngine On"
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "true",
- "enable-modsecurity": "true",
- "enable-owasp-modsecurity-crs": "true",
- "modsecurity-snippet": expectedComment,
- })
- defer func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "false",
- })
- }()
+ f.UpdateNginxConfigMapData("enable-modsecurity", "true")
+ f.UpdateNginxConfigMapData("enable-owasp-modsecurity-crs", "true")
+ f.UpdateNginxConfigMapData("modsecurity-snippet", expectedComment)
f.WaitForNginxServer(host,
func(server string) bool {
@@ -339,6 +310,9 @@ var _ = framework.DescribeAnnotation("modsecurity owasp", func() {
host := modSecurityFooHost
nameSpace := f.Namespace
+ f.UpdateNginxConfigMapData("annotations-risk-level", "Critical") // To enable snippet configurations
+ defer f.UpdateNginxConfigMapData("annotations-risk-level", "High")
+
snippet := `SecRequestBodyAccess On
SecAuditEngine RelevantOnly
SecAuditLogParts ABIJDEFHZ
@@ -378,14 +352,9 @@ var _ = framework.DescribeAnnotation("modsecurity owasp", func() {
})
ginkgo.It("should disable default modsecurity conf setting when modsecurity-snippet is specified", func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "true",
- })
- defer func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "false",
- })
- }()
+ disableSnippet := f.AllowSnippetConfiguration()
+ defer disableSnippet()
+
host := modSecurityFooHost
nameSpace := f.Namespace
diff --git a/test/e2e/annotations/serversnippet.go b/test/e2e/annotations/serversnippet.go
index 1195b728a..c94960a3d 100644
--- a/test/e2e/annotations/serversnippet.go
+++ b/test/e2e/annotations/serversnippet.go
@@ -33,14 +33,8 @@ var _ = framework.DescribeAnnotation("server-snippet", func() {
})
ginkgo.It(`add valid directives to server via server snippet`, func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "true",
- })
- defer func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "false",
- })
- }()
+ disableSnippet := f.AllowSnippetConfiguration()
+ defer disableSnippet()
host := "serversnippet.foo.com"
annotations := map[string]string{
@@ -68,14 +62,8 @@ var _ = framework.DescribeAnnotation("server-snippet", func() {
})
ginkgo.It(`drops server snippet if disabled by the administrator`, func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "true",
- })
- defer func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "false",
- })
- }()
+ f.UpdateNginxConfigMapData("annotations-risk-level", "Critical") // To enable snippet configurations
+ defer f.UpdateNginxConfigMapData("annotations-risk-level", "High")
host := "noserversnippet.foo.com"
annotations := map[string]string{
@@ -85,11 +73,6 @@ var _ = framework.DescribeAnnotation("server-snippet", func() {
}
ing := framework.NewSingleIngress(host, "/", host, f.Namespace, framework.EchoService, 80, annotations)
- f.UpdateNginxConfigMapData("allow-snippet-annotations", "false")
- defer func() {
- // Return to the original value
- f.UpdateNginxConfigMapData("allow-snippet-annotations", "true")
- }()
// Sleep a while just to guarantee that the configmap is applied
framework.Sleep()
f.EnsureIngress(ing)
diff --git a/test/e2e/annotations/snippet.go b/test/e2e/annotations/snippet.go
index 0c6148a4f..9e3160dcc 100644
--- a/test/e2e/annotations/snippet.go
+++ b/test/e2e/annotations/snippet.go
@@ -33,15 +33,8 @@ var _ = framework.DescribeAnnotation("configuration-snippet", func() {
ginkgo.It("set snippet more_set_headers in all locations", func() {
host := "configurationsnippet.foo.com"
-
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "true",
- })
- defer func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "false",
- })
- }()
+ disableSnippet := f.AllowSnippetConfiguration()
+ defer disableSnippet()
annotations := map[string]string{
"nginx.ingress.kubernetes.io/configuration-snippet": `more_set_headers "Foo1: Bar1";`,
@@ -71,6 +64,8 @@ var _ = framework.DescribeAnnotation("configuration-snippet", func() {
})
ginkgo.It("drops snippet more_set_header in all locations if disabled by admin", func() {
+ f.UpdateNginxConfigMapData("annotations-risk-level", "Critical") // To enable snippet configurations
+ defer f.UpdateNginxConfigMapData("annotations-risk-level", "High")
host := "noconfigurationsnippet.foo.com"
annotations := map[string]string{
"nginx.ingress.kubernetes.io/configuration-snippet": `more_set_headers "Foo1: Bar1";`,
diff --git a/test/e2e/annotations/streamsnippet.go b/test/e2e/annotations/streamsnippet.go
index 432537b4a..f91cdc34e 100644
--- a/test/e2e/annotations/streamsnippet.go
+++ b/test/e2e/annotations/streamsnippet.go
@@ -39,14 +39,8 @@ var _ = framework.DescribeSetting("stream-snippet", func() {
})
ginkgo.It("should add value of stream-snippet to nginx config", func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "true",
- })
- defer func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "false",
- })
- }()
+ disableSnippet := f.AllowSnippetConfiguration()
+ defer disableSnippet()
host := "foo.com"
diff --git a/test/e2e/framework/exec.go b/test/e2e/framework/exec.go
index 580a8f58e..8d528c37a 100644
--- a/test/e2e/framework/exec.go
+++ b/test/e2e/framework/exec.go
@@ -117,11 +117,7 @@ func (f *Framework) newIngressController(namespace, namespaceOverlay string) err
isChroot = "false"
}
- enableAnnotationValidations, ok := os.LookupEnv("ENABLE_VALIDATIONS")
- if !ok {
- enableAnnotationValidations = "false"
- }
- cmd := exec.Command("./wait-for-nginx.sh", namespace, namespaceOverlay, isChroot, enableAnnotationValidations)
+ cmd := exec.Command("./wait-for-nginx.sh", namespace, namespaceOverlay, isChroot)
out, err := cmd.CombinedOutput()
if err != nil {
return fmt.Errorf("unexpected error waiting for ingress controller deployment: %v.\nLogs:\n%v", err, string(out))
diff --git a/test/e2e/framework/framework.go b/test/e2e/framework/framework.go
index b71d84baa..6e62a1df3 100644
--- a/test/e2e/framework/framework.go
+++ b/test/e2e/framework/framework.go
@@ -383,6 +383,20 @@ func (f *Framework) SetNginxConfigMapData(cmData map[string]string) {
f.WaitForReload(fn)
}
+// SetNginxConfigMapData sets ingress-nginx's nginx-ingress-controller configMap data
+func (f *Framework) AllowSnippetConfiguration() func() {
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "true",
+ "annotations-risk-level": "Critical", // To enable snippet configurations
+ })
+ return func() {
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "false",
+ "annotations-risk-level": "High",
+ })
+ }
+}
+
// CreateConfigMap creates a new configmap in the current namespace
func (f *Framework) CreateConfigMap(name string, data map[string]string) {
_, err := f.KubeClientSet.CoreV1().ConfigMaps(f.Namespace).Create(context.TODO(), &v1.ConfigMap{
diff --git a/test/e2e/ingress/multiple_rules.go b/test/e2e/ingress/multiple_rules.go
index f44b2f8dd..9247dc1d3 100644
--- a/test/e2e/ingress/multiple_rules.go
+++ b/test/e2e/ingress/multiple_rules.go
@@ -36,14 +36,8 @@ var _ = framework.IngressNginxDescribe("single ingress - multiple hosts", func()
})
ginkgo.It("should set the correct $service_name NGINX variable", func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "true",
- })
- defer func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "false",
- })
- }()
+ disableSnippet := f.AllowSnippetConfiguration()
+ defer disableSnippet()
annotations := map[string]string{
"nginx.ingress.kubernetes.io/configuration-snippet": `more_set_input_headers "service-name: $service_name";`,
diff --git a/test/e2e/ingress/pathtype_exact.go b/test/e2e/ingress/pathtype_exact.go
index d0564cbf6..2660e32a4 100644
--- a/test/e2e/ingress/pathtype_exact.go
+++ b/test/e2e/ingress/pathtype_exact.go
@@ -35,14 +35,8 @@ var _ = framework.IngressNginxDescribe("[Ingress] [PathType] exact", func() {
})
ginkgo.It("should choose exact location for /exact", func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "true",
- })
- defer func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "false",
- })
- }()
+ disableSnippet := f.AllowSnippetConfiguration()
+ defer disableSnippet()
host := "exact.path"
diff --git a/test/e2e/ingress/pathtype_mixed.go b/test/e2e/ingress/pathtype_mixed.go
index e7bf2532e..3212089c9 100644
--- a/test/e2e/ingress/pathtype_mixed.go
+++ b/test/e2e/ingress/pathtype_mixed.go
@@ -37,14 +37,8 @@ var _ = framework.IngressNginxDescribe("[Ingress] [PathType] mix Exact and Prefi
exactPathType := networking.PathTypeExact
ginkgo.It("should choose the correct location", func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "true",
- })
- defer func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "false",
- })
- }()
+ disableSnippet := f.AllowSnippetConfiguration()
+ defer disableSnippet()
host := "mixed.path"
diff --git a/test/e2e/run-e2e-suite.sh b/test/e2e/run-e2e-suite.sh
index 9333ee61f..909368e96 100755
--- a/test/e2e/run-e2e-suite.sh
+++ b/test/e2e/run-e2e-suite.sh
@@ -78,7 +78,6 @@ kubectl run --rm \
--env="E2E_NODES=${E2E_NODES}" \
--env="FOCUS=${FOCUS}" \
--env="IS_CHROOT=${IS_CHROOT:-false}"\
- --env="ENABLE_VALIDATIONS=${ENABLE_VALIDATIONS:-false}"\
--env="SKIP_OPENTELEMETRY_TESTS=${SKIP_OPENTELEMETRY_TESTS:-false}"\
--env="E2E_CHECK_LEAKS=${E2E_CHECK_LEAKS}" \
--env="NGINX_BASE_IMAGE=${NGINX_BASE_IMAGE}" \
diff --git a/test/e2e/run-kind-e2e.sh b/test/e2e/run-kind-e2e.sh
index ab2cb2dd7..9b4e82932 100755
--- a/test/e2e/run-kind-e2e.sh
+++ b/test/e2e/run-kind-e2e.sh
@@ -39,7 +39,6 @@ fi
KIND_LOG_LEVEL="1"
IS_CHROOT="${IS_CHROOT:-false}"
-ENABLE_VALIDATIONS="${ENABLE_VALIDATIONS:-false}"
export KIND_CLUSTER_NAME=${KIND_CLUSTER_NAME:-ingress-nginx-dev}
DIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )"
# Use 1.0.0-dev to make sure we use the latest configuration in the helm template
diff --git a/test/e2e/settings/badannotationvalues.go b/test/e2e/settings/badannotationvalues.go
index f61b5bada..aa9906909 100644
--- a/test/e2e/settings/badannotationvalues.go
+++ b/test/e2e/settings/badannotationvalues.go
@@ -34,14 +34,8 @@ var _ = framework.DescribeAnnotation("Bad annotation values", func() {
})
ginkgo.It("[BAD_ANNOTATIONS] should drop an ingress if there is an invalid character in some annotation", func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "true",
- })
- defer func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "false",
- })
- }()
+ disableSnippet := f.AllowSnippetConfiguration()
+ defer disableSnippet()
host := "invalid-value-test"
annotations := map[string]string{
@@ -50,7 +44,6 @@ var _ = framework.DescribeAnnotation("Bad annotation values", func() {
}
ing := framework.NewSingleIngress(host, "/", host, f.Namespace, framework.EchoService, 80, annotations)
- f.UpdateNginxConfigMapData("allow-snippet-annotations", "true")
f.UpdateNginxConfigMapData("annotation-value-word-blocklist", "something_forbidden,otherthing_forbidden,{")
f.EnsureIngress(ing)
@@ -73,14 +66,8 @@ var _ = framework.DescribeAnnotation("Bad annotation values", func() {
})
ginkgo.It("[BAD_ANNOTATIONS] should drop an ingress if there is a forbidden word in some annotation", func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "true",
- })
- defer func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "false",
- })
- }()
+ disableSnippet := f.AllowSnippetConfiguration()
+ defer disableSnippet()
host := "forbidden-value-test"
@@ -93,7 +80,6 @@ var _ = framework.DescribeAnnotation("Bad annotation values", func() {
}
ing := framework.NewSingleIngress(host, "/", host, f.Namespace, framework.EchoService, 80, annotations)
- f.UpdateNginxConfigMapData("allow-snippet-annotations", "true")
f.UpdateNginxConfigMapData("annotation-value-word-blocklist", "something_forbidden,otherthing_forbidden,content_by_lua_block")
// Sleep a while just to guarantee that the configmap is applied
framework.Sleep()
@@ -117,14 +103,9 @@ var _ = framework.DescribeAnnotation("Bad annotation values", func() {
})
ginkgo.It("[BAD_ANNOTATIONS] should allow an ingress if there is a default blocklist config in place", func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "true",
- })
- defer func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "false",
- })
- }()
+ disableSnippet := f.AllowSnippetConfiguration()
+ defer disableSnippet()
+
hostValid := "custom-allowed-value-test"
annotationsValid := map[string]string{
"nginx.ingress.kubernetes.io/configuration-snippet": `
@@ -155,14 +136,8 @@ var _ = framework.DescribeAnnotation("Bad annotation values", func() {
})
ginkgo.It("[BAD_ANNOTATIONS] should drop an ingress if there is a custom blocklist config in place and allow others to pass", func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "true",
- })
- defer func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "false",
- })
- }()
+ disableSnippet := f.AllowSnippetConfiguration()
+ defer disableSnippet()
host := "custom-forbidden-value-test"
annotations := map[string]string{
diff --git a/test/e2e/settings/geoip2.go b/test/e2e/settings/geoip2.go
index 064863734..9c6d59dc5 100644
--- a/test/e2e/settings/geoip2.go
+++ b/test/e2e/settings/geoip2.go
@@ -69,15 +69,9 @@ var _ = framework.DescribeSetting("Geoip2", func() {
ginkgo.It("should only allow requests from specific countries", func() {
ginkgo.Skip("GeoIP test are temporarily disabled")
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "true",
- "use-geoip2": "true",
- })
- defer func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "false",
- })
- }()
+ disableSnippet := f.AllowSnippetConfiguration()
+ defer disableSnippet()
+ f.UpdateNginxConfigMapData("use-geoip2", "true")
httpSnippetAllowingOnlyAustralia := `map $geoip2_city_country_code $blocked_country {
default 1;
diff --git a/test/e2e/settings/proxy_host.go b/test/e2e/settings/proxy_host.go
index 35aafc53d..3ce86127e 100644
--- a/test/e2e/settings/proxy_host.go
+++ b/test/e2e/settings/proxy_host.go
@@ -34,14 +34,9 @@ var _ = framework.IngressNginxDescribe("Dynamic $proxy_host", func() {
})
ginkgo.It("should exist a proxy_host", func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "true",
- })
- defer func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "false",
- })
- }()
+ disableSnippet := f.AllowSnippetConfiguration()
+ defer disableSnippet()
+
upstreamName := fmt.Sprintf("%v-%v-80", f.Namespace, framework.EchoService)
annotations := map[string]string{
"nginx.ingress.kubernetes.io/configuration-snippet": `more_set_headers "Custom-Header: $proxy_host"`,
@@ -65,10 +60,12 @@ var _ = framework.IngressNginxDescribe("Dynamic $proxy_host", func() {
ginkgo.It("should exist a proxy_host using the upstream-vhost annotation value", func() {
f.SetNginxConfigMapData(map[string]string{
"allow-snippet-annotations": "true",
+ "annotations-risk-level": "Critical", // To allow Configuration Snippet
})
defer func() {
f.SetNginxConfigMapData(map[string]string{
"allow-snippet-annotations": "false",
+ "annotations-risk-level": "High",
})
}()
diff --git a/test/e2e/settings/server_snippet.go b/test/e2e/settings/server_snippet.go
index 8ddf10fd9..1e2084bd8 100644
--- a/test/e2e/settings/server_snippet.go
+++ b/test/e2e/settings/server_snippet.go
@@ -38,6 +38,7 @@ var _ = framework.DescribeSetting("configmap server-snippet", func() {
f.SetNginxConfigMapData(map[string]string{
"allow-snippet-annotations": "true",
+ "annotations-risk-level": "Critical",
"server-snippet": `
more_set_headers "Globalfoo: Foooo";`,
})
@@ -45,6 +46,7 @@ var _ = framework.DescribeSetting("configmap server-snippet", func() {
defer func() {
f.SetNginxConfigMapData(map[string]string{
"allow-snippet-annotations": "false",
+ "annotations-risk-level": "High",
})
}()
annotations := map[string]string{
@@ -101,6 +103,7 @@ var _ = framework.DescribeSetting("configmap server-snippet", func() {
f.SetNginxConfigMapData(map[string]string{
"allow-snippet-annotations": "false",
+ "annotations-risk-level": "Critical", // To allow Configuration Snippet
"server-snippet": `
more_set_headers "Globalfoo: Foooo";`,
})
@@ -108,6 +111,7 @@ var _ = framework.DescribeSetting("configmap server-snippet", func() {
defer func() {
f.SetNginxConfigMapData(map[string]string{
"allow-snippet-annotations": "false",
+ "annotations-risk-level": "High",
})
}()
annotations := map[string]string{
diff --git a/test/e2e/settings/validations/validations.go b/test/e2e/settings/validations/validations.go
index ac95a453a..881de39b4 100644
--- a/test/e2e/settings/validations/validations.go
+++ b/test/e2e/settings/validations/validations.go
@@ -48,8 +48,8 @@ var _ = framework.IngressNginxDescribeSerial("annotation validations", func() {
framework.Sleep()
annotations := map[string]string{
- "nginx.ingress.kubernetes.io/default-backend": "default/bla", // low risk
- "nginx.ingress.kubernetes.io/denylist-source-range": "1.1.1.1/32", // medium risk
+ "nginx.ingress.kubernetes.io/default-backend": "bla", // low risk
+ "nginx.ingress.kubernetes.io/denylist-source-range": "1.1.1.1/32", // medium risk
}
ginkgo.By("allow ingress with low/medium risk annotations")
@@ -82,8 +82,8 @@ var _ = framework.IngressNginxDescribeSerial("annotation validations", func() {
framework.Sleep()
annotations := map[string]string{
- "nginx.ingress.kubernetes.io/default-backend": "default/bla", // low risk
- "nginx.ingress.kubernetes.io/denylist-source-range": "1.1.1.1/32", // medium risk
+ "nginx.ingress.kubernetes.io/default-backend": "bla", // low risk
+ "nginx.ingress.kubernetes.io/denylist-source-range": "1.1.1.1/32", // medium risk
}
ginkgo.By("allow ingress with low/medium risk annotations")
diff --git a/test/e2e/wait-for-nginx.sh b/test/e2e/wait-for-nginx.sh
index ac0584962..506c4e03f 100755
--- a/test/e2e/wait-for-nginx.sh
+++ b/test/e2e/wait-for-nginx.sh
@@ -24,7 +24,6 @@ DIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )"
export NAMESPACE=$1
export NAMESPACE_OVERLAY=$2
export IS_CHROOT=$3
-export ENABLE_VALIDATIONS=$4
echo "deploying NGINX Ingress controller in namespace $NAMESPACE"
@@ -59,7 +58,7 @@ else
# TODO: remove the need to use fullnameOverride
fullnameOverride: nginx-ingress
controller:
- enableAnnotationValidations: ${ENABLE_VALIDATIONS}
+ enableAnnotationValidations: true
image:
repository: ingress-controller/controller
chroot: ${IS_CHROOT}
From 1ea376a0eed973e3c1b861074d3332ab8e991002 Mon Sep 17 00:00:00 2001
From: Ricardo Katz
Date: Fri, 23 Aug 2024 11:55:52 -0300
Subject: [PATCH 198/283] Replace deprecated queue method (#11853)
---
internal/task/queue.go | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/internal/task/queue.go b/internal/task/queue.go
index f92f2a501..8753bed34 100644
--- a/internal/task/queue.go
+++ b/internal/task/queue.go
@@ -36,7 +36,7 @@ var keyFunc = cache.DeletionHandlingMetaNamespaceKeyFunc
// which timestamp is older than the last successful get operation.
type Queue struct {
// queue is the work queue the worker polls
- queue workqueue.RateLimitingInterface
+ queue workqueue.TypedRateLimitingInterface[any]
// sync is called for each item in the queue
sync func(interface{}) error
// workerDone is closed when the worker exits
@@ -172,7 +172,7 @@ func NewTaskQueue(syncFn func(interface{}) error) *Queue {
// NewCustomTaskQueue creates a new custom task queue with the given sync function.
func NewCustomTaskQueue(syncFn func(interface{}) error, fn func(interface{}) (interface{}, error)) *Queue {
q := &Queue{
- queue: workqueue.NewRateLimitingQueue(workqueue.DefaultControllerRateLimiter()),
+ queue: workqueue.NewTypedRateLimitingQueue(workqueue.DefaultTypedControllerRateLimiter[any]()),
sync: syncFn,
workerDone: make(chan bool),
fn: fn,
From ffee96c58c8e77df878ecba6acadb175ec37669e Mon Sep 17 00:00:00 2001
From: Sebastian Rabenhorst <4246554+rabenhorst@users.noreply.github.com>
Date: Fri, 23 Aug 2024 18:32:48 +0200
Subject: [PATCH 199/283] Add native histogram support for histogram metrics
(#9971)
Co-authored-by: Ricardo Katz
---
cmd/dataplane/main.go | 2 +-
cmd/nginx/main.go | 2 +-
docs/user-guide/cli-arguments.md | 2 +
go.work.sum | 71 +++++++++++++++++-
internal/ingress/controller/controller.go | 2 +
internal/ingress/metric/collectors/socket.go | 74 +++++++++++--------
.../ingress/metric/collectors/socket_test.go | 5 +-
internal/ingress/metric/main.go | 4 +-
pkg/flags/flags.go | 4 +
9 files changed, 128 insertions(+), 38 deletions(-)
diff --git a/cmd/dataplane/main.go b/cmd/dataplane/main.go
index 65f898df6..29a175a6f 100644
--- a/cmd/dataplane/main.go
+++ b/cmd/dataplane/main.go
@@ -66,7 +66,7 @@ func main() {
mc := metric.NewDummyCollector()
if conf.EnableMetrics {
// TODO: Ingress class is not a part of dataplane anymore
- mc, err = metric.NewCollector(conf.MetricsPerHost, conf.ReportStatusClasses, reg, conf.IngressClassConfiguration.Controller, *conf.MetricsBuckets, conf.ExcludeSocketMetrics)
+ mc, err = metric.NewCollector(conf.MetricsPerHost, conf.ReportStatusClasses, reg, conf.IngressClassConfiguration.Controller, *conf.MetricsBuckets, conf.MetricsBucketFactor, conf.MetricsMaxBuckets, conf.ExcludeSocketMetrics)
if err != nil {
klog.Fatalf("Error creating prometheus collector: %v", err)
}
diff --git a/cmd/nginx/main.go b/cmd/nginx/main.go
index 5ab54aa93..ea5acedc2 100644
--- a/cmd/nginx/main.go
+++ b/cmd/nginx/main.go
@@ -130,7 +130,7 @@ func main() {
mc := metric.NewDummyCollector()
if conf.EnableMetrics {
- mc, err = metric.NewCollector(conf.MetricsPerHost, conf.ReportStatusClasses, reg, conf.IngressClassConfiguration.Controller, *conf.MetricsBuckets, conf.ExcludeSocketMetrics)
+ mc, err = metric.NewCollector(conf.MetricsPerHost, conf.ReportStatusClasses, reg, conf.IngressClassConfiguration.Controller, *conf.MetricsBuckets, conf.MetricsBucketFactor, conf.MetricsMaxBuckets, conf.ExcludeSocketMetrics)
if err != nil {
klog.Fatalf("Error creating prometheus collector: %v", err)
}
diff --git a/docs/user-guide/cli-arguments.md b/docs/user-guide/cli-arguments.md
index 8ada854bf..018467dda 100644
--- a/docs/user-guide/cli-arguments.md
+++ b/docs/user-guide/cli-arguments.md
@@ -8,6 +8,7 @@ They are set in the container spec of the `ingress-nginx-controller` Deployment
|----------|-------------|
| `--annotations-prefix` | Prefix of the Ingress annotations specific to the NGINX controller. (default "nginx.ingress.kubernetes.io") |
| `--apiserver-host` | Address of the Kubernetes API server. Takes the form "protocol://address:port". If not specified, it is assumed the program runs inside a Kubernetes cluster and local discovery is attempted. |
+| `--bucket-factor` | Bucket factor for native histograms. Value must be > 1 for enabling native histograms. (default 0) |
| `--certificate-authority` | Path to a cert file for the certificate authority. This certificate is used only when the flag --apiserver-host is specified. |
| `--configmap` | Name of the ConfigMap containing custom global configurations for the controller. |
| `--controller-class` | Ingress Class Controller value this Ingress satisfies. The class of an Ingress object is set using the field IngressClassName in Kubernetes clusters version v1.19.0 or higher. The .spec.controller value of the IngressClass referenced in an Ingress Object should be the same value specified here to make this object be watched. |
@@ -40,6 +41,7 @@ They are set in the container spec of the `ingress-nginx-controller` Deployment
| `--internal-logger-address` | Address to be used when binding internal syslogger. (default 127.0.0.1:11514) |
| `--kubeconfig` | Path to a kubeconfig file containing authorization and API server information. |
| `--length-buckets` | Set of buckets which will be used for prometheus histogram metrics such as RequestLength, ResponseLength. (default `[10, 20, 30, 40, 50, 60, 70, 80, 90, 100]`) |
+| `--max-buckets` | Maximum number of buckets for native histograms. (default 100) |
| `--maxmind-edition-ids` | Maxmind edition ids to download GeoLite2 Databases. (default "GeoLite2-City,GeoLite2-ASN") |
| `--maxmind-retries-timeout` | Maxmind downloading delay between 1st and 2nd attempt, 0s - do not retry to download if something went wrong. (default 0s) |
| `--maxmind-retries-count` | Number of attempts to download the GeoIP DB. (default 1) |
diff --git a/go.work.sum b/go.work.sum
index 3a38ab8ec..5a6fe2480 100644
--- a/go.work.sum
+++ b/go.work.sum
@@ -1,3 +1,4 @@
+cel.dev/expr v0.15.0 h1:O1jzfJCQBfL5BFoYktaxwIhuttaQPsVWerH9/EEKx0w=
cel.dev/expr v0.15.0/go.mod h1:TRSuuV7DlVCE/uwv5QbAiW/v8l5O8C4eEPHeu7gf7Sg=
cloud.google.com/go v0.110.2 h1:sdFPBr6xG9/wkBbfhmUz/JmZC7X6LavQgcrVINrKiVA=
cloud.google.com/go v0.110.4/go.mod h1:+EYjdK8e5RME/VY/qLCAtuyALQ9q67dvuum8i+H5xsI=
@@ -123,6 +124,7 @@ cloud.google.com/go/cloudtasks v1.12.6/go.mod h1:b7c7fe4+TJsFZfDyzO51F7cjq7HLUlR
cloud.google.com/go/compute v1.21.0/go.mod h1:4tCnrn48xsqlwSAiLf1HXMQk8CONslYbdiEZc9FEIbM=
cloud.google.com/go/compute v1.23.0/go.mod h1:4tCnrn48xsqlwSAiLf1HXMQk8CONslYbdiEZc9FEIbM=
cloud.google.com/go/compute v1.23.1/go.mod h1:CqB3xpmPKKt3OJpW2ndFIXnA9A4xAy/F3Xp1ixncW78=
+cloud.google.com/go/compute v1.23.3 h1:6sVlXXBmbd7jNX0Ipq0trII3e4n1/MsADLK6a+aiVlk=
cloud.google.com/go/compute v1.23.3/go.mod h1:VCgBUoMnIVIR0CscqQiPJLAG25E3ZRZMzcFZeQ+h8CI=
cloud.google.com/go/compute v1.24.0 h1:phWcR2eWzRJaL/kOiJwfFsPs4BaKq1j6vnpZrc1YlVg=
cloud.google.com/go/compute v1.24.0/go.mod h1:kw1/T+h/+tK2LJK0wiPPx1intgdAM3j/g3hFDlscY40=
@@ -569,6 +571,8 @@ github.com/andybalholm/brotli v1.0.4 h1:V7DdXeJtZscaqfNuAdSRuRFzuiKlHSC/Zh3zl9qY
github.com/antihax/optional v1.0.0 h1:xK2lYat7ZLaVVcIuj82J8kIro4V6kDe0AUDFboUCwcg=
github.com/antlr/antlr4/runtime/Go/antlr/v4 v4.0.0-20230305170008-8188dc5388df h1:7RFfzj4SSt6nnvCPbCqijJi1nWCd+TqAT3bYCStRC18=
github.com/antlr/antlr4/runtime/Go/antlr/v4 v4.0.0-20230305170008-8188dc5388df/go.mod h1:pSwJ0fSY5KhvocuWSx4fz3BA8OrA1bQn+K1Eli3BRwM=
+github.com/antlr4-go/antlr/v4 v4.13.0 h1:lxCg3LAv+EUK6t1i0y1V6/SLeUi0eKEKdhQAlS8TVTI=
+github.com/antlr4-go/antlr/v4 v4.13.0/go.mod h1:pfChB/xh/Unjila75QW7+VU4TSnWnnk9UTnmpPaOR2g=
github.com/apache/arrow/go/v10 v10.0.1 h1:n9dERvixoC/1JjDmBcs9FPaEryoANa2sCgVFo6ez9cI=
github.com/apache/arrow/go/v11 v11.0.0 h1:hqauxvFQxww+0mEU/2XHG6LT7eZternCZq+A5Yly2uM=
github.com/apache/thrift v0.16.0 h1:qEy6UW60iVOlUy+b9ZR0d5WzUWYGOo4HfopoyBaNmoY=
@@ -583,6 +587,8 @@ github.com/bytedance/sonic v1.9.1 h1:6iJ6NqdoxCDr6mbY8h18oSO+cShGSMRGCEo7F2h0x8s
github.com/bytedance/sonic v1.9.1/go.mod h1:i736AoUSYt75HyZLoJW9ERYxcy6eaN6h4BZXU064P/U=
github.com/cenkalti/backoff/v4 v4.2.1 h1:y4OZtCnogmCPw98Zjyt5a6+QwPLGkiQsYW5oUqylYbM=
github.com/cenkalti/backoff/v4 v4.2.1/go.mod h1:Y3VNntkOUPxTVeUxJ/G5vcM//AlwfmyYozVcomhLiZE=
+github.com/cenkalti/backoff/v4 v4.3.0 h1:MyRJ/UdXutAwSAT+s3wNd7MfTIcy71VQueUuFK343L8=
+github.com/cenkalti/backoff/v4 v4.3.0/go.mod h1:Y3VNntkOUPxTVeUxJ/G5vcM//AlwfmyYozVcomhLiZE=
github.com/census-instrumentation/opencensus-proto v0.4.1 h1:iKLQ0xPNFxR/2hzXZMrBo8f1j86j5WHzznCCQxV/b8g=
github.com/census-instrumentation/opencensus-proto v0.4.1/go.mod h1:4T9NM4+4Vw91VeyqjLS6ao50K5bOcLKN6Q42XnYaRYw=
github.com/cespare/xxhash v1.1.0 h1:a6HrQnmkObjyL+Gs60czilIUGqrzKutQD6XZog3p+ko=
@@ -615,6 +621,7 @@ github.com/cncf/xds/go v0.0.0-20231109132714-523115ebc101/go.mod h1:eXthEFrGJvWH
github.com/cncf/xds/go v0.0.0-20231128003011-0fa0005c9caa h1:jQCWAUqqlij9Pgj2i/PB79y4KOPYVyFYdROxgaCwdTQ=
github.com/cncf/xds/go v0.0.0-20231128003011-0fa0005c9caa/go.mod h1:x/1Gn8zydmfq8dk6e9PdstVsDgu9RuyIIJqAaF//0IM=
github.com/cncf/xds/go v0.0.0-20240318125728-8a4994d93e50/go.mod h1:5e1+Vvlzido69INQaVO6d87Qn543Xr6nooe9Kz7oBFM=
+github.com/cncf/xds/go v0.0.0-20240423153145-555b57ec207b h1:ga8SEFjZ60pxLcmhnThWgvH2wg8376yUJmPhEH4H3kw=
github.com/cncf/xds/go v0.0.0-20240423153145-555b57ec207b/go.mod h1:W+zGtBO5Y1IgJhy4+A9GOqVhqLpfZi+vwmdNXUehLA8=
github.com/containerd/console v1.0.3 h1:lIr7SlA5PxZyMV30bDW0MGbiOPXwc63yRuCP0ARubLw=
github.com/containerd/console v1.0.3/go.mod h1:7LqA/THxQ86k76b8c/EMSiaJ3h1eZkMkXar0TQ1gf3U=
@@ -624,6 +631,7 @@ github.com/coreos/go-semver v0.3.1 h1:yi21YpKnrx1gt5R+la8n5WgS0kCrsPp33dmEyHReZr
github.com/coreos/go-semver v0.3.1/go.mod h1:irMmmIw/7yzSRPWryHsK7EYSg09caPQL03VsM8rvUec=
github.com/coreos/go-systemd v0.0.0-20190321100706-95778dfbb74e h1:Wf6HqHfScWJN9/ZjdUKyjop4mf3Qdd+1TvvltAvM3m8=
github.com/cpuguy83/go-md2man/v2 v2.0.3 h1:qMCsGGgs+MAzDFyp9LpAe1Lqy/fY/qCovCm0qnXZOBM=
+github.com/cpuguy83/go-md2man/v2 v2.0.4 h1:wfIWP927BUkWJb2NmU/kNDYIBTh/ziUX91+lVfRxZq4=
github.com/docker/go-units v0.4.0 h1:3uh0PgVws3nIA0Q+MwDC8yjEPf9zjRfZZWXZYDct3Tw=
github.com/docker/go-units v0.4.0/go.mod h1:fgPhTUdO+D/Jk86RDLlptpiXQzgHJF7gydDDbaIK4Dk=
github.com/docopt/docopt-go v0.0.0-20180111231733-ee0de3bc6815 h1:bWDMxwH3px2JBh6AyO7hdCn/PkvCZXii8TGj7sbtEbQ=
@@ -642,6 +650,7 @@ github.com/envoyproxy/protoc-gen-validate v1.0.4/go.mod h1:qys6tmnRsYrQqIhm2bvKZ
github.com/evanphx/json-patch v4.12.0+incompatible/go.mod h1:50XU6AFN0ol/bzJsmQLiYLvXMP4fmwYFNcr97nuDLSk=
github.com/felixge/httpsnoop v1.0.3 h1:s/nj+GCswXYzN5v2DpNMuMQYe+0DDwt5WVCU6CWBdXk=
github.com/felixge/httpsnoop v1.0.3/go.mod h1:m8KPJKqk1gH5J9DgRY2ASl2lWCfGKXixSwevea8zH2U=
+github.com/felixge/httpsnoop v1.0.4 h1:NFTV2Zj1bL4mc9sqWACXbQFVBBg2W3GPvqp8/ESS2Wg=
github.com/felixge/httpsnoop v1.0.4/go.mod h1:m8KPJKqk1gH5J9DgRY2ASl2lWCfGKXixSwevea8zH2U=
github.com/fogleman/gg v1.3.0 h1:/7zJX8F6AaYQc57WQCyN9cAIz+4bCJGO9B+dyW29am8=
github.com/fxamacker/cbor/v2 v2.6.0 h1:sU6J2usfADwWlYDAFhZBQ6TnLFBHxgesMrQfQgk1tWA=
@@ -678,6 +687,7 @@ github.com/go-openapi/jsonpointer v0.19.6/go.mod h1:osyAmYz/mB/C3I+WsTTSgw1ONzaL
github.com/go-openapi/jsonreference v0.20.1/go.mod h1:Bl1zwGIM8/wsvqjsOQLJ/SH+En5Ap4rVB5KVcIDZG2k=
github.com/go-openapi/jsonreference v0.20.2/go.mod h1:Bl1zwGIM8/wsvqjsOQLJ/SH+En5Ap4rVB5KVcIDZG2k=
github.com/go-openapi/swag v0.22.3/go.mod h1:UzaqsxGiab7freDnrUUra0MwWfN/q7tE4j+VcZ0yl14=
+github.com/go-openapi/swag v0.22.4/go.mod h1:UzaqsxGiab7freDnrUUra0MwWfN/q7tE4j+VcZ0yl14=
github.com/go-openapi/swag v0.22.5/go.mod h1:Gl91UqO+btAM0plGGxHqJcQZ1ZTy6jbmridBTsDy8A0=
github.com/go-openapi/swag v0.22.6/go.mod h1:Gl91UqO+btAM0plGGxHqJcQZ1ZTy6jbmridBTsDy8A0=
github.com/go-pdf/fpdf v0.6.0 h1:MlgtGIfsdMEEQJr2le6b/HNr1ZlQwxyWr77r2aj2U/8=
@@ -703,6 +713,7 @@ github.com/golang/freetype v0.0.0-20170609003504-e2365dfdc4a0 h1:DACJavvAHhabrF0
github.com/golang/glog v1.1.2/go.mod h1:zR+okUeTbrL6EL3xHUDxZuEtGv04p5shwip1+mL/rLQ=
github.com/golang/glog v1.2.0 h1:uCdmnmatrKCgMBlM4rMuJZWOkPDqdbZPnrMXDY4gI68=
github.com/golang/glog v1.2.0/go.mod h1:6AhwSGph0fcJtXVM/PEHPqZlFeoLxhs7/t5UDAwmO+w=
+github.com/golang/glog v1.2.1 h1:OptwRhECazUx5ix5TTWC3EZhsZEHWcYWY4FQHTIubm4=
github.com/golang/glog v1.2.1/go.mod h1:6AhwSGph0fcJtXVM/PEHPqZlFeoLxhs7/t5UDAwmO+w=
github.com/golang/mock v1.6.0 h1:ErTB+efbowRARo13NNdxyJji2egdxLGQhRaY+DUumQc=
github.com/golang/protobuf v1.3.1/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
@@ -711,6 +722,8 @@ github.com/google/btree v1.0.1/go.mod h1:xXMiIv4Fb/0kKde4SpL7qlzvu5cMJDRkFDxJfI9
github.com/google/cel-go v0.17.7/go.mod h1:HXZKzB0LXqer5lHHgfWAnlYwJaQBDKMjxjulNQzhwhY=
github.com/google/cel-go v0.17.8 h1:j9m730pMZt1Fc4oKhCLUHfjj6527LuhYcYw0Rl8gqto=
github.com/google/cel-go v0.17.8/go.mod h1:HXZKzB0LXqer5lHHgfWAnlYwJaQBDKMjxjulNQzhwhY=
+github.com/google/cel-go v0.20.1 h1:nDx9r8S3L4pE61eDdt8igGj8rf5kjYR3ILxWIpWNi84=
+github.com/google/cel-go v0.20.1/go.mod h1:kWcIzTsPX0zmQ+H3TirHstLLf9ep5QTsZBN9u4dOYLg=
github.com/google/flatbuffers v2.0.8+incompatible h1:ivUb1cGomAB101ZM1T0nOiWz9pSrTMoa9+EiY7igmkM=
github.com/google/go-pkcs11 v0.2.1-0.20230907215043-c6f79328ddf9/go.mod h1:6eQoGcuNJpa7jnd5pMGdkSaQpNDYvPlXWMcjXXThLlY=
github.com/google/gofuzz v1.1.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
@@ -718,6 +731,8 @@ github.com/google/martian v2.1.0+incompatible h1:/CP5g8u/VJHijgedC/Legn3BAbAaWPg
github.com/google/martian/v3 v3.3.2 h1:IqNFLAmvJOgVlpdEBiQbDc2EwKW77amAycfTuWKdfvw=
github.com/google/pprof v0.0.0-20210407192527-94a9f03dee38/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
github.com/google/pprof v0.0.0-20210720184732-4bb14d4b1be1/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
+github.com/google/pprof v0.0.0-20240424215950-a892ee059fd6/go.mod h1:kf6iHlnVGwgKolg33glAes7Yg/8iWP8ukqeldJSO7jw=
+github.com/google/pprof v0.0.0-20240525223248-4bfdf5a9a2af/go.mod h1:K1liHPHnj73Fdn/EKuT8nrFqBihUSKXoLYU0BuatOYo=
github.com/google/renameio v0.1.0 h1:GOZbcHa3HfsPKPlmyPyN2KEohoMXOhdMbHrvbpl2QaA=
github.com/google/s2a-go v0.1.4 h1:1kZ/sQM3srePvKs3tXAvQzo66XfcReoqFpIpIccE7Oc=
github.com/google/s2a-go v0.1.7/go.mod h1:50CgR4k1jNlWBu4UfS4AcfhVe1r6pdZPygJ3R8F0Qdw=
@@ -743,6 +758,8 @@ github.com/grpc-ecosystem/grpc-gateway v1.16.0 h1:gmcG1KaJ57LophUzW0Hy8NmPhnMZb4
github.com/grpc-ecosystem/grpc-gateway v1.16.0/go.mod h1:BDjrQk3hbvj6Nolgz8mAMFbcEtjT1g+wF4CSlocrBnw=
github.com/grpc-ecosystem/grpc-gateway/v2 v2.16.0 h1:YBftPWNWd4WwGqtY2yeZL2ef8rHAxPBD8KFhJpmcqms=
github.com/grpc-ecosystem/grpc-gateway/v2 v2.16.0/go.mod h1:YN5jB8ie0yfIUg6VvR9Kz84aCaG7AsGZnLjhHbUqwPg=
+github.com/grpc-ecosystem/grpc-gateway/v2 v2.20.0 h1:bkypFPDjIYGfCYD5mRBvpqxfYX1YCS1PXdKYWi8FsN0=
+github.com/grpc-ecosystem/grpc-gateway/v2 v2.20.0/go.mod h1:P+Lt/0by1T8bfcF3z737NnSbmxQAppXMRziHUxPOC8k=
github.com/hashicorp/golang-lru v0.5.1 h1:0hERBMJE1eitiLkihrMvRVBYAkpHzc/J3QdDN+dAcgU=
github.com/hpcloud/tail v1.0.0 h1:nfCOvKYfkgYP8hkirhJocXT2+zOD8yUNjXaWfTlyFKI=
github.com/iancoleman/strcase v0.2.0 h1:05I4QRnGpI0m37iZQRuskXh+w77mr6Z41lwQzuHLwW0=
@@ -795,6 +812,8 @@ github.com/minio/asm2plan9s v0.0.0-20200509001527-cdd76441f9d8 h1:AMFGa4R4MiIpsp
github.com/minio/c2goasm v0.0.0-20190812172519-36a3d3bbc4f3 h1:+n/aFZefKZp7spd8DFdX7uMikMLXX4oubIzJF4kv/wI=
github.com/moby/spdystream v0.2.0 h1:cjW1zVyyoiM0T7b6UoySUFqzXMoqRckQtXwGPiBhOM8=
github.com/moby/spdystream v0.2.0/go.mod h1:f7i0iNDQJ059oMTcWxx8MA/zKFIuD/lY+0GqbN2Wy8c=
+github.com/moby/spdystream v0.4.0 h1:Vy79D6mHeJJjiPdFEL2yku1kl0chZpJfZcPpb16BRl8=
+github.com/moby/spdystream v0.4.0/go.mod h1:xBAYlnt/ay+11ShkdFKNAG7LsyK/tmNBVvVOwrfMgdI=
github.com/mrunalp/fileutils v0.5.1 h1:F+S7ZlNKnrwHfSwdlgNSkKo67ReVf8o9fel6C3dkm/Q=
github.com/mrunalp/fileutils v0.5.1/go.mod h1:M1WthSahJixYnrXQl/DFQuteStB1weuxD2QJNHXfbSQ=
github.com/munnerz/goautoneg v0.0.0-20120707110453-a547fc61f48d/go.mod h1:+n7T8mK8HuQTcFwEeznm/DIxMOiR9yIdICNftLE1DvQ=
@@ -871,8 +890,6 @@ github.com/vishvananda/netlink v1.1.0 h1:1iyaYNBLmP6L0220aDnYQpo1QEV4t4hJ+xEEhhJ
github.com/vishvananda/netlink v1.1.0/go.mod h1:cTgwzPIzzgDAYoQrMm0EdrjRUBkTqKYppBueQtXaqoE=
github.com/vishvananda/netns v0.0.0-20191106174202-0a2b9b5464df h1:OviZH7qLw/7ZovXvuNyL3XQl8UFofeikI1NW1Gypu7k=
github.com/vishvananda/netns v0.0.0-20191106174202-0a2b9b5464df/go.mod h1:JP3t17pCcGlemwknint6hfoeCVQrEMVwxRLRjXpq+BU=
-github.com/x448/float16 v0.8.4 h1:qLwI1I70+NjRFUR3zs1JPUCgaCXSh3SW62uAKT1mSBM=
-github.com/x448/float16 v0.8.4/go.mod h1:14CWIYCyZA/cWjXOioeEpHeN/83MdbZDRQHoFcYsOfg=
github.com/xhit/go-str2duration v1.2.0 h1:BcV5u025cITWxEQKGWr1URRzrcXtu7uk8+luz3Yuhwc=
github.com/xhit/go-str2duration/v2 v2.1.0 h1:lxklc02Drh6ynqX+DdPyp5pCKLUQpRT8bp8Ydu2Bstc=
github.com/xhit/go-str2duration/v2 v2.1.0/go.mod h1:ohY8p+0f07DiV6Em5LKB0s2YpLtXVyJfNt1+BlmyAsU=
@@ -883,50 +900,84 @@ github.com/zeebo/assert v1.3.0 h1:g7C04CbJuIDKNPFHmsk4hwZDO5O+kntRxzaUoNXj+IQ=
github.com/zeebo/xxh3 v1.0.2 h1:xZmwmqxHZA8AI603jOQ0tMqmBr9lPeFwGg6d+xy9DC0=
go.etcd.io/bbolt v1.3.8 h1:xs88BrvEv273UsB79e0hcVrlUWmS0a8upikMFhSyAtA=
go.etcd.io/bbolt v1.3.8/go.mod h1:N9Mkw9X8x5fupy0IKsmuqVtoGDyxsaDlbk4Rd05IAQw=
+go.etcd.io/bbolt v1.3.9 h1:8x7aARPEXiXbHmtUwAIv7eV2fQFHrLLavdiJ3uzJXoI=
+go.etcd.io/bbolt v1.3.9/go.mod h1:zaO32+Ti0PK1ivdPtgMESzuzL2VPoIG1PCQNvOdo/dE=
go.etcd.io/etcd/api/v3 v3.5.10 h1:szRajuUUbLyppkhs9K6BRtjY37l66XQQmw7oZRANE4k=
go.etcd.io/etcd/api/v3 v3.5.10/go.mod h1:TidfmT4Uycad3NM/o25fG3J07odo4GBB9hoxaodFCtI=
+go.etcd.io/etcd/api/v3 v3.5.14 h1:vHObSCxyB9zlF60w7qzAdTcGaglbJOpSj1Xj9+WGxq0=
+go.etcd.io/etcd/api/v3 v3.5.14/go.mod h1:BmtWcRlQvwa1h3G2jvKYwIQy4PkHlDej5t7uLMUdJUU=
go.etcd.io/etcd/client/pkg/v3 v3.5.10 h1:kfYIdQftBnbAq8pUWFXfpuuxFSKzlmM5cSn76JByiT0=
go.etcd.io/etcd/client/pkg/v3 v3.5.10/go.mod h1:DYivfIviIuQ8+/lCq4vcxuseg2P2XbHygkKwFo9fc8U=
+go.etcd.io/etcd/client/pkg/v3 v3.5.14 h1:SaNH6Y+rVEdxfpA2Jr5wkEvN6Zykme5+YnbCkxvuWxQ=
+go.etcd.io/etcd/client/pkg/v3 v3.5.14/go.mod h1:8uMgAokyG1czCtIdsq+AGyYQMvpIKnSvPjFMunkgeZI=
go.etcd.io/etcd/client/v2 v2.305.10 h1:MrmRktzv/XF8CvtQt+P6wLUlURaNpSDJHFZhe//2QE4=
go.etcd.io/etcd/client/v2 v2.305.10/go.mod h1:m3CKZi69HzilhVqtPDcjhSGp+kA1OmbNn0qamH80xjA=
+go.etcd.io/etcd/client/v2 v2.305.13 h1:RWfV1SX5jTU0lbCvpVQe3iPQeAHETWdOTb6pxhd77C8=
+go.etcd.io/etcd/client/v2 v2.305.13/go.mod h1:iQnL7fepbiomdXMb3om1rHq96htNNGv2sJkEcZGDRRg=
go.etcd.io/etcd/client/v3 v3.5.10 h1:W9TXNZ+oB3MCd/8UjxHTWK5J9Nquw9fQBLJd5ne5/Ao=
go.etcd.io/etcd/client/v3 v3.5.10/go.mod h1:RVeBnDz2PUEZqTpgqwAtUd8nAPf5kjyFyND7P1VkOKc=
+go.etcd.io/etcd/client/v3 v3.5.14 h1:CWfRs4FDaDoSz81giL7zPpZH2Z35tbOrAJkkjMqOupg=
+go.etcd.io/etcd/client/v3 v3.5.14/go.mod h1:k3XfdV/VIHy/97rqWjoUzrj9tk7GgJGH9J8L4dNXmAk=
go.etcd.io/etcd/pkg/v3 v3.5.10 h1:WPR8K0e9kWl1gAhB5A7gEa5ZBTNkT9NdNWrR8Qpo1CM=
go.etcd.io/etcd/pkg/v3 v3.5.10/go.mod h1:TKTuCKKcF1zxmfKWDkfz5qqYaE3JncKKZPFf8c1nFUs=
+go.etcd.io/etcd/pkg/v3 v3.5.13 h1:st9bDWNsKkBNpP4PR1MvM/9NqUPfvYZx/YXegsYEH8M=
+go.etcd.io/etcd/pkg/v3 v3.5.13/go.mod h1:N+4PLrp7agI/Viy+dUYpX7iRtSPvKq+w8Y14d1vX+m0=
go.etcd.io/etcd/raft/v3 v3.5.10 h1:cgNAYe7xrsrn/5kXMSaH8kM/Ky8mAdMqGOxyYwpP0LA=
go.etcd.io/etcd/raft/v3 v3.5.10/go.mod h1:odD6kr8XQXTy9oQnyMPBOr0TVe+gT0neQhElQ6jbGRc=
+go.etcd.io/etcd/raft/v3 v3.5.13 h1:7r/NKAOups1YnKcfro2RvGGo2PTuizF/xh26Z2CTAzA=
+go.etcd.io/etcd/raft/v3 v3.5.13/go.mod h1:uUFibGLn2Ksm2URMxN1fICGhk8Wu96EfDQyuLhAcAmw=
go.etcd.io/etcd/server/v3 v3.5.10 h1:4NOGyOwD5sUZ22PiWYKmfxqoeh72z6EhYjNosKGLmZg=
go.etcd.io/etcd/server/v3 v3.5.10/go.mod h1:gBplPHfs6YI0L+RpGkTQO7buDbHv5HJGG/Bst0/zIPo=
+go.etcd.io/etcd/server/v3 v3.5.13 h1:V6KG+yMfMSqWt+lGnhFpP5z5dRUj1BDRJ5k1fQ9DFok=
+go.etcd.io/etcd/server/v3 v3.5.13/go.mod h1:K/8nbsGupHqmr5MkgaZpLlH1QdX1pcNQLAkODy44XcQ=
go.opencensus.io v0.24.0 h1:y73uSU6J157QMP2kn2r30vwW1A2W2WFwSCGnAVxeaD0=
go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.42.0 h1:ZOLJc06r4CB42laIXg/7udr0pbZyuAihN10A/XuiQRY=
go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.42.0/go.mod h1:5z+/ZWJQKXa9YT34fQNx5K8Hd1EoIhvtUygUQPqEOgQ=
go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.46.1/go.mod h1:4UoMYEZOC0yN/sPGH76KPkkU7zgiEWYWL9vwmbnTJPE=
go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.47.0/go.mod h1:r9vWsPS/3AQItv3OSlEJ/E4mbrhUbbw18meOjArPtKQ=
+go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.53.0 h1:9G6E0TXzGFVfTnawRzrPl83iHOAV7L8NJiR8RSGYV1g=
+go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.53.0/go.mod h1:azvtTADFQJA8mX80jIH/akaE7h+dbm/sVuaHqN13w74=
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.44.0 h1:KfYpVmrjI7JuToy5k8XV3nkapjWx48k4E4JOtVstzQI=
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.44.0/go.mod h1:SeQhzAEccGVZVEy7aH87Nh0km+utSpo1pTv6eMMop48=
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.46.1/go.mod h1:sEGXWArGqc3tVa+ekntsN65DmVbVeW+7lTKTjZF3/Fo=
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.47.0/go.mod h1:SK2UL73Zy1quvRPonmOmRDiWk1KBV3LyIeeIxcEApWw=
+go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.53.0 h1:4K4tsIXefpVJtvA/8srF4V4y0akAoPHkIslgAkjixJA=
+go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.53.0/go.mod h1:jjdQuTGVsXV4vSs+CJ2qYDeDPf9yIJV23qlIzBm73Vg=
go.opentelemetry.io/otel v1.19.0 h1:MuS/TNf4/j4IXsZuJegVzI1cwut7Qc00344rgH7p8bs=
go.opentelemetry.io/otel v1.19.0/go.mod h1:i0QyjOq3UPoTzff0PJB2N66fb4S0+rSbSB15/oyH9fY=
go.opentelemetry.io/otel v1.21.0/go.mod h1:QZzNPQPm1zLX4gZK4cMi+71eaorMSGT3A4znnUvNNEo=
go.opentelemetry.io/otel v1.22.0/go.mod h1:eoV4iAi3Ea8LkAEI9+GFT44O6T/D0GWAVFyZVCC6pMI=
+go.opentelemetry.io/otel v1.28.0 h1:/SqNcYk+idO0CxKEUOtKQClMK/MimZihKYMruSMViUo=
+go.opentelemetry.io/otel v1.28.0/go.mod h1:q68ijF8Fc8CnMHKyzqL6akLO46ePnjkgfIMIjUIX9z4=
go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.19.0 h1:Mne5On7VWdx7omSrSSZvM4Kw7cS7NQkOOmLcgscI51U=
go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.19.0/go.mod h1:IPtUMKL4O3tH5y+iXVyAXqpAwMuzC1IrxVS81rummfE=
+go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.28.0 h1:3Q/xZUyC1BBkualc9ROb4G8qkH90LXEIICcs5zv1OYY=
+go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.28.0/go.mod h1:s75jGIWA9OfCMzF0xr+ZgfrB5FEbbV7UuYo32ahUiFI=
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.19.0 h1:3d+S281UTjM+AbF31XSOYn1qXn3BgIdWl8HNEpx08Jk=
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.19.0/go.mod h1:0+KuTDyKL4gjKCF75pHOX4wuzYDUZYfAQdSu43o+Z2I=
+go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.27.0 h1:qFffATk0X+HD+f1Z8lswGiOQYKHRlzfmdJm0wEaVrFA=
+go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.27.0/go.mod h1:MOiCmryaYtc+V0Ei+Tx9o5S1ZjA7kzLucuVuyzBZloQ=
go.opentelemetry.io/otel/metric v1.19.0 h1:aTzpGtV0ar9wlV4Sna9sdJyII5jTVJEvKETPiOKwvpE=
go.opentelemetry.io/otel/metric v1.19.0/go.mod h1:L5rUsV9kM1IxCj1MmSdS+JQAcVm319EUrDVLrt7jqt8=
go.opentelemetry.io/otel/metric v1.21.0/go.mod h1:o1p3CA8nNHW8j5yuQLdc1eeqEaPfzug24uvsyIEJRWM=
go.opentelemetry.io/otel/metric v1.22.0/go.mod h1:evJGjVpZv0mQ5QBRJoBF64yMuOf4xCWdXjK8pzFvliY=
+go.opentelemetry.io/otel/metric v1.28.0 h1:f0HGvSl1KRAU1DLgLGFjrwVyismPlnuU6JD6bOeuA5Q=
+go.opentelemetry.io/otel/metric v1.28.0/go.mod h1:Fb1eVBFZmLVTMb6PPohq3TO9IIhUisDsbJoL/+uQW4s=
go.opentelemetry.io/otel/sdk v1.19.0 h1:6USY6zH+L8uMH8L3t1enZPR3WFEmSTADlqldyHtJi3o=
go.opentelemetry.io/otel/sdk v1.19.0/go.mod h1:NedEbbS4w3C6zElbLdPJKOpJQOrGUJ+GfzpjUvI0v1A=
go.opentelemetry.io/otel/sdk v1.21.0/go.mod h1:Nna6Yv7PWTdgJHVRD9hIYywQBRx7pbox6nwBnZIxl/E=
+go.opentelemetry.io/otel/sdk v1.28.0 h1:b9d7hIry8yZsgtbmM0DKyPWMMUMlK9NEKuIG4aBqWyE=
+go.opentelemetry.io/otel/sdk v1.28.0/go.mod h1:oYj7ClPUA7Iw3m+r7GeEjz0qckQRJK2B8zjcZEfu7Pg=
go.opentelemetry.io/otel/trace v1.19.0 h1:DFVQmlVbfVeOuBRrwdtaehRrWiL1JoVs9CPIQ1Dzxpg=
go.opentelemetry.io/otel/trace v1.19.0/go.mod h1:mfaSyvGyEJEI0nyV2I4qhNQnbBOUUmYZpYojqMnX2vo=
go.opentelemetry.io/otel/trace v1.21.0/go.mod h1:LGbsEB0f9LGjN+OZaQQ26sohbOmiMR+BaslueVtS/qQ=
go.opentelemetry.io/otel/trace v1.22.0/go.mod h1:RbbHXVqKES9QhzZq/fE5UnOSILqRt40a21sPw2He1xo=
+go.opentelemetry.io/otel/trace v1.28.0 h1:GhQ9cUuQGmNDd5BTCP2dAvv75RdMxEfTmYejp+lkx9g=
+go.opentelemetry.io/otel/trace v1.28.0/go.mod h1:jPyXzNPg6da9+38HEwElrQiHlVMTnVfM3/yv2OlIHaI=
go.opentelemetry.io/proto/otlp v1.0.0 h1:T0TX0tmXU8a3CbNXzEKGeU5mIVOdf0oykP+u2lIVU/I=
go.opentelemetry.io/proto/otlp v1.0.0/go.mod h1:Sy6pihPLfYHkr3NkUbEhGHFhINUSI/v80hjKIs5JXpM=
+go.opentelemetry.io/proto/otlp v1.3.1 h1:TrMUixzpM0yuc/znrFTP9MMRh8trP93mkCiDVeXrui0=
+go.opentelemetry.io/proto/otlp v1.3.1/go.mod h1:0X1WI4de4ZsLrrJNLAQbFeLCm3T7yBkR0XqQ7niQU+8=
go.uber.org/atomic v1.10.0 h1:9qC72Qh0+3MqyJbAn8YU5xVq1frD8bn3JtD2oXtafVQ=
go.uber.org/atomic v1.10.0/go.mod h1:LUxbIzbOniOlMKjJjyPfpl4v+PKK2cNJn91OQbhoJI0=
go.uber.org/goleak v1.2.0/go.mod h1:XJYK+MuIchqpmGmUSAzotztawfKvYLUIgg7guXrwVUo=
@@ -944,6 +995,7 @@ golang.org/x/mobile v0.0.0-20190719004257-d2bd2a29d028 h1:4+4C/Iv2U4fMZBiMCc98MG
golang.org/x/mod v0.9.0/go.mod h1:iBbtSCu2XBx23ZKBPSOrRkjjQPZFPuis4dIYUhu/chs=
golang.org/x/mod v0.12.0/go.mod h1:iBbtSCu2XBx23ZKBPSOrRkjjQPZFPuis4dIYUhu/chs=
golang.org/x/mod v0.14.0/go.mod h1:hTbmBsO62+eylJbnUtE2MGJUyE7QWk4xUqPFrRgJ+7c=
+golang.org/x/mod v0.17.0/go.mod h1:hTbmBsO62+eylJbnUtE2MGJUyE7QWk4xUqPFrRgJ+7c=
golang.org/x/net v0.0.0-20190603091049-60506f45cf65/go.mod h1:HSz+uSET+XFnRR8LxR5pz3Of3rY3CfYBVs4xY44aLks=
golang.org/x/net v0.14.0/go.mod h1:PpSgVXXLK0OxS0F31C1/tv6XNguvCrnXIDrFMspZIUI=
golang.org/x/net v0.16.0/go.mod h1:NxSsAGuq816PNPmqtQdLE42eU2Fs7NoRIZrHJAlaCOE=
@@ -951,6 +1003,8 @@ golang.org/x/net v0.18.0/go.mod h1:/czyP5RqHAH4odGYxBJ1qz0+CE5WZ+2j1YgoEo8F2jQ=
golang.org/x/net v0.21.0/go.mod h1:bIjVDfnllIU7BJ2DNgfnXvpSvtn8VRwhlsaeUTyUS44=
golang.org/x/net v0.23.0/go.mod h1:JKghWKKOSdJwpW2GEx0Ja7fmaKnMsbu+MWVZTokSYmg=
golang.org/x/net v0.24.0/go.mod h1:2Q7sJY5mzlzWjKtYUEXSlBWCdyaioyXzRB2RtU8KVE8=
+golang.org/x/net v0.26.0/go.mod h1:5YKkiSynbBIh3p6iOc/vibscux0x38BZDkn8sCUPxHE=
+golang.org/x/net v0.27.0/go.mod h1:dDi0PyhWNoiUOrAS8uXv/vnScO4wnHQO4mj9fn/RytE=
golang.org/x/oauth2 v0.10.0/go.mod h1:kTpgurOux7LqtuxjuyZa4Gj2gdezIt/jQtGnNFfypQI=
golang.org/x/oauth2 v0.11.0/go.mod h1:LdF7O/8bLR/qWK9DrpXmbHLTouvRHK0SgJl0GmDBchk=
golang.org/x/oauth2 v0.13.0/go.mod h1:/JMhi4ZRXAf4HG9LiNmxvk+45+96RUlVThiH8FzNBn0=
@@ -958,18 +1012,24 @@ golang.org/x/oauth2 v0.14.0/go.mod h1:lAtNWgaWfL4cm7j2OV8TxGi9Qb7ECORx8DktCY74Ow
golang.org/x/oauth2 v0.15.0/go.mod h1:q48ptWNTY5XWf+JNten23lcvHpLJ0ZSxF5ttTHKVCAM=
golang.org/x/oauth2 v0.17.0/go.mod h1:OzPDGQiuQMguemayvdylqddI7qcD9lnSDb+1FiwQ5HA=
golang.org/x/sync v0.4.0/go.mod h1:FU7BRWz2tNW+3quACPkgCx/L+uEAv1htQ0V83Z9Rj+Y=
+golang.org/x/sync v0.7.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk=
golang.org/x/sys v0.0.0-20191204072324-ce4227a45e2e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20220310020820-b874c991c1a5/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.14.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
golang.org/x/sys v0.19.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
golang.org/x/sys v0.20.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
+golang.org/x/sys v0.21.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
+golang.org/x/sys v0.22.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
golang.org/x/telemetry v0.0.0-20240208230135-b75ee8823808/go.mod h1:KG1lNk5ZFNssSZLrpVb4sMXKMpGwGXOxSG3rnu2gZQQ=
golang.org/x/telemetry v0.0.0-20240228155512-f48c80bd79b2 h1:IRJeR9r1pYWsHKTRe/IInb7lYvbBVIqOgsX/u0mbOWY=
golang.org/x/telemetry v0.0.0-20240228155512-f48c80bd79b2/go.mod h1:TeRTkGYfJXctD9OcfyVLyj2J3IxLnKwHJR8f4D8a3YE=
+golang.org/x/telemetry v0.0.0-20240521205824-bda55230c457 h1:zf5N6UOrA487eEFacMePxjXAJctxKmyjKUsjA11Uzuk=
+golang.org/x/telemetry v0.0.0-20240521205824-bda55230c457/go.mod h1:pRgIJT+bRLFKnoM1ldnzKoxTIn14Yxz928LQRYYgIN0=
golang.org/x/term v0.18.0/go.mod h1:ILwASektA3OnRv7amZ1xhE/KTR+u50pbXfZ03+6Nx58=
golang.org/x/term v0.21.0/go.mod h1:ooXLefLobQVslOqselCNF4SxFAaoS6KujMbsGzSDmX0=
golang.org/x/text v0.3.2/go.mod h1:bEr9sfX3Q8Zfm5fL9x+3itogRgK3+ptLWKqgva+5dAk=
golang.org/x/text v0.12.0/go.mod h1:TvPlkZtksWOMsz7fbANvkp4WM8x/WCo/om8BMLbz+aE=
+golang.org/x/text v0.16.0/go.mod h1:GhwF1Be+LQoKShO3cGOHzqOgRrGaYc9AvblQOmPVHnI=
golang.org/x/time v0.3.0/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
golang.org/x/tools v0.4.0/go.mod h1:UE5sM2OK9E/d67R0ANs2xJizIymRP5gJU295PvKXxjQ=
golang.org/x/tools v0.12.0/go.mod h1:Sc0INKfu04TlqNoRA1hgpFZbhYXHPr4V5DzpSBTPqQM=
@@ -977,6 +1037,8 @@ golang.org/x/tools v0.13.0/go.mod h1:HvlwmtVNQAhOuCjW7xxvovg8wbNq7LwfXh/k7wXUl58
golang.org/x/tools v0.16.1/go.mod h1:kYVVN6I1mBNoB1OX+noeBjbRk4IUEPa7JJ+TJMEooJ0=
golang.org/x/tools v0.18.0/go.mod h1:GL7B4CwcLLeo59yx/9UWWuNOW1n3VZ4f5axWfML7Lcg=
golang.org/x/tools v0.20.0/go.mod h1:WvitBU7JJf6A4jOdg4S1tviW9bhUxkgeCui/0JHctQg=
+golang.org/x/tools v0.21.1-0.20240508182429-e35e4ccd0d2d/go.mod h1:aiJjzUbINMkxbQROHiO6hDPo2LHcIPhhQsa9DLh0yGk=
+golang.org/x/tools v0.23.0/go.mod h1:pnu6ufv6vQkll6szChhK3C3L/ruaIv5eBeztNG8wtsI=
golang.org/x/xerrors v0.0.0-20220907171357-04be3eba64a2 h1:H2TDz8ibqkAF6YGhCdN3jS9O0/s90v0rJh3X/OLHEUk=
golang.org/x/xerrors v0.0.0-20220907171357-04be3eba64a2/go.mod h1:K8+ghG5WaK9qNqU5K3HdILfMLy1f3aNYFI/wnl100a8=
golang.org/x/xerrors v0.0.0-20231012003039-104605ab7028/go.mod h1:NDW/Ps6MPRej6fsCIbMTohpP40sJ/P/vI1MoTEGwX90=
@@ -1022,6 +1084,7 @@ google.golang.org/genproto/googleapis/api v0.0.0-20240213162025-012b6fc9bca9/go.
google.golang.org/genproto/googleapis/api v0.0.0-20240227224415-6ceb2ff114de h1:jFNzHPIeuzhdRwVhbZdiym9q0ory/xY3sA+v2wPg8I0=
google.golang.org/genproto/googleapis/api v0.0.0-20240227224415-6ceb2ff114de/go.mod h1:5iCWqnniDlqZHrd3neWVTOwvh/v6s3232omMecelax8=
google.golang.org/genproto/googleapis/api v0.0.0-20240318140521-94a12d6c2237/go.mod h1:Z5Iiy3jtmioajWHDGFk7CeugTyHtPvMHA4UTmUkyalE=
+google.golang.org/genproto/googleapis/api v0.0.0-20240528184218-531527333157 h1:7whR9kGa5LUwFtpLm2ArCEejtnxlGeLbAyjFY8sGNFw=
google.golang.org/genproto/googleapis/api v0.0.0-20240528184218-531527333157/go.mod h1:99sLkeliLXfdj2J75X3Ho+rrVCaJze0uwN7zDDkjPVU=
google.golang.org/genproto/googleapis/bytestream v0.0.0-20230530153820-e85fd2cbaebc h1:g3hIDl0jRNd9PPTs2uBzYuaD5mQuwOkZY0vSc0LR32o=
google.golang.org/genproto/googleapis/bytestream v0.0.0-20231030173426-d783a09b4405/go.mod h1:GRUCuLdzVqZte8+Dl/D4N25yLzcGqqWaYkeVOwulFqw=
@@ -1064,6 +1127,8 @@ k8s.io/kms v0.29.3/go.mod h1:TBGbJKpRUMk59neTMDMddjIDL+D4HuFUbpuiuzmOPg0=
k8s.io/kms v0.30.0 h1:ZlnD/ei5lpvUlPw6eLfVvH7d8i9qZ6HwUQgydNVks8g=
k8s.io/kms v0.30.0/go.mod h1:GrMurD0qk3G4yNgGcsCEmepqf9KyyIrTXYR2lyUOJC4=
k8s.io/kms v0.30.1/go.mod h1:GrMurD0qk3G4yNgGcsCEmepqf9KyyIrTXYR2lyUOJC4=
+k8s.io/kms v0.31.0 h1:KchILPfB1ZE+ka7223mpU5zeFNkmb45jl7RHnlImUaI=
+k8s.io/kms v0.31.0/go.mod h1:OZKwl1fan3n3N5FFxnW5C4V3ygrah/3YXeJWS3O6+94=
k8s.io/kube-openapi v0.0.0-20240228011516-70dd3763d340/go.mod h1:yD4MZYeKMBwQKVht279WycxKyM84kkAx2DPrTXaeb98=
k8s.io/utils v0.0.0-20210802155522-efc7438f0176/go.mod h1:jPW/WVKK9YHAvNhRxK0md/EJ228hCsBRufyofKtW8HA=
k8s.io/utils v0.0.0-20230726121419-3b25d923346b/go.mod h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0=
@@ -1088,6 +1153,8 @@ rsc.io/sampler v1.3.0 h1:7uVkIFmeBqHfdjD+gZwtXXI+RODJ2Wc4O7MPEh/QiW4=
sigs.k8s.io/apiserver-network-proxy/konnectivity-client v0.28.0/go.mod h1:VHVDI/KrK4fjnV61bE2g3sA7tiETLn8sooImelsCx3Y=
sigs.k8s.io/apiserver-network-proxy/konnectivity-client v0.29.0 h1:/U5vjBbQn3RChhv7P11uhYvCSm5G2GaIi5AIGBS6r4c=
sigs.k8s.io/apiserver-network-proxy/konnectivity-client v0.29.0/go.mod h1:z7+wmGM2dfIiLRfrC6jb5kV2Mq/sK1ZP303cxzkV5Y4=
+sigs.k8s.io/apiserver-network-proxy/konnectivity-client v0.30.3 h1:2770sDpzrjjsAtVhSeUFseziht227YAWYHLGNM8QPwY=
+sigs.k8s.io/apiserver-network-proxy/konnectivity-client v0.30.3/go.mod h1:Ve9uj1L+deCXFrPOk1LpFXqTg7LCFzFso6PA48q/XZw=
sigs.k8s.io/structured-merge-diff/v4 v4.2.3/go.mod h1:qjx8mGObPmV2aSZepjQjbmb2ihdVs8cGKBraizNC69E=
sigs.k8s.io/yaml v1.2.0/go.mod h1:yfXDCHCao9+ENCvLSE62v9VSji2MKu5jeNfTrofGhJc=
sigs.k8s.io/yaml v1.3.0/go.mod h1:GeOyir5tyXNByN85N/dRIT9es5UQNerPYEKK56eTBm8=
diff --git a/internal/ingress/controller/controller.go b/internal/ingress/controller/controller.go
index 9250ded08..568edc483 100644
--- a/internal/ingress/controller/controller.go
+++ b/internal/ingress/controller/controller.go
@@ -108,6 +108,8 @@ type Configuration struct {
EnableMetrics bool
MetricsPerHost bool
MetricsBuckets *collectors.HistogramBuckets
+ MetricsBucketFactor float64
+ MetricsMaxBuckets uint32
ReportStatusClasses bool
ExcludeSocketMetrics []string
diff --git a/internal/ingress/metric/collectors/socket.go b/internal/ingress/metric/collectors/socket.go
index 863bbb62e..d0b57eb43 100644
--- a/internal/ingress/metric/collectors/socket.go
+++ b/internal/ingress/metric/collectors/socket.go
@@ -99,7 +99,7 @@ var requestTags = []string{
// NewSocketCollector creates a new SocketCollector instance using
// the ingress watch namespace and class used by the controller
-func NewSocketCollector(pod, namespace, class string, metricsPerHost, reportStatusClasses bool, buckets HistogramBuckets, excludeMetrics []string) (*SocketCollector, error) {
+func NewSocketCollector(pod, namespace, class string, metricsPerHost, reportStatusClasses bool, buckets HistogramBuckets, bucketFactor float64, maxBuckets uint32, excludeMetrics []string) (*SocketCollector, error) {
socket := "/tmp/nginx/prometheus-nginx.socket"
// unix sockets must be unlink()ed before being used
//nolint:errcheck // Ignore unlink error
@@ -144,11 +144,13 @@ func NewSocketCollector(pod, namespace, class string, metricsPerHost, reportStat
connectTime: histogramMetric(
&prometheus.HistogramOpts{
- Name: "connect_duration_seconds",
- Help: "The time spent on establishing a connection with the upstream server",
- Namespace: PrometheusNamespace,
- ConstLabels: constLabels,
- Buckets: buckets.TimeBuckets,
+ Name: "connect_duration_seconds",
+ Help: "The time spent on establishing a connection with the upstream server",
+ Namespace: PrometheusNamespace,
+ ConstLabels: constLabels,
+ Buckets: buckets.TimeBuckets,
+ NativeHistogramBucketFactor: bucketFactor,
+ NativeHistogramMaxBucketNumber: maxBuckets,
},
requestTags,
em,
@@ -157,11 +159,13 @@ func NewSocketCollector(pod, namespace, class string, metricsPerHost, reportStat
headerTime: histogramMetric(
&prometheus.HistogramOpts{
- Name: "header_duration_seconds",
- Help: "The time spent on receiving first header from the upstream server",
- Namespace: PrometheusNamespace,
- ConstLabels: constLabels,
- Buckets: buckets.TimeBuckets,
+ Name: "header_duration_seconds",
+ Help: "The time spent on receiving first header from the upstream server",
+ Namespace: PrometheusNamespace,
+ ConstLabels: constLabels,
+ Buckets: buckets.TimeBuckets,
+ NativeHistogramBucketFactor: bucketFactor,
+ NativeHistogramMaxBucketNumber: maxBuckets,
},
requestTags,
em,
@@ -169,11 +173,13 @@ func NewSocketCollector(pod, namespace, class string, metricsPerHost, reportStat
),
responseTime: histogramMetric(
&prometheus.HistogramOpts{
- Name: "response_duration_seconds",
- Help: "The time spent on receiving the response from the upstream server",
- Namespace: PrometheusNamespace,
- ConstLabels: constLabels,
- Buckets: buckets.TimeBuckets,
+ Name: "response_duration_seconds",
+ Help: "The time spent on receiving the response from the upstream server",
+ Namespace: PrometheusNamespace,
+ ConstLabels: constLabels,
+ Buckets: buckets.TimeBuckets,
+ NativeHistogramBucketFactor: bucketFactor,
+ NativeHistogramMaxBucketNumber: maxBuckets,
},
requestTags,
em,
@@ -182,11 +188,13 @@ func NewSocketCollector(pod, namespace, class string, metricsPerHost, reportStat
requestTime: histogramMetric(
&prometheus.HistogramOpts{
- Name: "request_duration_seconds",
- Help: "The request processing time in milliseconds",
- Namespace: PrometheusNamespace,
- ConstLabels: constLabels,
- Buckets: buckets.TimeBuckets,
+ Name: "request_duration_seconds",
+ Help: "The request processing time in milliseconds",
+ Namespace: PrometheusNamespace,
+ ConstLabels: constLabels,
+ Buckets: buckets.TimeBuckets,
+ NativeHistogramBucketFactor: bucketFactor,
+ NativeHistogramMaxBucketNumber: maxBuckets,
},
requestTags,
em,
@@ -195,11 +203,13 @@ func NewSocketCollector(pod, namespace, class string, metricsPerHost, reportStat
responseLength: histogramMetric(
&prometheus.HistogramOpts{
- Name: "response_size",
- Help: "The response length (including request line, header, and request body)",
- Namespace: PrometheusNamespace,
- ConstLabels: constLabels,
- Buckets: buckets.LengthBuckets,
+ Name: "response_size",
+ Help: "The response length (including request line, header, and request body)",
+ Namespace: PrometheusNamespace,
+ ConstLabels: constLabels,
+ Buckets: buckets.LengthBuckets,
+ NativeHistogramBucketFactor: bucketFactor,
+ NativeHistogramMaxBucketNumber: maxBuckets,
},
requestTags,
em,
@@ -208,11 +218,13 @@ func NewSocketCollector(pod, namespace, class string, metricsPerHost, reportStat
requestLength: histogramMetric(
&prometheus.HistogramOpts{
- Name: "request_size",
- Help: "The request length (including request line, header, and request body)",
- Namespace: PrometheusNamespace,
- ConstLabels: constLabels,
- Buckets: buckets.LengthBuckets,
+ Name: "request_size",
+ Help: "The request length (including request line, header, and request body)",
+ Namespace: PrometheusNamespace,
+ ConstLabels: constLabels,
+ Buckets: buckets.LengthBuckets,
+ NativeHistogramBucketFactor: bucketFactor,
+ NativeHistogramMaxBucketNumber: maxBuckets,
},
requestTags,
em,
diff --git a/internal/ingress/metric/collectors/socket_test.go b/internal/ingress/metric/collectors/socket_test.go
index 2113b4725..a8261a9ca 100644
--- a/internal/ingress/metric/collectors/socket_test.go
+++ b/internal/ingress/metric/collectors/socket_test.go
@@ -83,6 +83,9 @@ func TestCollector(t *testing.T) {
prometheus.ExponentialBuckets(10, 10, 7),
}
+ bucketFactor := 1.1
+ maxBuckets := uint32(100)
+
cases := []struct {
name string
data []string
@@ -594,7 +597,7 @@ func TestCollector(t *testing.T) {
t.Run(c.name, func(t *testing.T) {
registry := prometheus.NewPedanticRegistry()
- sc, err := NewSocketCollector("pod", "default", "ingress", true, c.useStatusClasses, buckets, c.excludeMetrics)
+ sc, err := NewSocketCollector("pod", "default", "ingress", true, c.useStatusClasses, buckets, bucketFactor, maxBuckets, c.excludeMetrics)
if err != nil {
t.Errorf("%v: unexpected error creating new SocketCollector: %v", c.name, err)
}
diff --git a/internal/ingress/metric/main.go b/internal/ingress/metric/main.go
index 93c31622c..99128c3c6 100644
--- a/internal/ingress/metric/main.go
+++ b/internal/ingress/metric/main.go
@@ -71,7 +71,7 @@ type collector struct {
}
// NewCollector creates a new metric collector the for ingress controller
-func NewCollector(metricsPerHost, reportStatusClasses bool, registry *prometheus.Registry, ingressclass string, buckets collectors.HistogramBuckets, excludedSocketMetrics []string) (Collector, error) {
+func NewCollector(metricsPerHost, reportStatusClasses bool, registry *prometheus.Registry, ingressclass string, buckets collectors.HistogramBuckets, bucketFactor float64, maxBuckets uint32, excludedSocketMetrics []string) (Collector, error) {
podNamespace := os.Getenv("POD_NAMESPACE")
if podNamespace == "" {
podNamespace = "default"
@@ -89,7 +89,7 @@ func NewCollector(metricsPerHost, reportStatusClasses bool, registry *prometheus
return nil, err
}
- s, err := collectors.NewSocketCollector(podName, podNamespace, ingressclass, metricsPerHost, reportStatusClasses, buckets, excludedSocketMetrics)
+ s, err := collectors.NewSocketCollector(podName, podNamespace, ingressclass, metricsPerHost, reportStatusClasses, buckets, bucketFactor, maxBuckets, excludedSocketMetrics)
if err != nil {
return nil, err
}
diff --git a/pkg/flags/flags.go b/pkg/flags/flags.go
index aed7d5c9a..15da701e7 100644
--- a/pkg/flags/flags.go
+++ b/pkg/flags/flags.go
@@ -183,6 +183,8 @@ Requires the update-status parameter.`)
timeBuckets = flags.Float64Slice("time-buckets", prometheus.DefBuckets, "Set of buckets which will be used for prometheus histogram metrics such as RequestTime, ResponseTime.")
lengthBuckets = flags.Float64Slice("length-buckets", prometheus.LinearBuckets(10, 10, 10), "Set of buckets which will be used for prometheus histogram metrics such as RequestLength, ResponseLength.")
sizeBuckets = flags.Float64Slice("size-buckets", prometheus.ExponentialBuckets(10, 10, 7), "Set of buckets which will be used for prometheus histogram metrics such as BytesSent.")
+ bucketFactor = flags.Float64("bucket-factor", 0, "Bucket factor for native histograms. Value must be > 1 for enabling native histograms.")
+ maxBuckets = flags.Uint32("max-buckets", 100, "Maximum number of buckets for native histograms.")
excludeSocketMetrics = flags.StringSlice("exclude-socket-metrics", []string{}, "et of socket request metrics to exclude which won't be exported nor being calculated. E.g. 'nginx_ingress_controller_success,nginx_ingress_controller_header_duration_seconds'.")
monitorMaxBatchSize = flags.Int("monitor-max-batch-size", 10000, "Max batch size of NGINX metrics.")
@@ -339,6 +341,8 @@ https://blog.maxmind.com/2019/12/18/significant-changes-to-accessing-and-using-g
EnableMetrics: *enableMetrics,
MetricsPerHost: *metricsPerHost,
MetricsBuckets: histogramBuckets,
+ MetricsBucketFactor: *bucketFactor,
+ MetricsMaxBuckets: *maxBuckets,
ReportStatusClasses: *reportStatusClasses,
ExcludeSocketMetrics: *excludeSocketMetrics,
MonitorMaxBatchSize: *monitorMaxBatchSize,
From 24450ea509b20937f1e6b7c6010d892cba80f9ac Mon Sep 17 00:00:00 2001
From: lou-lan
Date: Sat, 24 Aug 2024 04:10:20 +0800
Subject: [PATCH 200/283] Add custom code handling for temporal redirect
(#10651)
Co-authored-by: Ricardo Katz
---
.../nginx-configuration/annotations-risk.md | 1 +
.../nginx-configuration/annotations.md | 5 ++
.../ingress/annotations/redirect/redirect.go | 23 ++++++++-
.../annotations/redirect/redirect_test.go | 47 +++++++++++++++++--
4 files changed, 70 insertions(+), 6 deletions(-)
diff --git a/docs/user-guide/nginx-configuration/annotations-risk.md b/docs/user-guide/nginx-configuration/annotations-risk.md
index b53860174..890608b4b 100755
--- a/docs/user-guide/nginx-configuration/annotations-risk.md
+++ b/docs/user-guide/nginx-configuration/annotations-risk.md
@@ -108,6 +108,7 @@
| Redirect | permanent-redirect | Medium | location |
| Redirect | permanent-redirect-code | Low | location |
| Redirect | temporal-redirect | Medium | location |
+| Redirect | temporal-redirect-code | Low | location |
| Rewrite | app-root | Medium | location |
| Rewrite | force-ssl-redirect | Medium | location |
| Rewrite | preserve-trailing-slash | Medium | location |
diff --git a/docs/user-guide/nginx-configuration/annotations.md b/docs/user-guide/nginx-configuration/annotations.md
index 34c5f18d5..7de05d32c 100755
--- a/docs/user-guide/nginx-configuration/annotations.md
+++ b/docs/user-guide/nginx-configuration/annotations.md
@@ -71,6 +71,7 @@ You can add these Kubernetes annotations to specific Ingress objects to customiz
|[nginx.ingress.kubernetes.io/permanent-redirect](#permanent-redirect)|string|
|[nginx.ingress.kubernetes.io/permanent-redirect-code](#permanent-redirect-code)|number|
|[nginx.ingress.kubernetes.io/temporal-redirect](#temporal-redirect)|string|
+|[nginx.ingress.kubernetes.io/temporal-redirect-code](#temporal-redirect-code)|number|
|[nginx.ingress.kubernetes.io/preserve-trailing-slash](#server-side-https-enforcement-through-redirect)|"true" or "false"|
|[nginx.ingress.kubernetes.io/proxy-body-size](#custom-max-body-size)|string|
|[nginx.ingress.kubernetes.io/proxy-cookie-domain](#proxy-cookie-domain)|string|
@@ -610,6 +611,10 @@ This annotation allows you to modify the status code used for permanent redirect
### Temporal Redirect
This annotation allows you to return a temporal redirect (Return Code 302) instead of sending data to the upstream. For example `nginx.ingress.kubernetes.io/temporal-redirect: https://www.google.com` would redirect everything to Google with a Return Code of 302 (Moved Temporarily)
+### Temporal Redirect Code
+
+This annotation allows you to modify the status code used for temporal redirects. For example `nginx.ingress.kubernetes.io/temporal-redirect-code: '307'` would return your temporal-redirect with a 307.
+
### SSL Passthrough
The annotation `nginx.ingress.kubernetes.io/ssl-passthrough` instructs the controller to send TLS connections directly
diff --git a/internal/ingress/annotations/redirect/redirect.go b/internal/ingress/annotations/redirect/redirect.go
index e774b2fe8..0716e1ce1 100644
--- a/internal/ingress/annotations/redirect/redirect.go
+++ b/internal/ingress/annotations/redirect/redirect.go
@@ -28,7 +28,10 @@ import (
"k8s.io/ingress-nginx/internal/ingress/resolver"
)
-const defaultPermanentRedirectCode = http.StatusMovedPermanently
+const (
+ defaultPermanentRedirectCode = http.StatusMovedPermanently
+ defaultTemporalRedirectCode = http.StatusFound
+)
// Config returns the redirect configuration for an Ingress rule
type Config struct {
@@ -40,6 +43,7 @@ type Config struct {
const (
fromToWWWRedirAnnotation = "from-to-www-redirect"
temporalRedirectAnnotation = "temporal-redirect"
+ temporalRedirectAnnotationCode = "temporal-redirect-code"
permanentRedirectAnnotation = "permanent-redirect"
permanentRedirectAnnotationCode = "permanent-redirect-code"
)
@@ -60,6 +64,12 @@ var redirectAnnotations = parser.Annotation{
Documentation: `This annotation allows you to return a temporal redirect (Return Code 302) instead of sending data to the upstream.
For example setting this annotation to https://www.google.com would redirect everything to Google with a Return Code of 302 (Moved Temporarily).`,
},
+ temporalRedirectAnnotationCode: {
+ Validator: parser.ValidateInt,
+ Scope: parser.AnnotationScopeLocation,
+ Risk: parser.AnnotationRiskLow, // Low, as it allows just a set of options
+ Documentation: `This annotation allows you to modify the status code used for temporal redirects.`,
+ },
permanentRedirectAnnotation: {
Validator: parser.ValidateRegex(parser.URLIsValidRegex, false),
Scope: parser.AnnotationScopeLocation,
@@ -105,13 +115,22 @@ func (r redirect) Parse(ing *networking.Ingress) (interface{}, error) {
}
if tr != "" {
+ trc, err := parser.GetIntAnnotation(temporalRedirectAnnotationCode, ing, r.annotationConfig.Annotations)
+ if err != nil && !errors.IsMissingAnnotations(err) {
+ return nil, err
+ }
+
+ if trc < http.StatusMultipleChoices || trc > http.StatusTemporaryRedirect {
+ trc = defaultTemporalRedirectCode
+ }
+
if err := isValidURL(tr); err != nil {
return nil, err
}
return &Config{
URL: tr,
- Code: http.StatusFound,
+ Code: trc,
FromToWWW: r3w,
}, nil
}
diff --git a/internal/ingress/annotations/redirect/redirect_test.go b/internal/ingress/annotations/redirect/redirect_test.go
index bd2f98211..b5c34879e 100644
--- a/internal/ingress/annotations/redirect/redirect_test.go
+++ b/internal/ingress/annotations/redirect/redirect_test.go
@@ -103,7 +103,7 @@ func TestPermanentRedirectWithCustomCode(t *testing.T) {
}
}
-func TestTemporalRedirect(t *testing.T) {
+func TestTemporalRedirectWithDefaultCode(t *testing.T) {
rp := NewParser(resolver.Mock{})
if rp == nil {
t.Fatalf("Expected a parser.IngressAnnotation but returned nil")
@@ -128,10 +128,49 @@ func TestTemporalRedirect(t *testing.T) {
t.Errorf("Expected %v as redirect but returned %s", defRedirectURL, redirect.URL)
}
if redirect.Code != http.StatusFound {
- t.Errorf("Expected %v as redirect to have a code %d but had %d", defRedirectURL, defaultPermanentRedirectCode, redirect.Code)
+ t.Errorf("Expected %v as redirect to have a code %d but had %d", defRedirectURL, http.StatusFound, redirect.Code)
}
- if redirect.FromToWWW != true {
- t.Errorf("Expected %v as redirect to have from-to-www as %v but got %v", defRedirectURL, true, redirect.FromToWWW)
+}
+
+func TestTemporalRedirectWithCustomCode(t *testing.T) {
+ rp := NewParser(resolver.Mock{})
+ if rp == nil {
+ t.Fatalf("Expected a parser.IngressAnnotation but returned nil")
+ }
+
+ testCases := map[string]struct {
+ input int
+ expectOutput int
+ }{
+ "valid code": {http.StatusTemporaryRedirect, http.StatusTemporaryRedirect},
+ "invalid code": {http.StatusTeapot, http.StatusFound},
+ }
+
+ for n, tc := range testCases {
+ t.Run(n, func(t *testing.T) {
+ ing := new(networking.Ingress)
+
+ data := make(map[string]string, 2)
+ data[parser.GetAnnotationWithPrefix(fromToWWWRedirAnnotation)] = "true"
+ data[parser.GetAnnotationWithPrefix(temporalRedirectAnnotation)] = defRedirectURL
+ data[parser.GetAnnotationWithPrefix(temporalRedirectAnnotationCode)] = strconv.Itoa(tc.input)
+ ing.SetAnnotations(data)
+
+ i, err := rp.Parse(ing)
+ if err != nil {
+ t.Errorf("Unexpected error with ingress: %v", err)
+ }
+ redirect, ok := i.(*Config)
+ if !ok {
+ t.Errorf("Expected a Redirect type")
+ }
+ if redirect.URL != defRedirectURL {
+ t.Errorf("Expected %v as redirect but returned %s", defRedirectURL, redirect.URL)
+ }
+ if redirect.Code != tc.expectOutput {
+ t.Errorf("Expected %v as redirect to have a code %d but had %d", defRedirectURL, tc.expectOutput, redirect.Code)
+ }
+ })
}
}
From 5243b9b90a3f5fcc42614a4331c723e2a33b4a3a Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Sat, 24 Aug 2024 13:18:44 +0200
Subject: [PATCH 201/283] Revert "docs: Add deployment for AWS NLB Proxy."
(#11857)
---
.../deploy.yaml | 673 ------------------
.../kustomization.yaml | 11 -
2 files changed, 684 deletions(-)
delete mode 100644 deploy/static/provider/aws/nlb-proxy-with-tls-termination/deploy.yaml
delete mode 100644 deploy/static/provider/aws/nlb-proxy-with-tls-termination/kustomization.yaml
diff --git a/deploy/static/provider/aws/nlb-proxy-with-tls-termination/deploy.yaml b/deploy/static/provider/aws/nlb-proxy-with-tls-termination/deploy.yaml
deleted file mode 100644
index 5a3987875..000000000
--- a/deploy/static/provider/aws/nlb-proxy-with-tls-termination/deploy.yaml
+++ /dev/null
@@ -1,673 +0,0 @@
-apiVersion: v1
-kind: Namespace
-metadata:
- labels:
- app.kubernetes.io/instance: ingress-nginx
- app.kubernetes.io/name: ingress-nginx
- name: ingress-nginx
----
-apiVersion: v1
-automountServiceAccountToken: true
-kind: ServiceAccount
-metadata:
- labels:
- app.kubernetes.io/component: controller
- app.kubernetes.io/instance: ingress-nginx
- app.kubernetes.io/name: ingress-nginx
- app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.5.1
- name: ingress-nginx
- namespace: ingress-nginx
----
-apiVersion: v1
-kind: ServiceAccount
-metadata:
- labels:
- app.kubernetes.io/component: admission-webhook
- app.kubernetes.io/instance: ingress-nginx
- app.kubernetes.io/name: ingress-nginx
- app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.5.1
- name: ingress-nginx-admission
- namespace: ingress-nginx
----
-apiVersion: rbac.authorization.k8s.io/v1
-kind: Role
-metadata:
- labels:
- app.kubernetes.io/component: controller
- app.kubernetes.io/instance: ingress-nginx
- app.kubernetes.io/name: ingress-nginx
- app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.5.1
- name: ingress-nginx
- namespace: ingress-nginx
-rules:
-- apiGroups:
- - ""
- resources:
- - namespaces
- verbs:
- - get
-- apiGroups:
- - ""
- resources:
- - configmaps
- - pods
- - secrets
- - endpoints
- verbs:
- - get
- - list
- - watch
-- apiGroups:
- - ""
- resources:
- - services
- verbs:
- - get
- - list
- - watch
-- apiGroups:
- - networking.k8s.io
- resources:
- - ingresses
- verbs:
- - get
- - list
- - watch
-- apiGroups:
- - networking.k8s.io
- resources:
- - ingresses/status
- verbs:
- - update
-- apiGroups:
- - networking.k8s.io
- resources:
- - ingressclasses
- verbs:
- - get
- - list
- - watch
-- apiGroups:
- - ""
- resourceNames:
- - ingress-nginx-leader
- resources:
- - configmaps
- verbs:
- - get
- - update
-- apiGroups:
- - ""
- resources:
- - configmaps
- verbs:
- - create
-- apiGroups:
- - coordination.k8s.io
- resourceNames:
- - ingress-nginx-leader
- resources:
- - leases
- verbs:
- - get
- - update
-- apiGroups:
- - coordination.k8s.io
- resources:
- - leases
- verbs:
- - create
-- apiGroups:
- - ""
- resources:
- - events
- verbs:
- - create
- - patch
-- apiGroups:
- - discovery.k8s.io
- resources:
- - endpointslices
- verbs:
- - list
- - watch
- - get
----
-apiVersion: rbac.authorization.k8s.io/v1
-kind: Role
-metadata:
- labels:
- app.kubernetes.io/component: admission-webhook
- app.kubernetes.io/instance: ingress-nginx
- app.kubernetes.io/name: ingress-nginx
- app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.5.1
- name: ingress-nginx-admission
- namespace: ingress-nginx
-rules:
-- apiGroups:
- - ""
- resources:
- - secrets
- verbs:
- - get
- - create
----
-apiVersion: rbac.authorization.k8s.io/v1
-kind: ClusterRole
-metadata:
- labels:
- app.kubernetes.io/instance: ingress-nginx
- app.kubernetes.io/name: ingress-nginx
- app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.5.1
- name: ingress-nginx
-rules:
-- apiGroups:
- - ""
- resources:
- - configmaps
- - endpoints
- - nodes
- - pods
- - secrets
- - namespaces
- verbs:
- - list
- - watch
-- apiGroups:
- - coordination.k8s.io
- resources:
- - leases
- verbs:
- - list
- - watch
-- apiGroups:
- - ""
- resources:
- - nodes
- verbs:
- - get
-- apiGroups:
- - ""
- resources:
- - services
- verbs:
- - get
- - list
- - watch
-- apiGroups:
- - networking.k8s.io
- resources:
- - ingresses
- verbs:
- - get
- - list
- - watch
-- apiGroups:
- - ""
- resources:
- - events
- verbs:
- - create
- - patch
-- apiGroups:
- - networking.k8s.io
- resources:
- - ingresses/status
- verbs:
- - update
-- apiGroups:
- - networking.k8s.io
- resources:
- - ingressclasses
- verbs:
- - get
- - list
- - watch
-- apiGroups:
- - discovery.k8s.io
- resources:
- - endpointslices
- verbs:
- - list
- - watch
- - get
----
-apiVersion: rbac.authorization.k8s.io/v1
-kind: ClusterRole
-metadata:
- labels:
- app.kubernetes.io/component: admission-webhook
- app.kubernetes.io/instance: ingress-nginx
- app.kubernetes.io/name: ingress-nginx
- app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.5.1
- name: ingress-nginx-admission
-rules:
-- apiGroups:
- - admissionregistration.k8s.io
- resources:
- - validatingwebhookconfigurations
- verbs:
- - get
- - update
----
-apiVersion: rbac.authorization.k8s.io/v1
-kind: RoleBinding
-metadata:
- labels:
- app.kubernetes.io/component: controller
- app.kubernetes.io/instance: ingress-nginx
- app.kubernetes.io/name: ingress-nginx
- app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.5.1
- name: ingress-nginx
- namespace: ingress-nginx
-roleRef:
- apiGroup: rbac.authorization.k8s.io
- kind: Role
- name: ingress-nginx
-subjects:
-- kind: ServiceAccount
- name: ingress-nginx
- namespace: ingress-nginx
----
-apiVersion: rbac.authorization.k8s.io/v1
-kind: RoleBinding
-metadata:
- labels:
- app.kubernetes.io/component: admission-webhook
- app.kubernetes.io/instance: ingress-nginx
- app.kubernetes.io/name: ingress-nginx
- app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.5.1
- name: ingress-nginx-admission
- namespace: ingress-nginx
-roleRef:
- apiGroup: rbac.authorization.k8s.io
- kind: Role
- name: ingress-nginx-admission
-subjects:
-- kind: ServiceAccount
- name: ingress-nginx-admission
- namespace: ingress-nginx
----
-apiVersion: rbac.authorization.k8s.io/v1
-kind: ClusterRoleBinding
-metadata:
- labels:
- app.kubernetes.io/instance: ingress-nginx
- app.kubernetes.io/name: ingress-nginx
- app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.5.1
- name: ingress-nginx
-roleRef:
- apiGroup: rbac.authorization.k8s.io
- kind: ClusterRole
- name: ingress-nginx
-subjects:
-- kind: ServiceAccount
- name: ingress-nginx
- namespace: ingress-nginx
----
-apiVersion: rbac.authorization.k8s.io/v1
-kind: ClusterRoleBinding
-metadata:
- labels:
- app.kubernetes.io/component: admission-webhook
- app.kubernetes.io/instance: ingress-nginx
- app.kubernetes.io/name: ingress-nginx
- app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.5.1
- name: ingress-nginx-admission
-roleRef:
- apiGroup: rbac.authorization.k8s.io
- kind: ClusterRole
- name: ingress-nginx-admission
-subjects:
-- kind: ServiceAccount
- name: ingress-nginx-admission
- namespace: ingress-nginx
----
-apiVersion: v1
-data:
- allow-snippet-annotations: "true"
- proxy-body-size: "8m"
- ssl-redirect: "false"
- use-forwarded-headers: "true"
- compute-full-forwarded-for: "true"
- use-proxy-protocol: "true" # No modify X-Forwarded-* HTTPS from NLB TLS.
- force-ssl-redirect: "true" # Redirect HTTP -> HTTPS.
-
-kind: ConfigMap
-metadata:
- labels:
- app.kubernetes.io/component: controller
- app.kubernetes.io/instance: ingress-nginx
- app.kubernetes.io/name: ingress-nginx
- app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.5.1
- name: ingress-nginx-controller
- namespace: ingress-nginx
----
-apiVersion: v1
-kind: Service
-metadata:
- annotations:
- service.beta.kubernetes.io/aws-load-balancer-type: "external"
- service.beta.kubernetes.io/aws-load-balancer-backend-protocol: "tcp"
- service.beta.kubernetes.io/aws-load-balancer-nlb-target-type: "ip"
- service.beta.kubernetes.io/aws-load-balancer-scheme: "internet-facing"
- service.beta.kubernetes.io/aws-load-balancer-proxy-protocol: "*"
- service.beta.kubernetes.io/aws-load-balancer-ssl-cert: "arn:aws:acm:us-west-2:XXXXXXXX:certificate/XXXXXX-XXXXXXX-XXXXXXX-XXXXXXXX"
- service.beta.kubernetes.io/aws-load-balancer-ssl-ports: "443"
- labels:
- app.kubernetes.io/component: controller
- app.kubernetes.io/instance: ingress-nginx
- app.kubernetes.io/name: ingress-nginx
- app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.5.1
- name: ingress-nginx-controller
- namespace: ingress-nginx
-spec:
- externalTrafficPolicy: Local
- ipFamilies:
- - IPv4
- ipFamilyPolicy: SingleStack
- ports:
- - appProtocol: http
- name: http
- port: 80
- protocol: TCP
- targetPort: http
- - appProtocol: https
- name: https
- port: 443
- protocol: TCP
- targetPort: https
- selector:
- app.kubernetes.io/component: controller
- app.kubernetes.io/instance: ingress-nginx
- app.kubernetes.io/name: ingress-nginx
- type: LoadBalancer
----
-apiVersion: v1
-kind: Service
-metadata:
- labels:
- app.kubernetes.io/component: controller
- app.kubernetes.io/instance: ingress-nginx
- app.kubernetes.io/name: ingress-nginx
- app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.5.1
- name: ingress-nginx-controller-admission
- namespace: ingress-nginx
-spec:
- ports:
- - appProtocol: https
- name: https-webhook
- port: 443
- targetPort: webhook
- selector:
- app.kubernetes.io/component: controller
- app.kubernetes.io/instance: ingress-nginx
- app.kubernetes.io/name: ingress-nginx
- type: ClusterIP
----
-apiVersion: apps/v1
-kind: Deployment
-metadata:
- labels:
- app.kubernetes.io/component: controller
- app.kubernetes.io/instance: ingress-nginx
- app.kubernetes.io/name: ingress-nginx
- app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.5.1
- name: ingress-nginx-controller
- namespace: ingress-nginx
-spec:
- minReadySeconds: 0
- revisionHistoryLimit: 10
- selector:
- matchLabels:
- app.kubernetes.io/component: controller
- app.kubernetes.io/instance: ingress-nginx
- app.kubernetes.io/name: ingress-nginx
- template:
- metadata:
- labels:
- app.kubernetes.io/component: controller
- app.kubernetes.io/instance: ingress-nginx
- app.kubernetes.io/name: ingress-nginx
- spec:
- containers:
- - args:
- - /nginx-ingress-controller
- - --publish-service=$(POD_NAMESPACE)/ingress-nginx-controller
- - --election-id=ingress-nginx-leader
- - --controller-class=k8s.io/ingress-nginx
- - --ingress-class=nginx
- - --configmap=$(POD_NAMESPACE)/ingress-nginx-controller
- - --validating-webhook=:8443
- - --validating-webhook-certificate=/usr/local/certificates/cert
- - --validating-webhook-key=/usr/local/certificates/key
- env:
- - name: POD_NAME
- valueFrom:
- fieldRef:
- fieldPath: metadata.name
- - name: POD_NAMESPACE
- valueFrom:
- fieldRef:
- fieldPath: metadata.namespace
- - name: LD_PRELOAD
- value: /usr/local/lib/libmimalloc.so
- image: registry.k8s.io/ingress-nginx/controller:v1.5.1@sha256:4ba73c697770664c1e00e9f968de14e08f606ff961c76e5d7033a4a9c593c629
- imagePullPolicy: IfNotPresent
- lifecycle:
- preStop:
- exec:
- command:
- - /wait-shutdown
- livenessProbe:
- failureThreshold: 5
- httpGet:
- path: /healthz
- port: 10254
- scheme: HTTP
- initialDelaySeconds: 10
- periodSeconds: 10
- successThreshold: 1
- timeoutSeconds: 1
- name: controller
- ports:
- - containerPort: 80
- name: http
- protocol: TCP
- - containerPort: 443
- name: https
- protocol: TCP
- - containerPort: 8443
- name: webhook
- protocol: TCP
- readinessProbe:
- failureThreshold: 3
- httpGet:
- path: /healthz
- port: 10254
- scheme: HTTP
- initialDelaySeconds: 10
- periodSeconds: 10
- successThreshold: 1
- timeoutSeconds: 1
- resources:
- requests:
- cpu: 100m
- memory: 90Mi
- securityContext:
- allowPrivilegeEscalation: true
- capabilities:
- add:
- - NET_BIND_SERVICE
- drop:
- - ALL
- runAsUser: 101
- volumeMounts:
- - mountPath: /usr/local/certificates/
- name: webhook-cert
- readOnly: true
- dnsPolicy: ClusterFirst
- nodeSelector:
- kubernetes.io/os: linux
- serviceAccountName: ingress-nginx
- terminationGracePeriodSeconds: 300
- volumes:
- - name: webhook-cert
- secret:
- secretName: ingress-nginx-admission
----
-apiVersion: batch/v1
-kind: Job
-metadata:
- labels:
- app.kubernetes.io/component: admission-webhook
- app.kubernetes.io/instance: ingress-nginx
- app.kubernetes.io/name: ingress-nginx
- app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.5.1
- name: ingress-nginx-admission-create
- namespace: ingress-nginx
-spec:
- template:
- metadata:
- labels:
- app.kubernetes.io/component: admission-webhook
- app.kubernetes.io/instance: ingress-nginx
- app.kubernetes.io/name: ingress-nginx
- app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.5.1
- name: ingress-nginx-admission-create
- spec:
- containers:
- - args:
- - create
- - --host=ingress-nginx-controller-admission,ingress-nginx-controller-admission.$(POD_NAMESPACE).svc
- - --namespace=$(POD_NAMESPACE)
- - --secret-name=ingress-nginx-admission
- env:
- - name: POD_NAMESPACE
- valueFrom:
- fieldRef:
- fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v20220916-gd32f8c343@sha256:39c5b2e3310dc4264d638ad28d9d1d96c4cbb2b2dcfb52368fe4e3c63f61e10f
- imagePullPolicy: IfNotPresent
- name: create
- securityContext:
- allowPrivilegeEscalation: false
- nodeSelector:
- kubernetes.io/os: linux
- restartPolicy: OnFailure
- securityContext:
- fsGroup: 2000
- runAsNonRoot: true
- runAsUser: 2000
- serviceAccountName: ingress-nginx-admission
----
-apiVersion: batch/v1
-kind: Job
-metadata:
- labels:
- app.kubernetes.io/component: admission-webhook
- app.kubernetes.io/instance: ingress-nginx
- app.kubernetes.io/name: ingress-nginx
- app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.5.1
- name: ingress-nginx-admission-patch
- namespace: ingress-nginx
-spec:
- template:
- metadata:
- labels:
- app.kubernetes.io/component: admission-webhook
- app.kubernetes.io/instance: ingress-nginx
- app.kubernetes.io/name: ingress-nginx
- app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.5.1
- name: ingress-nginx-admission-patch
- spec:
- containers:
- - args:
- - patch
- - --webhook-name=ingress-nginx-admission
- - --namespace=$(POD_NAMESPACE)
- - --patch-mutating=false
- - --secret-name=ingress-nginx-admission
- - --patch-failure-policy=Fail
- env:
- - name: POD_NAMESPACE
- valueFrom:
- fieldRef:
- fieldPath: metadata.namespace
- image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v20220916-gd32f8c343@sha256:39c5b2e3310dc4264d638ad28d9d1d96c4cbb2b2dcfb52368fe4e3c63f61e10f
- imagePullPolicy: IfNotPresent
- name: patch
- securityContext:
- allowPrivilegeEscalation: false
- nodeSelector:
- kubernetes.io/os: linux
- restartPolicy: OnFailure
- securityContext:
- fsGroup: 2000
- runAsNonRoot: true
- runAsUser: 2000
- serviceAccountName: ingress-nginx-admission
----
-apiVersion: networking.k8s.io/v1
-kind: IngressClass
-metadata:
- labels:
- app.kubernetes.io/component: controller
- app.kubernetes.io/instance: ingress-nginx
- app.kubernetes.io/name: ingress-nginx
- app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.5.1
- name: nginx
-spec:
- controller: k8s.io/ingress-nginx
----
-apiVersion: admissionregistration.k8s.io/v1
-kind: ValidatingWebhookConfiguration
-metadata:
- labels:
- app.kubernetes.io/component: admission-webhook
- app.kubernetes.io/instance: ingress-nginx
- app.kubernetes.io/name: ingress-nginx
- app.kubernetes.io/part-of: ingress-nginx
- app.kubernetes.io/version: 1.5.1
- name: ingress-nginx-admission
-webhooks:
-- admissionReviewVersions:
- - v1
- clientConfig:
- service:
- name: ingress-nginx-controller-admission
- namespace: ingress-nginx
- path: /networking/v1/ingresses
- failurePolicy: Fail
- matchPolicy: Equivalent
- name: validate.nginx.ingress.kubernetes.io
- rules:
- - apiGroups:
- - networking.k8s.io
- apiVersions:
- - v1
- operations:
- - CREATE
- - UPDATE
- resources:
- - ingresses
- sideEffects: None
diff --git a/deploy/static/provider/aws/nlb-proxy-with-tls-termination/kustomization.yaml b/deploy/static/provider/aws/nlb-proxy-with-tls-termination/kustomization.yaml
deleted file mode 100644
index 51c1513c9..000000000
--- a/deploy/static/provider/aws/nlb-proxy-with-tls-termination/kustomization.yaml
+++ /dev/null
@@ -1,11 +0,0 @@
-# NOTE: kustomize is not supported. This file exists only to be able to reference it from bases.
-# https://kubectl.docs.kubernetes.io/references/kustomize/bases/
-#
-# ```
-# namespace: ingress-nginx
-# bases:
-# - github.com/kubernetes/ingress-nginx/tree/main/deploy/static/provider/aws/nlb-with-tls-termination
-# ```
-
-resources:
- - deploy.yaml
From 21cd966d1c817a5d6e677c270ae4719aaa4787f7 Mon Sep 17 00:00:00 2001
From: Ricardo Katz
Date: Sun, 25 Aug 2024 17:03:29 -0300
Subject: [PATCH 202/283] Remove global-rate-limit feature (#11851)
---
.../tests/controller-configmap_test.yaml | 8 -
docs/e2e-tests.md | 5 -
.../nginx-configuration/annotations-risk.md | 4 -
.../nginx-configuration/annotations.md | 44 ---
.../nginx-configuration/configmap.md | 22 --
images/nginx-1.25/rootfs/build.sh | 9 -
images/nginx/rootfs/build.sh | 9 -
internal/ingress/annotations/annotations.go | 3 -
.../annotations/globalratelimit/main.go | 179 ------------
.../annotations/globalratelimit/main_test.go | 211 --------------
internal/ingress/controller/config/config.go | 86 ++----
internal/ingress/controller/controller.go | 5 -
.../ingress/controller/template/configmap.go | 1 -
.../ingress/controller/template/template.go | 73 -----
.../controller/template/template_test.go | 83 ------
pkg/apis/ingress/types.go | 5 -
pkg/apis/ingress/types_equals.go | 3 -
rootfs/etc/nginx/lua/global_throttle.lua | 131 ---------
rootfs/etc/nginx/lua/lua_ingress.lua | 2 -
.../nginx/lua/test/global_throttle_test.lua | 258 ------------------
rootfs/etc/nginx/template/nginx.tmpl | 1 -
test/e2e/admission/admission.go | 27 --
test/e2e/annotations/globalratelimit.go | 88 ------
test/e2e/settings/globalratelimit.go | 96 -------
test/test-lua.sh | 1 -
25 files changed, 28 insertions(+), 1326 deletions(-)
delete mode 100644 internal/ingress/annotations/globalratelimit/main.go
delete mode 100644 internal/ingress/annotations/globalratelimit/main_test.go
delete mode 100644 rootfs/etc/nginx/lua/global_throttle.lua
delete mode 100644 rootfs/etc/nginx/lua/test/global_throttle_test.lua
delete mode 100644 test/e2e/annotations/globalratelimit.go
delete mode 100644 test/e2e/settings/globalratelimit.go
diff --git a/charts/ingress-nginx/tests/controller-configmap_test.yaml b/charts/ingress-nginx/tests/controller-configmap_test.yaml
index 9cfea9800..f0fc1c730 100644
--- a/charts/ingress-nginx/tests/controller-configmap_test.yaml
+++ b/charts/ingress-nginx/tests/controller-configmap_test.yaml
@@ -16,16 +16,8 @@ tests:
- it: should create a ConfigMap with templated values if `controller.config` contains templates
set:
controller.config:
- global-rate-limit-memcached-host: "memcached.{{ .Release.Namespace }}.svc.kubernetes.local"
- global-rate-limit-memcached-port: 11211
use-gzip: true
asserts:
- - equal:
- path: data.global-rate-limit-memcached-host
- value: memcached.NAMESPACE.svc.kubernetes.local
- - equal:
- path: data.global-rate-limit-memcached-port
- value: "11211"
- equal:
path: data.use-gzip
value: "true"
diff --git a/docs/e2e-tests.md b/docs/e2e-tests.md
index f288ec82f..c95603853 100644
--- a/docs/e2e-tests.md
+++ b/docs/e2e-tests.md
@@ -7,7 +7,6 @@ Do not try to edit it manually.
### [[Admission] admission controller](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/admission/admission.go#L39)
-- [reject ingress with global-rate-limit annotations when memcached is not configured](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/admission/admission.go#L47)
- [should not allow overlaps of host and paths without canary annotations](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/admission/admission.go#L74)
- [should allow overlaps of host and paths with canary annotation](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/admission/admission.go#L91)
- [should block ingress with invalid path](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/admission/admission.go#L112)
@@ -173,8 +172,6 @@ Do not try to edit it manually.
### [from-to-www-redirect](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/fromtowwwredirect.go#L31)
- [should redirect from www HTTP to HTTP](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/fromtowwwredirect.go#L38)
- [should redirect from www HTTPS to HTTPS](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/fromtowwwredirect.go#L64)
-### [annotation-global-rate-limit](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/globalratelimit.go#L30)
-- [generates correct configuration](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/globalratelimit.go#L38)
### [backend-protocol - GRPC](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/grpc.go#L45)
- [should use grpc_pass in the configuration file](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/grpc.go#L48)
- [should return OK for service with backend protocol GRPC](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/grpc.go#L71)
@@ -420,8 +417,6 @@ Do not try to edit it manually.
### [global-options](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/global_options.go#L28)
- [should have worker_rlimit_nofile option](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/global_options.go#L31)
- [should have worker_rlimit_nofile option and be independent on amount of worker processes](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/global_options.go#L37)
-### [settings-global-rate-limit](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/globalratelimit.go#L30)
-- [generates correct NGINX configuration](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/globalratelimit.go#L38)
### [GRPC](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/grpc.go#L39)
- [should set the correct GRPC Buffer Size](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/grpc.go#L42)
### [gzip](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/gzip.go#L30)
diff --git a/docs/user-guide/nginx-configuration/annotations-risk.md b/docs/user-guide/nginx-configuration/annotations-risk.md
index 890608b4b..3e3b93986 100755
--- a/docs/user-guide/nginx-configuration/annotations-risk.md
+++ b/docs/user-guide/nginx-configuration/annotations-risk.md
@@ -55,10 +55,6 @@
| ExternalAuth | auth-url | High | location |
| FastCGI | fastcgi-index | Medium | location |
| FastCGI | fastcgi-params-configmap | Medium | location |
-| GlobalRateLimit | global-rate-limit | Low | ingress |
-| GlobalRateLimit | global-rate-limit-ignored-cidrs | Medium | ingress |
-| GlobalRateLimit | global-rate-limit-key | High | ingress |
-| GlobalRateLimit | global-rate-limit-window | Low | ingress |
| HTTP2PushPreload | http2-push-preload | Low | location |
| LoadBalancing | load-balance | Low | location |
| Logs | enable-access-log | Low | location |
diff --git a/docs/user-guide/nginx-configuration/annotations.md b/docs/user-guide/nginx-configuration/annotations.md
index 7de05d32c..80ceccfa9 100755
--- a/docs/user-guide/nginx-configuration/annotations.md
+++ b/docs/user-guide/nginx-configuration/annotations.md
@@ -64,10 +64,6 @@ You can add these Kubernetes annotations to specific Ingress objects to customiz
|[nginx.ingress.kubernetes.io/http2-push-preload](#http2-push-preload)|"true" or "false"|
|[nginx.ingress.kubernetes.io/limit-connections](#rate-limiting)|number|
|[nginx.ingress.kubernetes.io/limit-rps](#rate-limiting)|number|
-|[nginx.ingress.kubernetes.io/global-rate-limit](#global-rate-limiting)|number|
-|[nginx.ingress.kubernetes.io/global-rate-limit-window](#global-rate-limiting)|duration|
-|[nginx.ingress.kubernetes.io/global-rate-limit-key](#global-rate-limiting)|string|
-|[nginx.ingress.kubernetes.io/global-rate-limit-ignored-cidrs](#global-rate-limiting)|string|
|[nginx.ingress.kubernetes.io/permanent-redirect](#permanent-redirect)|string|
|[nginx.ingress.kubernetes.io/permanent-redirect-code](#permanent-redirect-code)|number|
|[nginx.ingress.kubernetes.io/temporal-redirect](#temporal-redirect)|string|
@@ -560,46 +556,6 @@ To configure settings globally for all Ingress rules, the `limit-rate-after` and
The client IP address will be set based on the use of [PROXY protocol](./configmap.md#use-proxy-protocol) or from the `X-Forwarded-For` header value when [use-forwarded-headers](./configmap.md#use-forwarded-headers) is enabled.
-### Global Rate Limiting
-
-**Note:** Be careful when configuring both (Local) Rate Limiting and Global Rate Limiting at the same time.
-They are two completely different rate limiting implementations. Whichever limit exceeds first will reject the
-requests. It might be a good idea to configure both of them to ease load on Global Rate Limiting backend
-in cases of spike in traffic.
-
-The stock NGINX rate limiting does not share its counters among different NGINX instances.
-Given that most ingress-nginx deployments are elastic and number of replicas can change any day
-it is impossible to configure a proper rate limit using stock NGINX functionalities.
-Global Rate Limiting overcome this by using [lua-resty-global-throttle](https://github.com/ElvinEfendi/lua-resty-global-throttle). `lua-resty-global-throttle` shares its counters via a central store such as `memcached`.
-The obvious shortcoming of this is users have to deploy and operate a `memcached` instance
-in order to benefit from this functionality. Configure the `memcached`
-using [these configmap settings](./configmap.md#global-rate-limit).
-
-**Here are a few remarks for ingress-nginx integration of `lua-resty-global-throttle`:**
-
-1. We minimize `memcached` access by caching exceeding limit decisions. The expiry of
-cache entry is the desired delay `lua-resty-global-throttle` calculates for us.
-The Lua Shared Dictionary used for that is `global_throttle_cache`. Currently its size defaults to 10M.
-Customize it as per your needs using [lua-shared-dicts](./configmap.md#lua-shared-dicts).
-When we fail to cache the exceeding limit decision then we log an NGINX error. You can monitor
-for that error to decide if you need to bump the cache size. Without cache the cost of processing a
-request is two memcached commands: `GET`, and `INCR`. With the cache it is only `INCR`.
-1. Log NGINX variable `$global_rate_limit_exceeding`'s value to have some visibility into
-what portion of requests are rejected (value `y`), whether they are rejected using cached decision (value `c`),
-or if they are not rejected (default value `n`). You can use [log-format-upstream](./configmap.md#log-format-upstream)
-to include that in access logs.
-1. In case of an error it will log the error message and **fail open**.
-1. The annotations below creates Global Rate Limiting instance per ingress.
-That means if there are multiple paths configured under the same ingress,
-the Global Rate Limiting will count requests to all the paths under the same counter.
-Extract a path out into its own ingress if you need to isolate a certain path.
-
-
-* `nginx.ingress.kubernetes.io/global-rate-limit`: Configures maximum allowed number of requests per window. Required.
-* `nginx.ingress.kubernetes.io/global-rate-limit-window`: Configures a time window (i.e `1m`) that the limit is applied. Required.
-* `nginx.ingress.kubernetes.io/global-rate-limit-key`: Configures a key for counting the samples. Defaults to `$remote_addr`. You can also combine multiple NGINX variables here, like `${remote_addr}-${http_x_api_client}` which would mean the limit will be applied to requests coming from the same API client (indicated by `X-API-Client` HTTP request header) with the same source IP address.
-* `nginx.ingress.kubernetes.io/global-rate-limit-ignored-cidrs`: comma separated list of IPs and CIDRs to match client IP against. When there's a match request is not considered for rate limiting.
-
### Permanent Redirect
This annotation allows to return a permanent redirect (Return Code 301) instead of sending data to the upstream. For example `nginx.ingress.kubernetes.io/permanent-redirect: https://www.google.com` would redirect everything to Google.
diff --git a/docs/user-guide/nginx-configuration/configmap.md b/docs/user-guide/nginx-configuration/configmap.md
index 51e4edfa3..ab96a17d1 100644
--- a/docs/user-guide/nginx-configuration/configmap.md
+++ b/docs/user-guide/nginx-configuration/configmap.md
@@ -218,12 +218,6 @@ The following table shows a configuration option's name, type, and the default v
| [block-referers](#block-referers) | []string | "" | |
| [proxy-ssl-location-only](#proxy-ssl-location-only) | bool | "false" | |
| [default-type](#default-type) | string | "text/html" | |
-| [global-rate-limit-memcached-host](#global-rate-limit) | string | "" | |
-| [global-rate-limit-memcached-port](#global-rate-limit) | int | 11211 | |
-| [global-rate-limit-memcached-connect-timeout](#global-rate-limit) | int | 50 | |
-| [global-rate-limit-memcached-max-idle-timeout](#global-rate-limit) | int | 10000 | |
-| [global-rate-limit-memcached-pool-size](#global-rate-limit) | int | 50 | |
-| [global-rate-limit-status-code](#global-rate-limit) | int | 429 | |
| [service-upstream](#service-upstream) | bool | "false" | |
| [ssl-reject-handshake](#ssl-reject-handshake) | bool | "false" | |
| [debug-connections](#debug-connections) | []string | "127.0.0.1,1.1.1.1/24" | |
@@ -1349,22 +1343,6 @@ _**default:**_ text/html
_References:_
[https://nginx.org/en/docs/http/ngx_http_core_module.html#default_type](https://nginx.org/en/docs/http/ngx_http_core_module.html#default_type)
-## global-rate-limit
-
-* `global-rate-limit-status-code`: configure HTTP status code to return when rejecting requests. Defaults to 429.
-
-Configure `memcached` client for [Global Rate Limiting](https://github.com/kubernetes/ingress-nginx/blob/main/docs/user-guide/nginx-configuration/annotations.md#global-rate-limiting).
-
-* `global-rate-limit-memcached-host`: IP/FQDN of memcached server to use. Required to enable Global Rate Limiting.
-* `global-rate-limit-memcached-port`: port of memcached server to use. Defaults default memcached port of `11211`.
-* `global-rate-limit-memcached-connect-timeout`: configure timeout for connect, send and receive operations. Unit is millisecond. Defaults to 50ms.
-* `global-rate-limit-memcached-max-idle-timeout`: configure timeout for cleaning idle connections. Unit is millisecond. Defaults to 50ms.
-* `global-rate-limit-memcached-pool-size`: configure number of max connections to keep alive. Make sure your `memcached` server can handle
-`global-rate-limit-memcached-pool-size * worker-processes * ` simultaneous connections.
-
-These settings get used by [lua-resty-global-throttle](https://github.com/ElvinEfendi/lua-resty-global-throttle)
-that ingress-nginx includes. Refer to the link to learn more about `lua-resty-global-throttle`.
-
## service-upstream
Set if the service's Cluster IP and port should be used instead of a list of all endpoints. This can be overwritten by an annotation on an Ingress rule.
diff --git a/images/nginx-1.25/rootfs/build.sh b/images/nginx-1.25/rootfs/build.sh
index f60a260f9..ca636d03a 100755
--- a/images/nginx-1.25/rootfs/build.sh
+++ b/images/nginx-1.25/rootfs/build.sh
@@ -98,9 +98,6 @@ export LUA_RESTY_REDIS_VERSION=8641b9f1b6f75cca50c90cf8ca5c502ad8950aa8
# Check for recent changes: https://github.com/api7/lua-resty-ipmatcher/compare/v0.6.1...master
export LUA_RESTY_IPMATCHER_VERSION=3e93c53eb8c9884efe939ef070486a0e507cc5be
-# Check for recent changes: https://github.com/ElvinEfendi/lua-resty-global-throttle/compare/v0.2.0...main
-export LUA_RESTY_GLOBAL_THROTTLE_VERSION=v0.2.0
-
# Check for recent changes: https://github.com/microsoft/mimalloc/compare/v2.1.7...master
export MIMALOC_VERSION=v2.1.7
@@ -276,9 +273,6 @@ get_src c15aed1a01c88a3a6387d9af67a957dff670357f5fdb4ee182beb44635eef3f1 \
get_src efb767487ea3f6031577b9b224467ddbda2ad51a41c5867a47582d4ad85d609e \
"https://github.com/api7/lua-resty-ipmatcher/archive/$LUA_RESTY_IPMATCHER_VERSION.tar.gz" "lua-resty-ipmatcher"
-get_src 0fb790e394510e73fdba1492e576aaec0b8ee9ef08e3e821ce253a07719cf7ea \
- "https://github.com/ElvinEfendi/lua-resty-global-throttle/archive/$LUA_RESTY_GLOBAL_THROTTLE_VERSION.tar.gz" "lua-resty-global-throttle"
-
get_src d74f86ada2329016068bc5a243268f1f555edd620b6a7d6ce89295e7d6cf18da \
"https://github.com/microsoft/mimalloc/archive/${MIMALOC_VERSION}.tar.gz" "mimalloc"
@@ -591,9 +585,6 @@ make install
cd "$BUILD_PATH/lua-resty-ipmatcher"
INST_LUADIR=/usr/local/lib/lua make install
-cd "$BUILD_PATH/lua-resty-global-throttle"
-make install
-
cd "$BUILD_PATH/mimalloc"
mkdir -p out/release
cd out/release
diff --git a/images/nginx/rootfs/build.sh b/images/nginx/rootfs/build.sh
index 2f5f3c66f..cfd6493e3 100755
--- a/images/nginx/rootfs/build.sh
+++ b/images/nginx/rootfs/build.sh
@@ -119,9 +119,6 @@ export LUA_RESTY_REDIS_VERSION=0.30
# Check for recent changes: https://github.com/api7/lua-resty-ipmatcher/compare/v0.6.1...master
export LUA_RESTY_IPMATCHER_VERSION=0.6.1
-# Check for recent changes: https://github.com/ElvinEfendi/lua-resty-global-throttle/compare/v0.2.0...main
-export LUA_RESTY_GLOBAL_THROTTLE_VERSION=0.2.0
-
# Check for recent changes: https://github.com/microsoft/mimalloc/compare/v1.7.6...master
export MIMALOC_VERSION=1.7.6
@@ -309,9 +306,6 @@ get_src c15aed1a01c88a3a6387d9af67a957dff670357f5fdb4ee182beb44635eef3f1 \
get_src efb767487ea3f6031577b9b224467ddbda2ad51a41c5867a47582d4ad85d609e \
"https://github.com/api7/lua-resty-ipmatcher/archive/v$LUA_RESTY_IPMATCHER_VERSION.tar.gz"
-get_src 0fb790e394510e73fdba1492e576aaec0b8ee9ef08e3e821ce253a07719cf7ea \
- "https://github.com/ElvinEfendi/lua-resty-global-throttle/archive/v$LUA_RESTY_GLOBAL_THROTTLE_VERSION.tar.gz"
-
get_src d74f86ada2329016068bc5a243268f1f555edd620b6a7d6ce89295e7d6cf18da \
"https://github.com/microsoft/mimalloc/archive/refs/tags/v${MIMALOC_VERSION}.tar.gz"
@@ -704,9 +698,6 @@ make install
cd "$BUILD_PATH/lua-resty-ipmatcher-$LUA_RESTY_IPMATCHER_VERSION"
INST_LUADIR=/usr/local/lib/lua make install
-cd "$BUILD_PATH/lua-resty-global-throttle-$LUA_RESTY_GLOBAL_THROTTLE_VERSION"
-make install
-
cd "$BUILD_PATH/mimalloc-$MIMALOC_VERSION"
mkdir -p out/release
cd out/release
diff --git a/internal/ingress/annotations/annotations.go b/internal/ingress/annotations/annotations.go
index 4c073246c..e10cc9be1 100644
--- a/internal/ingress/annotations/annotations.go
+++ b/internal/ingress/annotations/annotations.go
@@ -39,7 +39,6 @@ import (
"k8s.io/ingress-nginx/internal/ingress/annotations/defaultbackend"
"k8s.io/ingress-nginx/internal/ingress/annotations/disableproxyintercepterrors"
"k8s.io/ingress-nginx/internal/ingress/annotations/fastcgi"
- "k8s.io/ingress-nginx/internal/ingress/annotations/globalratelimit"
"k8s.io/ingress-nginx/internal/ingress/annotations/http2pushpreload"
"k8s.io/ingress-nginx/internal/ingress/annotations/ipallowlist"
"k8s.io/ingress-nginx/internal/ingress/annotations/ipdenylist"
@@ -98,7 +97,6 @@ type Ingress struct {
Proxy proxy.Config
ProxySSL proxyssl.Config
RateLimit ratelimit.Config
- GlobalRateLimit globalratelimit.Config
Redirect redirect.Config
Rewrite rewrite.Config
Satisfy string
@@ -147,7 +145,6 @@ func NewAnnotationFactory(cfg resolver.Resolver) map[string]parser.IngressAnnota
"Proxy": proxy.NewParser(cfg),
"ProxySSL": proxyssl.NewParser(cfg),
"RateLimit": ratelimit.NewParser(cfg),
- "GlobalRateLimit": globalratelimit.NewParser(cfg),
"Redirect": redirect.NewParser(cfg),
"Rewrite": rewrite.NewParser(cfg),
"Satisfy": satisfy.NewParser(cfg),
diff --git a/internal/ingress/annotations/globalratelimit/main.go b/internal/ingress/annotations/globalratelimit/main.go
deleted file mode 100644
index 0aec29f66..000000000
--- a/internal/ingress/annotations/globalratelimit/main.go
+++ /dev/null
@@ -1,179 +0,0 @@
-/*
-Copyright 2020 The Kubernetes Authors.
-
-Licensed under the Apache License, Version 2.0 (the "License");
-you may not use this file except in compliance with the License.
-You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
-Unless required by applicable law or agreed to in writing, software
-distributed under the License is distributed on an "AS IS" BASIS,
-WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-See the License for the specific language governing permissions and
-limitations under the License.
-*/
-
-package globalratelimit
-
-import (
- "fmt"
- "strings"
- "time"
-
- networking "k8s.io/api/networking/v1"
- "k8s.io/klog/v2"
-
- "k8s.io/ingress-nginx/internal/ingress/annotations/parser"
- ing_errors "k8s.io/ingress-nginx/internal/ingress/errors"
- "k8s.io/ingress-nginx/internal/ingress/resolver"
- "k8s.io/ingress-nginx/internal/net"
- "k8s.io/ingress-nginx/pkg/util/sets"
-)
-
-const defaultKey = "$remote_addr"
-
-const (
- globalRateLimitAnnotation = "global-rate-limit"
- globalRateLimitWindowAnnotation = "global-rate-limit-window"
- globalRateLimitKeyAnnotation = "global-rate-limit-key"
- globalRateLimitIgnoredCidrsAnnotation = "global-rate-limit-ignored-cidrs"
-)
-
-var globalRateLimitAnnotationConfig = parser.Annotation{
- Group: "ratelimit",
- Annotations: parser.AnnotationFields{
- globalRateLimitAnnotation: {
- Validator: parser.ValidateInt,
- Scope: parser.AnnotationScopeIngress,
- Risk: parser.AnnotationRiskLow,
- Documentation: `This annotation configures maximum allowed number of requests per window`,
- },
- globalRateLimitWindowAnnotation: {
- Validator: parser.ValidateDuration,
- Scope: parser.AnnotationScopeIngress,
- Risk: parser.AnnotationRiskLow,
- Documentation: `Configures a time window (i.e 1m) that the limit is applied`,
- },
- globalRateLimitKeyAnnotation: {
- Validator: parser.ValidateRegex(parser.NGINXVariable, true),
- Scope: parser.AnnotationScopeIngress,
- Risk: parser.AnnotationRiskHigh,
- Documentation: `This annotation Configures a key for counting the samples. Defaults to $remote_addr.
- You can also combine multiple NGINX variables here, like ${remote_addr}-${http_x_api_client} which would mean the limit will be applied to
- requests coming from the same API client (indicated by X-API-Client HTTP request header) with the same source IP address`,
- },
- globalRateLimitIgnoredCidrsAnnotation: {
- Validator: parser.ValidateCIDRs,
- Scope: parser.AnnotationScopeIngress,
- Risk: parser.AnnotationRiskMedium,
- Documentation: `This annotation defines a comma separated list of IPs and CIDRs to match client IP against.
- When there's a match request is not considered for rate limiting.`,
- },
- },
-}
-
-// Config encapsulates all global rate limit attributes
-type Config struct {
- Namespace string `json:"namespace"`
- Limit int `json:"limit"`
- WindowSize int `json:"window-size"`
- Key string `json:"key"`
- IgnoredCIDRs []string `json:"ignored-cidrs"`
-}
-
-// Equal tests for equality between two Config types
-func (l *Config) Equal(r *Config) bool {
- if l.Namespace != r.Namespace {
- return false
- }
- if l.Limit != r.Limit {
- return false
- }
- if l.WindowSize != r.WindowSize {
- return false
- }
- if l.Key != r.Key {
- return false
- }
- if len(l.IgnoredCIDRs) != len(r.IgnoredCIDRs) || !sets.StringElementsMatch(l.IgnoredCIDRs, r.IgnoredCIDRs) {
- return false
- }
-
- return true
-}
-
-type globalratelimit struct {
- r resolver.Resolver
- annotationConfig parser.Annotation
-}
-
-// NewParser creates a new globalratelimit annotation parser
-func NewParser(r resolver.Resolver) parser.IngressAnnotation {
- return globalratelimit{
- r: r,
- annotationConfig: globalRateLimitAnnotationConfig,
- }
-}
-
-// Parse extracts globalratelimit annotations from the given ingress
-// and returns them structured as Config type
-func (a globalratelimit) Parse(ing *networking.Ingress) (interface{}, error) {
- config := &Config{}
-
- limit, err := parser.GetIntAnnotation(globalRateLimitAnnotation, ing, a.annotationConfig.Annotations)
- if err != nil && ing_errors.IsInvalidContent(err) {
- return nil, err
- }
- rawWindowSize, err := parser.GetStringAnnotation(globalRateLimitWindowAnnotation, ing, a.annotationConfig.Annotations)
- if err != nil && ing_errors.IsValidationError(err) {
- return config, ing_errors.LocationDeniedError{
- Reason: fmt.Errorf("failed to parse 'global-rate-limit-window' value: %w", err),
- }
- }
-
- if limit == 0 || rawWindowSize == "" {
- return config, nil
- }
-
- windowSize, err := time.ParseDuration(rawWindowSize)
- if err != nil {
- return config, ing_errors.LocationDeniedError{
- Reason: fmt.Errorf("failed to parse 'global-rate-limit-window' value: %w", err),
- }
- }
-
- key, err := parser.GetStringAnnotation(globalRateLimitKeyAnnotation, ing, a.annotationConfig.Annotations)
- if err != nil {
- klog.Warningf("invalid %s, defaulting to %s", globalRateLimitKeyAnnotation, defaultKey)
- }
- if key == "" {
- key = defaultKey
- }
-
- rawIgnoredCIDRs, err := parser.GetStringAnnotation(globalRateLimitIgnoredCidrsAnnotation, ing, a.annotationConfig.Annotations)
- if err != nil && ing_errors.IsInvalidContent(err) {
- return nil, err
- }
- ignoredCIDRs, err := net.ParseCIDRs(rawIgnoredCIDRs)
- if err != nil {
- return nil, err
- }
-
- config.Namespace = strings.ReplaceAll(string(ing.UID), "-", "")
- config.Limit = limit
- config.WindowSize = int(windowSize.Seconds())
- config.Key = key
- config.IgnoredCIDRs = ignoredCIDRs
-
- return config, nil
-}
-
-func (a globalratelimit) GetDocumentation() parser.AnnotationFields {
- return a.annotationConfig.Annotations
-}
-
-func (a globalratelimit) Validate(anns map[string]string) error {
- maxrisk := parser.StringRiskToRisk(a.r.GetSecurityConfiguration().AnnotationsRiskLevel)
- return parser.CheckAnnotationRisk(anns, maxrisk, globalRateLimitAnnotationConfig.Annotations)
-}
diff --git a/internal/ingress/annotations/globalratelimit/main_test.go b/internal/ingress/annotations/globalratelimit/main_test.go
deleted file mode 100644
index b1a7ab71b..000000000
--- a/internal/ingress/annotations/globalratelimit/main_test.go
+++ /dev/null
@@ -1,211 +0,0 @@
-/*
-Copyright 2020 The Kubernetes Authors.
-
-Licensed under the Apache License, Version 2.0 (the "License");
-you may not use this file except in compliance with the License.
-You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
-Unless required by applicable law or agreed to in writing, software
-distributed under the License is distributed on an "AS IS" BASIS,
-WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-See the License for the specific language governing permissions and
-limitations under the License.
-*/
-
-package globalratelimit
-
-import (
- "encoding/json"
- "fmt"
- "testing"
-
- api "k8s.io/api/core/v1"
- networking "k8s.io/api/networking/v1"
- meta_v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-
- "k8s.io/ingress-nginx/internal/ingress/annotations/parser"
- ing_errors "k8s.io/ingress-nginx/internal/ingress/errors"
- "k8s.io/ingress-nginx/internal/ingress/resolver"
-)
-
-const (
- UID = "31285d47-b150-4dcf-bd6f-12c46d769f6e"
- expectedUID = "31285d47b1504dcfbd6f12c46d769f6e"
-)
-
-func buildIngress() *networking.Ingress {
- defaultBackend := networking.IngressBackend{
- Service: &networking.IngressServiceBackend{
- Name: "default-backend",
- Port: networking.ServiceBackendPort{
- Number: 80,
- },
- },
- }
-
- return &networking.Ingress{
- ObjectMeta: meta_v1.ObjectMeta{
- Name: "foo",
- Namespace: api.NamespaceDefault,
- UID: UID,
- },
- Spec: networking.IngressSpec{
- DefaultBackend: &networking.IngressBackend{
- Service: &networking.IngressServiceBackend{
- Name: "default-backend",
- Port: networking.ServiceBackendPort{
- Number: 80,
- },
- },
- },
- Rules: []networking.IngressRule{
- {
- Host: "foo.bar.com",
- IngressRuleValue: networking.IngressRuleValue{
- HTTP: &networking.HTTPIngressRuleValue{
- Paths: []networking.HTTPIngressPath{
- {
- Path: "/foo",
- Backend: defaultBackend,
- },
- },
- },
- },
- },
- },
- },
- }
-}
-
-type mockBackend struct {
- resolver.Mock
-}
-
-func TestGlobalRateLimiting(t *testing.T) {
- ing := buildIngress()
-
- annRateLimit := parser.GetAnnotationWithPrefix("global-rate-limit")
- annRateLimitWindow := parser.GetAnnotationWithPrefix("global-rate-limit-window")
- annRateLimitKey := parser.GetAnnotationWithPrefix("global-rate-limit-key")
- annRateLimitIgnoredCIDRs := parser.GetAnnotationWithPrefix("global-rate-limit-ignored-cidrs")
-
- testCases := []struct {
- title string
- annotations map[string]string
- expectedConfig *Config
- expectedErr error
- }{
- {
- "no annotation",
- nil,
- &Config{},
- nil,
- },
- {
- "minimum required annotations",
- map[string]string{
- annRateLimit: "100",
- annRateLimitWindow: "2m",
- },
- &Config{
- Namespace: expectedUID,
- Limit: 100,
- WindowSize: 120,
- Key: "$remote_addr",
- IgnoredCIDRs: make([]string, 0),
- },
- nil,
- },
- {
- "global-rate-limit-key annotation",
- map[string]string{
- annRateLimit: "100",
- annRateLimitWindow: "2m",
- annRateLimitKey: "$http_x_api_user",
- },
- &Config{
- Namespace: expectedUID,
- Limit: 100,
- WindowSize: 120,
- Key: "$http_x_api_user",
- IgnoredCIDRs: make([]string, 0),
- },
- nil,
- },
- {
- "global-rate-limit-ignored-cidrs annotation",
- map[string]string{
- annRateLimit: "100",
- annRateLimitWindow: "2m",
- annRateLimitKey: "$http_x_api_user",
- annRateLimitIgnoredCIDRs: "127.0.0.1, 200.200.24.0/24",
- },
- &Config{
- Namespace: expectedUID,
- Limit: 100,
- WindowSize: 120,
- Key: "$http_x_api_user",
- IgnoredCIDRs: []string{"127.0.0.1", "200.200.24.0/24"},
- },
- nil,
- },
- {
- "global-rate-limit-complex-key",
- map[string]string{
- annRateLimit: "100",
- annRateLimitWindow: "2m",
- annRateLimitKey: "${http_x_api_user}${otherinfo}",
- },
- &Config{
- Namespace: expectedUID,
- Limit: 100,
- WindowSize: 120,
- Key: "${http_x_api_user}${otherinfo}",
- IgnoredCIDRs: make([]string, 0),
- },
- nil,
- },
- {
- "incorrect duration for window",
- map[string]string{
- annRateLimit: "100",
- annRateLimitWindow: "2mb",
- annRateLimitKey: "$http_x_api_user",
- },
- &Config{},
- ing_errors.ValidationError{
- Reason: fmt.Errorf("failed to parse 'global-rate-limit-window' value: annotation nginx.ingress.kubernetes.io/global-rate-limit-window contains invalid value"),
- },
- },
- }
-
- for _, testCase := range testCases {
- ing.SetAnnotations(testCase.annotations)
-
- i, actualErr := NewParser(mockBackend{}).Parse(ing)
- if (testCase.expectedErr == nil || actualErr == nil) && testCase.expectedErr != actualErr {
- t.Errorf("%s expected error '%v' but got '%v'", testCase.title, testCase.expectedErr, actualErr)
- } else if testCase.expectedErr != nil && actualErr != nil &&
- testCase.expectedErr.Error() != actualErr.Error() {
- t.Errorf("expected error '%v' but got '%v'", testCase.expectedErr, actualErr)
- }
-
- actualConfig, ok := i.(*Config)
- if !ok {
- t.Errorf("expected Config type but got %T", i)
- }
- if !testCase.expectedConfig.Equal(actualConfig) {
- expectedJSON, err := json.Marshal(testCase.expectedConfig)
- if err != nil {
- t.Errorf("failed to marshal expected config: %v", err)
- }
- actualJSON, err := json.Marshal(actualConfig)
- if err != nil {
- t.Errorf("failed to marshal actual config: %v", err)
- }
- t.Errorf("%v: expected config '%s' but got '%s'", testCase.title, expectedJSON, actualJSON)
- }
- }
-}
diff --git a/internal/ingress/controller/config/config.go b/internal/ingress/controller/config/config.go
index 63029bbbe..9b36667c1 100644
--- a/internal/ingress/controller/config/config.go
+++ b/internal/ingress/controller/config/config.go
@@ -718,31 +718,6 @@ type Configuration struct {
// Default: text/html
DefaultType string `json:"default-type"`
- // GlobalRateLimitMemcachedHost configures memcached host.
- GlobalRateLimitMemcachedHost string `json:"global-rate-limit-memcached-host"`
-
- // GlobalRateLimitMemcachedPort configures memcached port.
- GlobalRateLimitMemcachedPort int `json:"global-rate-limit-memcached-port"`
-
- // GlobalRateLimitMemcachedConnectTimeout configures timeout when connecting to memcached.
- // The unit is millisecond.
- GlobalRateLimitMemcachedConnectTimeout int `json:"global-rate-limit-memcached-connect-timeout"`
-
- // GlobalRateLimitMemcachedMaxIdleTimeout configured how long connections
- // should be kept alive in idle state. The unit is millisecond.
- GlobalRateLimitMemcachedMaxIdleTimeout int `json:"global-rate-limit-memcached-max-idle-timeout"`
-
- // GlobalRateLimitMemcachedPoolSize configures how many connections
- // should be kept alive in the pool.
- // Note that this is per NGINX worker. Make sure your memcached server can
- // handle `MemcachedPoolSize * * `
- // simultaneous connections.
- GlobalRateLimitMemcachedPoolSize int `json:"global-rate-limit-memcached-pool-size"`
-
- // GlobalRateLimitStatusCode determines the HTTP status code to return
- // when limit is exceeding during global rate limiting.
- GlobalRateLimitStatusCode int `json:"global-rate-limit-status-code"`
-
// DebugConnections Enables debugging log for selected client connections
// http://nginx.org/en/docs/ngx_core_module.html#debug_connection
// Default: ""
@@ -893,39 +868,34 @@ func NewDefault() Configuration {
ServiceUpstream: false,
AllowedResponseHeaders: []string{},
},
- UpstreamKeepaliveConnections: 320,
- UpstreamKeepaliveTime: "1h",
- UpstreamKeepaliveTimeout: 60,
- UpstreamKeepaliveRequests: 10000,
- LimitConnZoneVariable: defaultLimitConnZoneVariable,
- BindAddressIpv4: defBindAddress,
- BindAddressIpv6: defBindAddress,
- OpentelemetryTrustIncomingSpan: true,
- OpentelemetryConfig: "/etc/ingress-controller/telemetry/opentelemetry.toml",
- OtlpCollectorPort: "4317",
- OtelServiceName: "nginx",
- OtelSampler: "AlwaysOn",
- OtelSamplerRatio: 0.01,
- OtelSamplerParentBased: true,
- OtelScheduleDelayMillis: 5000,
- OtelMaxExportBatchSize: 512,
- OtelMaxQueueSize: 2048,
- LimitReqStatusCode: 503,
- LimitConnStatusCode: 503,
- SyslogPort: 514,
- NoTLSRedirectLocations: "/.well-known/acme-challenge",
- NoAuthLocations: "/.well-known/acme-challenge",
- GlobalExternalAuth: defGlobalExternalAuth,
- ProxySSLLocationOnly: false,
- DefaultType: "text/html",
- GlobalRateLimitMemcachedPort: 11211,
- GlobalRateLimitMemcachedConnectTimeout: 50,
- GlobalRateLimitMemcachedMaxIdleTimeout: 10000,
- GlobalRateLimitMemcachedPoolSize: 50,
- GlobalRateLimitStatusCode: 429,
- DebugConnections: []string{},
- StrictValidatePathType: true,
- GRPCBufferSizeKb: 0,
+ UpstreamKeepaliveConnections: 320,
+ UpstreamKeepaliveTime: "1h",
+ UpstreamKeepaliveTimeout: 60,
+ UpstreamKeepaliveRequests: 10000,
+ LimitConnZoneVariable: defaultLimitConnZoneVariable,
+ BindAddressIpv4: defBindAddress,
+ BindAddressIpv6: defBindAddress,
+ OpentelemetryTrustIncomingSpan: true,
+ OpentelemetryConfig: "/etc/ingress-controller/telemetry/opentelemetry.toml",
+ OtlpCollectorPort: "4317",
+ OtelServiceName: "nginx",
+ OtelSampler: "AlwaysOn",
+ OtelSamplerRatio: 0.01,
+ OtelSamplerParentBased: true,
+ OtelScheduleDelayMillis: 5000,
+ OtelMaxExportBatchSize: 512,
+ OtelMaxQueueSize: 2048,
+ LimitReqStatusCode: 503,
+ LimitConnStatusCode: 503,
+ SyslogPort: 514,
+ NoTLSRedirectLocations: "/.well-known/acme-challenge",
+ NoAuthLocations: "/.well-known/acme-challenge",
+ GlobalExternalAuth: defGlobalExternalAuth,
+ ProxySSLLocationOnly: false,
+ DefaultType: "text/html",
+ DebugConnections: []string{},
+ StrictValidatePathType: true,
+ GRPCBufferSizeKb: 0,
}
if klog.V(5).Enabled() {
diff --git a/internal/ingress/controller/controller.go b/internal/ingress/controller/controller.go
index 568edc483..45e11268c 100644
--- a/internal/ingress/controller/controller.go
+++ b/internal/ingress/controller/controller.go
@@ -379,10 +379,6 @@ func (n *NGINXController) CheckIngress(ing *networking.Ingress) error {
if !cfg.AllowSnippetAnnotations && strings.HasSuffix(key, "-snippet") {
return fmt.Errorf("%s annotation cannot be used. Snippet directives are disabled by the Ingress administrator", key)
}
-
- if cfg.GlobalRateLimitMemcachedHost == "" && strings.HasPrefix(key, fmt.Sprintf("%s/%s", parser.AnnotationsPrefix, "global-rate-limit")) {
- return fmt.Errorf("'global-rate-limit*' annotations require 'global-rate-limit-memcached-host' settings configured in the global configmap")
- }
}
k8s.SetDefaultNGINXPathType(ing)
@@ -1516,7 +1512,6 @@ func locationApplyAnnotations(loc *ingress.Location, anns *annotations.Ingress)
loc.Proxy = anns.Proxy
loc.ProxySSL = anns.ProxySSL
loc.RateLimit = anns.RateLimit
- loc.GlobalRateLimit = anns.GlobalRateLimit
loc.Redirect = anns.Redirect
loc.Rewrite = anns.Rewrite
loc.UpstreamVhost = anns.UpstreamVhost
diff --git a/internal/ingress/controller/template/configmap.go b/internal/ingress/controller/template/configmap.go
index 2f7b0a09c..481724793 100644
--- a/internal/ingress/controller/template/configmap.go
+++ b/internal/ingress/controller/template/configmap.go
@@ -82,7 +82,6 @@ var (
"balancer_ewma_locks": 1024,
"certificate_servers": 5120,
"ocsp_response_cache": 5120, // keep this same as certificate_servers
- "global_throttle_cache": 10240,
}
defaultGlobalAuthRedirectParam = "rd"
)
diff --git a/internal/ingress/controller/template/template.go b/internal/ingress/controller/template/template.go
index 8628f8090..42ff7417e 100644
--- a/internal/ingress/controller/template/template.go
+++ b/internal/ingress/controller/template/template.go
@@ -403,12 +403,6 @@ func configForLua(input interface{}) string {
hsts_include_subdomains = %t,
hsts_preload = %t,
- global_throttle = {
- memcached = {
- host = "%v", port = %d, connect_timeout = %d, max_idle_timeout = %d, pool_size = %d,
- },
- status_code = %d,
- }
}`,
all.Cfg.UseForwardedHeaders,
all.Cfg.UseProxyProtocol,
@@ -421,13 +415,6 @@ func configForLua(input interface{}) string {
all.Cfg.HSTSMaxAge,
all.Cfg.HSTSIncludeSubdomains,
all.Cfg.HSTSPreload,
-
- all.Cfg.GlobalRateLimitMemcachedHost,
- all.Cfg.GlobalRateLimitMemcachedPort,
- all.Cfg.GlobalRateLimitMemcachedConnectTimeout,
- all.Cfg.GlobalRateLimitMemcachedMaxIdleTimeout,
- all.Cfg.GlobalRateLimitMemcachedPoolSize,
- all.Cfg.GlobalRateLimitStatusCode,
)
}
@@ -445,30 +432,18 @@ func locationConfigForLua(l, a interface{}) string {
return "{}"
}
- ignoredCIDRs, err := convertGoSliceIntoLuaTable(location.GlobalRateLimit.IgnoredCIDRs, false)
- if err != nil {
- klog.Errorf("failed to convert %v into Lua table: %q", location.GlobalRateLimit.IgnoredCIDRs, err)
- ignoredCIDRs = "{}"
- }
-
return fmt.Sprintf(`{
force_ssl_redirect = %t,
ssl_redirect = %t,
force_no_ssl_redirect = %t,
preserve_trailing_slash = %t,
use_port_in_redirects = %t,
- global_throttle = { namespace = "%v", limit = %d, window_size = %d, key = %v, ignored_cidrs = %v },
}`,
location.Rewrite.ForceSSLRedirect,
location.Rewrite.SSLRedirect,
isLocationInLocationList(l, all.Cfg.NoTLSRedirectLocations),
location.Rewrite.PreserveTrailingSlash,
location.UsePortInRedirects,
- location.GlobalRateLimit.Namespace,
- location.GlobalRateLimit.Limit,
- location.GlobalRateLimit.WindowSize,
- parseComplexNginxVarIntoLuaTable(location.GlobalRateLimit.Key),
- ignoredCIDRs,
)
}
@@ -1690,54 +1665,6 @@ func buildServerName(hostname string) string {
return `~^(?[\w-]+)\.` + strings.Join(parts, "\\.") + `$`
}
-// parseComplexNginxVarIntoLuaTable parses things like "$my${complex}ngx\$var" into
-// [["$var", "complex", "my", "ngx"]]. In other words, 2nd and 3rd elements
-// in the result are actual NGINX variable names, whereas first and 4th elements
-// are string literals.
-func parseComplexNginxVarIntoLuaTable(ngxVar string) string {
- r := regexp.MustCompile(`(\\\$[0-9a-zA-Z_]+)|\$\{([0-9a-zA-Z_]+)\}|\$([0-9a-zA-Z_]+)|(\$|[^$\\]+)`)
- matches := r.FindAllStringSubmatch(ngxVar, -1)
- components := make([][]string, len(matches))
- for i, match := range matches {
- components[i] = match[1:]
- }
-
- luaTable, err := convertGoSliceIntoLuaTable(components, true)
- if err != nil {
- klog.Errorf("unexpected error: %v", err)
- luaTable = "{}"
- }
- return luaTable
-}
-
-func convertGoSliceIntoLuaTable(goSliceInterface interface{}, emptyStringAsNil bool) (string, error) {
- goSlice := reflect.ValueOf(goSliceInterface)
- kind := goSlice.Kind()
-
- switch kind {
- case reflect.String:
- if emptyStringAsNil && goSlice.Interface().(string) == "" {
- return "nil", nil
- }
- return fmt.Sprintf(`"%v"`, goSlice.Interface()), nil
- case reflect.Int, reflect.Bool:
- return fmt.Sprintf(`%v`, goSlice.Interface()), nil
- case reflect.Slice, reflect.Array:
- luaTable := "{ "
- for i := 0; i < goSlice.Len(); i++ {
- luaEl, err := convertGoSliceIntoLuaTable(goSlice.Index(i).Interface(), emptyStringAsNil)
- if err != nil {
- return "", err
- }
- luaTable = luaTable + luaEl + ", "
- }
- luaTable += "}"
- return luaTable, nil
- default:
- return "", fmt.Errorf("could not process type: %s", kind)
- }
-}
-
func buildOriginRegex(origin string) string {
origin = regexp.QuoteMeta(origin)
origin = strings.Replace(origin, "\\*", `[A-Za-z0-9\-]+`, 1)
diff --git a/internal/ingress/controller/template/template_test.go b/internal/ingress/controller/template/template_test.go
index 3089e3b32..59d2d6256 100644
--- a/internal/ingress/controller/template/template_test.go
+++ b/internal/ingress/controller/template/template_test.go
@@ -1926,89 +1926,6 @@ func TestBuildServerName(t *testing.T) {
}
}
-func TestParseComplexNginxVarIntoLuaTable(t *testing.T) {
- testCases := []struct {
- ngxVar string
- expectedLuaTable string
- }{
- {"foo", `{ { nil, nil, nil, "foo", }, }`},
- {"$foo", `{ { nil, nil, "foo", nil, }, }`},
- {"${foo}", `{ { nil, "foo", nil, nil, }, }`},
- {"\\$foo", `{ { "\$foo", nil, nil, nil, }, }`},
- {
- "foo\\$bar$baz${daz}xiyar$pomidor",
- `{ { nil, nil, nil, "foo", }, { "\$bar", nil, nil, nil, }, { nil, nil, "baz", nil, }, ` +
- `{ nil, "daz", nil, nil, }, { nil, nil, nil, "xiyar", }, { nil, nil, "pomidor", nil, }, }`,
- },
- }
-
- for _, testCase := range testCases {
- actualLuaTable := parseComplexNginxVarIntoLuaTable(testCase.ngxVar)
- if actualLuaTable != testCase.expectedLuaTable {
- t.Errorf("expected %v but returned %v", testCase.expectedLuaTable, actualLuaTable)
- }
- }
-}
-
-func TestConvertGoSliceIntoLuaTablet(t *testing.T) {
- testCases := []struct {
- title string
- goSlice interface{}
- emptyStringAsNil bool
- expectedLuaTable string
- expectedErr error
- }{
- {
- "flat string slice",
- []string{"one", "two", "three"},
- false,
- `{ "one", "two", "three", }`,
- nil,
- },
- {
- "nested string slice",
- [][]string{{"one", "", "three"}, {"foo", "bar"}},
- false,
- `{ { "one", "", "three", }, { "foo", "bar", }, }`,
- nil,
- },
- {
- "converts empty string to nil when enabled",
- [][]string{{"one", "", "three"}, {"foo", "bar"}},
- true,
- `{ { "one", nil, "three", }, { "foo", "bar", }, }`,
- nil,
- },
- {
- "boolean slice",
- []bool{true, true, false},
- false,
- `{ true, true, false, }`,
- nil,
- },
- {
- "integer slice",
- []int{4, 3, 6},
- false,
- `{ 4, 3, 6, }`,
- nil,
- },
- }
-
- for _, testCase := range testCases {
- actualLuaTable, err := convertGoSliceIntoLuaTable(testCase.goSlice, testCase.emptyStringAsNil)
- if testCase.expectedErr != nil && err != nil && testCase.expectedErr.Error() != err.Error() {
- t.Errorf("expected error '%v' but returned '%v'", testCase.expectedErr, err)
- }
- if testCase.expectedErr == nil && err != nil {
- t.Errorf("expected error to be nil but returned '%v'", err)
- }
- if testCase.expectedLuaTable != actualLuaTable {
- t.Errorf("%v: expected '%v' but returned '%v'", testCase.title, testCase.expectedLuaTable, actualLuaTable)
- }
- }
-}
-
func TestCleanConf(t *testing.T) {
testDataDir, err := getTestDataDir()
if err != nil {
diff --git a/pkg/apis/ingress/types.go b/pkg/apis/ingress/types.go
index 36067732e..9370333c1 100644
--- a/pkg/apis/ingress/types.go
+++ b/pkg/apis/ingress/types.go
@@ -29,7 +29,6 @@ import (
"k8s.io/ingress-nginx/internal/ingress/annotations/cors"
"k8s.io/ingress-nginx/internal/ingress/annotations/customheaders"
"k8s.io/ingress-nginx/internal/ingress/annotations/fastcgi"
- "k8s.io/ingress-nginx/internal/ingress/annotations/globalratelimit"
"k8s.io/ingress-nginx/internal/ingress/annotations/ipallowlist"
"k8s.io/ingress-nginx/internal/ingress/annotations/ipdenylist"
"k8s.io/ingress-nginx/internal/ingress/annotations/log"
@@ -285,10 +284,6 @@ type Location struct {
// The Redirect annotation precedes RateLimit
// +optional
RateLimit ratelimit.Config `json:"rateLimit,omitempty"`
- // GlobalRateLimit similar to RateLimit
- // but this is applied globally across multiple replicas.
- // +optional
- GlobalRateLimit globalratelimit.Config `json:"globalRateLimit,omitempty"`
// Redirect describes a temporal o permanent redirection this location.
// +optional
Redirect redirect.Config `json:"redirect,omitempty"`
diff --git a/pkg/apis/ingress/types_equals.go b/pkg/apis/ingress/types_equals.go
index eeed9a06e..aa6c3efa7 100644
--- a/pkg/apis/ingress/types_equals.go
+++ b/pkg/apis/ingress/types_equals.go
@@ -390,9 +390,6 @@ func (l1 *Location) Equal(l2 *Location) bool {
if !(&l1.RateLimit).Equal(&l2.RateLimit) {
return false
}
- if !(&l1.GlobalRateLimit).Equal(&l2.GlobalRateLimit) {
- return false
- }
if !(&l1.Redirect).Equal(&l2.Redirect) {
return false
}
diff --git a/rootfs/etc/nginx/lua/global_throttle.lua b/rootfs/etc/nginx/lua/global_throttle.lua
deleted file mode 100644
index bea8cfd17..000000000
--- a/rootfs/etc/nginx/lua/global_throttle.lua
+++ /dev/null
@@ -1,131 +0,0 @@
-local resty_global_throttle = require("resty.global_throttle")
-local resty_ipmatcher = require("resty.ipmatcher")
-local util = require("util")
-
-local ngx = ngx
-local ngx_exit = ngx.exit
-local ngx_log = ngx.log
-local ngx_ERR = ngx.ERR
-local ngx_INFO = ngx.INFO
-
-local _M = {}
-
-local DECISION_CACHE = ngx.shared.global_throttle_cache
-
--- it does not make sense to cache decision for too little time
--- the benefit of caching likely is negated if we cache for too little time
--- Lua Shared Dict's time resolution for expiry is 0.001.
-local CACHE_THRESHOLD = 0.001
-
-local DEFAULT_RAW_KEY = "remote_addr"
-
-local function should_ignore_request(ignored_cidrs)
- if not ignored_cidrs or #ignored_cidrs == 0 then
- return false
- end
-
- local ignored_cidrs_matcher, err = resty_ipmatcher.new(ignored_cidrs)
- if not ignored_cidrs_matcher then
- ngx_log(ngx_ERR, "failed to initialize resty-ipmatcher: ", err)
- return false
- end
-
- local is_ignored
- is_ignored, err = ignored_cidrs_matcher:match(ngx.var.remote_addr)
- if err then
- ngx_log(ngx_ERR, "failed to match ip: '",
- ngx.var.remote_addr, "': ", err)
- return false
- end
-
- return is_ignored
-end
-
-local function is_enabled(config, location_config)
- if config.memcached.host == "" or config.memcached.port == 0 then
- return false
- end
- if location_config.limit == 0 or
- location_config.window_size == 0 then
- return false
- end
-
- if should_ignore_request(location_config.ignored_cidrs) then
- return false
- end
-
- return true
-end
-
-local function get_namespaced_key_value(namespace, key_value)
- return namespace .. key_value
-end
-
-function _M.throttle(config, location_config)
- if not is_enabled(config, location_config) then
- return
- end
-
- local key_value = util.generate_var_value(location_config.key)
- if not key_value or key_value == "" then
- key_value = ngx.var[DEFAULT_RAW_KEY]
- end
-
- local namespaced_key_value =
- get_namespaced_key_value(location_config.namespace, key_value)
-
- local is_limit_exceeding = DECISION_CACHE:get(namespaced_key_value)
- if is_limit_exceeding then
- ngx.var.global_rate_limit_exceeding = "c"
- return ngx_exit(config.status_code)
- end
-
- local my_throttle, err = resty_global_throttle.new(
- location_config.namespace,
- location_config.limit,
- location_config.window_size,
- {
- provider = "memcached",
- host = config.memcached.host,
- port = config.memcached.port,
- connect_timeout = config.memcached.connect_timeout,
- max_idle_timeout = config.memcached.max_idle_timeout,
- pool_size = config.memcached.pool_size,
- }
- )
- if err then
- ngx.log(ngx.ERR, "faled to initialize resty_global_throttle: ", err)
- -- fail open
- return
- end
-
- local desired_delay, estimated_final_count
- estimated_final_count, desired_delay, err = my_throttle:process(key_value)
- if err then
- ngx.log(ngx.ERR, "error while processing key: ", err)
- -- fail open
- return
- end
-
- if desired_delay then
- if desired_delay > CACHE_THRESHOLD then
- local ok
- ok, err =
- DECISION_CACHE:safe_add(namespaced_key_value, true, desired_delay)
- if not ok then
- if err ~= "exists" then
- ngx_log(ngx_ERR, "failed to cache decision: ", err)
- end
- end
- end
-
- ngx.var.global_rate_limit_exceeding = "y"
- ngx_log(ngx_INFO, "limit is exceeding for ",
- location_config.namespace, "/", key_value,
- " with estimated_final_count: ", estimated_final_count)
-
- return ngx_exit(config.status_code)
- end
-end
-
-return _M
diff --git a/rootfs/etc/nginx/lua/lua_ingress.lua b/rootfs/etc/nginx/lua/lua_ingress.lua
index 49e0f5b05..65cf5a257 100644
--- a/rootfs/etc/nginx/lua/lua_ingress.lua
+++ b/rootfs/etc/nginx/lua/lua_ingress.lua
@@ -2,7 +2,6 @@ local ngx_re_split = require("ngx.re").split
local certificate_configured_for_current_request =
require("certificate").configured_for_current_request
-local global_throttle = require("global_throttle")
local ngx = ngx
local io = io
@@ -164,7 +163,6 @@ function _M.rewrite(location_config)
return ngx_redirect(uri, config.http_redirect_code)
end
- global_throttle.throttle(config.global_throttle, location_config.global_throttle)
end
function _M.header()
diff --git a/rootfs/etc/nginx/lua/test/global_throttle_test.lua b/rootfs/etc/nginx/lua/test/global_throttle_test.lua
deleted file mode 100644
index b8db740ad..000000000
--- a/rootfs/etc/nginx/lua/test/global_throttle_test.lua
+++ /dev/null
@@ -1,258 +0,0 @@
-local util = require("util")
-
-local function assert_request_rejected(config, location_config, opts)
- stub(ngx, "exit")
-
- local global_throttle = require_without_cache("global_throttle")
- assert.has_no.errors(function()
- global_throttle.throttle(config, location_config)
- end)
-
- assert.stub(ngx.exit).was_called_with(config.status_code)
- if opts.with_cache then
- assert.are.same("c", ngx.var.global_rate_limit_exceeding)
- else
- assert.are.same("y", ngx.var.global_rate_limit_exceeding)
- end
-end
-
-local function assert_request_not_rejected(config, location_config)
- stub(ngx, "exit")
- local cache_safe_add_spy = spy.on(ngx.shared.global_throttle_cache, "safe_add")
-
- local global_throttle = require_without_cache("global_throttle")
- assert.has_no.errors(function()
- global_throttle.throttle(config, location_config)
- end)
-
- assert.stub(ngx.exit).was_not_called()
- assert.is_nil(ngx.var.global_rate_limit_exceeding)
- assert.spy(cache_safe_add_spy).was_not_called()
-end
-
-local function assert_short_circuits(f)
- local cache_get_spy = spy.on(ngx.shared.global_throttle_cache, "get")
-
- local resty_global_throttle = require_without_cache("resty.global_throttle")
- local resty_global_throttle_new_spy = spy.on(resty_global_throttle, "new")
-
- local global_throttle = require_without_cache("global_throttle")
-
- f(global_throttle)
-
- assert.spy(resty_global_throttle_new_spy).was_not_called()
- assert.spy(cache_get_spy).was_not_called()
-end
-
-local function assert_fails_open(config, location_config, ...)
- stub(ngx, "exit")
- stub(ngx, "log")
-
- local global_throttle = require_without_cache("global_throttle")
-
- assert.has_no.errors(function()
- global_throttle.throttle(config, location_config)
- end)
-
- assert.stub(ngx.exit).was_not_called()
- assert.stub(ngx.log).was_called_with(ngx.ERR, ...)
- assert.is_nil(ngx.var.global_rate_limit_exceeding)
-end
-
-local function stub_resty_global_throttle_process(ret1, ret2, ret3, f)
- local resty_global_throttle = require_without_cache("resty.global_throttle")
- local resty_global_throttle_mock = {
- process = function(self, key) return ret1, ret2, ret3 end
- }
- stub(resty_global_throttle, "new", resty_global_throttle_mock)
-
- f()
-
- assert.stub(resty_global_throttle.new).was_called()
-end
-
-local function cache_rejection_decision(namespace, key_value, desired_delay)
- local namespaced_key_value = namespace .. key_value
- local ok, err = ngx.shared.global_throttle_cache:safe_add(namespaced_key_value, true, desired_delay)
- assert.is_nil(err)
- assert.is_true(ok)
- assert.is_true(ngx.shared.global_throttle_cache:get(namespaced_key_value))
-end
-
-describe("global_throttle", function()
- local snapshot
-
- local NAMESPACE = "31285d47b1504dcfbd6f12c46d769f6e"
- local LOCATION_CONFIG = {
- namespace = NAMESPACE,
- limit = 10,
- window_size = 60,
- key = {},
- ignored_cidrs = {},
- }
- local CONFIG = {
- memcached = {
- host = "memc.default.svc.cluster.local", port = 11211,
- connect_timeout = 50, max_idle_timeout = 10000, pool_size = 50,
- },
- status_code = 429,
- }
-
- before_each(function()
- snapshot = assert:snapshot()
-
- ngx.var = { remote_addr = "127.0.0.1", global_rate_limit_exceeding = nil }
- end)
-
- after_each(function()
- snapshot:revert()
-
- ngx.shared.global_throttle_cache:flush_all()
- reset_ngx()
- end)
-
- it("short circuits when memcached is not configured", function()
- assert_short_circuits(function(global_throttle)
- assert.has_no.errors(function()
- global_throttle.throttle({ memcached = { host = "", port = 0 } }, LOCATION_CONFIG)
- end)
- end)
- end)
-
- it("short circuits when limit or window_size is not configured", function()
- assert_short_circuits(function(global_throttle)
- local location_config_copy = util.deepcopy(LOCATION_CONFIG)
- location_config_copy.limit = 0
- assert.has_no.errors(function()
- global_throttle.throttle(CONFIG, location_config_copy)
- end)
- end)
-
- assert_short_circuits(function(global_throttle)
- local location_config_copy = util.deepcopy(LOCATION_CONFIG)
- location_config_copy.window_size = 0
- assert.has_no.errors(function()
- global_throttle.throttle(CONFIG, location_config_copy)
- end)
- end)
- end)
-
- it("short circuits when remote_addr is in ignored_cidrs", function()
- local global_throttle = require_without_cache("global_throttle")
- local location_config = util.deepcopy(LOCATION_CONFIG)
- location_config.ignored_cidrs = { ngx.var.remote_addr }
- assert_short_circuits(function(global_throttle)
- assert.has_no.errors(function()
- global_throttle.throttle(CONFIG, location_config)
- end)
- end)
- end)
-
- it("rejects when exceeding limit has already been cached", function()
- local key_value = "foo"
- local location_config = util.deepcopy(LOCATION_CONFIG)
- location_config.key = { { nil, nil, nil, key_value } }
- cache_rejection_decision(NAMESPACE, key_value, 0.5)
-
- assert_request_rejected(CONFIG, location_config, { with_cache = true })
- end)
-
- describe("when resty_global_throttle fails", function()
- it("fails open in case of initialization error", function()
- local too_long_namespace = ""
- for i=1,36,1 do
- too_long_namespace = too_long_namespace .. "a"
- end
-
- local location_config = util.deepcopy(LOCATION_CONFIG)
- location_config.namespace = too_long_namespace
-
- assert_fails_open(CONFIG, location_config, "faled to initialize resty_global_throttle: ", "'namespace' can be at most 35 characters")
- end)
-
- it("fails open in case of key processing error", function()
- stub_resty_global_throttle_process(nil, nil, "failed to process", function()
- assert_fails_open(CONFIG, LOCATION_CONFIG, "error while processing key: ", "failed to process")
- end)
- end)
- end)
-
- it("initializes resty_global_throttle with the right parameters", function()
- local resty_global_throttle = require_without_cache("resty.global_throttle")
- local resty_global_throttle_original_new = resty_global_throttle.new
- resty_global_throttle.new = function(namespace, limit, window_size, store_opts)
- local o, err = resty_global_throttle_original_new(namespace, limit, window_size, store_opts)
- if not o then
- return nil, err
- end
- o.process = function(self, key) return 1, nil, nil end
-
- local expected = LOCATION_CONFIG
- assert.are.same(expected.namespace, namespace)
- assert.are.same(expected.limit, limit)
- assert.are.same(expected.window_size, window_size)
-
- assert.are.same("memcached", store_opts.provider)
- assert.are.same(CONFIG.memcached.host, store_opts.host)
- assert.are.same(CONFIG.memcached.port, store_opts.port)
- assert.are.same(CONFIG.memcached.connect_timeout, store_opts.connect_timeout)
- assert.are.same(CONFIG.memcached.max_idle_timeout, store_opts.max_idle_timeout)
- assert.are.same(CONFIG.memcached.pool_size, store_opts.pool_size)
-
- return o, nil
- end
- local resty_global_throttle_new_spy = spy.on(resty_global_throttle, "new")
-
- local global_throttle = require_without_cache("global_throttle")
-
- assert.has_no.errors(function()
- global_throttle.throttle(CONFIG, LOCATION_CONFIG)
- end)
-
- assert.spy(resty_global_throttle_new_spy).was_called()
- end)
-
- it("rejects request and caches decision when limit is exceeding after processing a key", function()
- local desired_delay = 0.015
-
- stub_resty_global_throttle_process(LOCATION_CONFIG.limit + 1, desired_delay, nil, function()
- assert_request_rejected(CONFIG, LOCATION_CONFIG, { with_cache = false })
-
- local cache_key = LOCATION_CONFIG.namespace .. ngx.var.remote_addr
- assert.is_true(ngx.shared.global_throttle_cache:get(cache_key))
-
- -- we assume it won't take more than this after caching
- -- until we execute the assertion below
- local delta = 0.001
- local ttl = ngx.shared.global_throttle_cache:ttl(cache_key)
- assert.is_true(ttl > desired_delay - delta)
- assert.is_true(ttl <= desired_delay)
- end)
- end)
-
- it("rejects request and skip caching of decision when limit is exceeding after processing a key but desired delay is lower than the threshold", function()
- local desired_delay = 0.0009
-
- stub_resty_global_throttle_process(LOCATION_CONFIG.limit, desired_delay, nil, function()
- assert_request_rejected(CONFIG, LOCATION_CONFIG, { with_cache = false })
-
- local cache_key = LOCATION_CONFIG.namespace .. ngx.var.remote_addr
- assert.is_nil(ngx.shared.global_throttle_cache:get(cache_key))
- end)
- end)
-
- it("allows the request when limit is not exceeding after processing a key", function()
- stub_resty_global_throttle_process(LOCATION_CONFIG.limit - 3, nil, nil,
- function()
- assert_request_not_rejected(CONFIG, LOCATION_CONFIG)
- end
- )
- end)
-
- it("rejects with custom status code", function()
- cache_rejection_decision(NAMESPACE, ngx.var.remote_addr, 0.3)
- local config = util.deepcopy(CONFIG)
- config.status_code = 503
- assert_request_rejected(config, LOCATION_CONFIG, { with_cache = true })
- end)
-end)
diff --git a/rootfs/etc/nginx/template/nginx.tmpl b/rootfs/etc/nginx/template/nginx.tmpl
index 1c630bb4d..4f705976f 100644
--- a/rootfs/etc/nginx/template/nginx.tmpl
+++ b/rootfs/etc/nginx/template/nginx.tmpl
@@ -1242,7 +1242,6 @@ stream {
set $service_name {{ $ing.Service | quote }};
set $service_port {{ $ing.ServicePort | quote }};
set $location_path {{ $ing.Path | escapeLiteralDollar | quote }};
- set $global_rate_limit_exceeding n;
{{ buildOpentelemetryForLocation $all.Cfg.EnableOpentelemetry $all.Cfg.OpentelemetryTrustIncomingSpan $location }}
diff --git a/test/e2e/admission/admission.go b/test/e2e/admission/admission.go
index 124e1784d..873e6719d 100644
--- a/test/e2e/admission/admission.go
+++ b/test/e2e/admission/admission.go
@@ -44,33 +44,6 @@ var _ = framework.IngressNginxDescribeSerial("[Admission] admission controller",
f.NewSlowEchoDeployment()
})
- ginkgo.It("reject ingress with global-rate-limit annotations when memcached is not configured", func() {
- host := admissionTestHost
-
- annotations := map[string]string{
- "nginx.ingress.kubernetes.io/global-rate-limit": "100",
- "nginx.ingress.kubernetes.io/global-rate-limit-window": "1m",
- }
- ing := framework.NewSingleIngress("first-ingress", "/", host, f.Namespace, framework.EchoService, 80, annotations)
-
- ginkgo.By("rejects ingress when memcached is not configured")
-
- _, err := f.KubeClientSet.NetworkingV1().Ingresses(f.Namespace).Create(context.TODO(), ing, metav1.CreateOptions{})
- assert.NotNil(ginkgo.GinkgoT(), err, "creating ingress with global throttle annotations when memcached is not configured")
-
- ginkgo.By("accepts ingress when memcached is not configured")
-
- f.UpdateNginxConfigMapData("global-rate-limit-memcached-host", "memc.default.svc.cluster.local")
-
- _, err = f.KubeClientSet.NetworkingV1().Ingresses(f.Namespace).Create(context.TODO(), ing, metav1.CreateOptions{})
- assert.Nil(ginkgo.GinkgoT(), err, "creating ingress with global throttle annotations when memcached is configured")
-
- f.WaitForNginxServer(host,
- func(server string) bool {
- return strings.Contains(server, fmt.Sprintf("server_name %v", host))
- })
- })
-
ginkgo.It("should not allow overlaps of host and paths without canary annotations", func() {
host := admissionTestHost
diff --git a/test/e2e/annotations/globalratelimit.go b/test/e2e/annotations/globalratelimit.go
deleted file mode 100644
index 96be467fe..000000000
--- a/test/e2e/annotations/globalratelimit.go
+++ /dev/null
@@ -1,88 +0,0 @@
-/*
-Copyright 2020 The Kubernetes Authors.
-
-Licensed under the Apache License, Version 2.0 (the "License");
-you may not use this file except in compliance with the License.
-You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
-Unless required by applicable law or agreed to in writing, software
-distributed under the License is distributed on an "AS IS" BASIS,
-WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-See the License for the specific language governing permissions and
-limitations under the License.
-*/
-
-package annotations
-
-import (
- "fmt"
- "net/http"
- "strings"
-
- "github.com/onsi/ginkgo/v2"
- "github.com/stretchr/testify/assert"
-
- "k8s.io/ingress-nginx/test/e2e/framework"
-)
-
-var _ = framework.DescribeAnnotation("annotation-global-rate-limit", func() {
- f := framework.NewDefaultFramework("global-rate-limit")
- host := "global-rate-limit-annotation"
-
- ginkgo.BeforeEach(func() {
- f.NewEchoDeployment()
- })
-
- ginkgo.It("generates correct configuration", func() {
- annotations := make(map[string]string)
- annotations["nginx.ingress.kubernetes.io/global-rate-limit"] = "5"
- annotations["nginx.ingress.kubernetes.io/global-rate-limit-window"] = "2m"
-
- // We need to allow { and } characters for this annotation to work
- f.UpdateNginxConfigMapData("annotation-value-word-blocklist", "load_module, lua_package, _by_lua, location, root")
- // Sleep a while just to guarantee that the configmap is applied
- framework.Sleep()
-
- ing := framework.NewSingleIngress(host, "/", host, f.Namespace, framework.EchoService, 80, annotations)
- ing = f.EnsureIngress(ing)
- namespace := strings.ReplaceAll(string(ing.UID), "-", "")
-
- serverConfig := ""
- f.WaitForNginxServer(host, func(server string) bool {
- serverConfig = server
- return true
- })
- assert.Contains(ginkgo.GinkgoT(), serverConfig,
- fmt.Sprintf(`global_throttle = { namespace = "%v", `+
- `limit = 5, window_size = 120, key = { { nil, nil, "remote_addr", nil, }, }, `+
- `ignored_cidrs = { } }`,
- namespace))
-
- f.HTTPTestClient().GET("/").WithHeader("Host", host).Expect().Status(http.StatusOK)
-
- ginkgo.By("regenerating the correct configuration after update")
- annotations["nginx.ingress.kubernetes.io/global-rate-limit-key"] = "${remote_addr}${http_x_api_client}"
- annotations["nginx.ingress.kubernetes.io/global-rate-limit-ignored-cidrs"] = "192.168.1.1, 234.234.234.0/24"
- ing.SetAnnotations(annotations)
-
- f.WaitForReload(func() {
- ing = f.UpdateIngress(ing)
- })
-
- serverConfig = ""
- f.WaitForNginxServer(host, func(server string) bool {
- serverConfig = server
- return true
- })
- assert.Contains(ginkgo.GinkgoT(), serverConfig,
- fmt.Sprintf(`global_throttle = { namespace = "%v", `+
- `limit = 5, window_size = 120, `+
- `key = { { nil, "remote_addr", nil, nil, }, { nil, "http_x_api_client", nil, nil, }, }, `+
- `ignored_cidrs = { "192.168.1.1", "234.234.234.0/24", } }`,
- namespace))
-
- f.HTTPTestClient().GET("/").WithHeader("Host", host).Expect().Status(http.StatusOK)
- })
-})
diff --git a/test/e2e/settings/globalratelimit.go b/test/e2e/settings/globalratelimit.go
deleted file mode 100644
index e266350ad..000000000
--- a/test/e2e/settings/globalratelimit.go
+++ /dev/null
@@ -1,96 +0,0 @@
-/*
-Copyright 2020 The Kubernetes Authors.
-
-Licensed under the Apache License, Version 2.0 (the "License");
-you may not use this file except in compliance with the License.
-You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
-Unless required by applicable law or agreed to in writing, software
-distributed under the License is distributed on an "AS IS" BASIS,
-WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-See the License for the specific language governing permissions and
-limitations under the License.
-*/
-
-package settings
-
-import (
- "fmt"
- "net/http"
- "strconv"
- "strings"
-
- "github.com/onsi/ginkgo/v2"
- "github.com/stretchr/testify/assert"
- "k8s.io/ingress-nginx/test/e2e/framework"
-)
-
-var _ = framework.DescribeSetting("settings-global-rate-limit", func() {
- f := framework.NewDefaultFramework("global-rate-limit")
- host := "global-rate-limit"
-
- ginkgo.BeforeEach(func() {
- f.NewEchoDeployment()
- })
-
- ginkgo.It("generates correct NGINX configuration", func() {
- annotations := make(map[string]string)
- ing := framework.NewSingleIngress(host, "/", host, f.Namespace, framework.EchoService, 80, annotations)
- f.EnsureIngress(ing)
-
- ginkgo.By("generating correct defaults")
-
- ngxCfg := ""
- f.WaitForNginxConfiguration(func(cfg string) bool {
- if strings.Contains(cfg, "global_throttle") {
- ngxCfg = cfg
- return true
- }
- return false
- })
-
- assert.Contains(ginkgo.GinkgoT(), ngxCfg, fmt.Sprintf(`global_throttle = { `+
- `memcached = { host = "%v", port = %d, connect_timeout = %d, max_idle_timeout = %d, `+
- `pool_size = %d, }, status_code = %d, }`,
- "", 11211, 50, 10000, 50, 429))
-
- f.HTTPTestClient().GET("/").WithHeader("Host", host).Expect().Status(http.StatusOK)
-
- ginkgo.By("applying customizations")
-
- memcachedHost := "memc.default.svc.cluster.local"
- memcachedPort := 11211
- memcachedConnectTimeout := 100
- memcachedMaxIdleTimeout := 5000
- memcachedPoolSize := 100
- statusCode := 503
-
- f.SetNginxConfigMapData(map[string]string{
- "global-rate-limit-memcached-host": memcachedHost,
- "global-rate-limit-memcached-port": strconv.Itoa(memcachedPort),
- "global-rate-limit-memcached-connect-timeout": strconv.Itoa(memcachedConnectTimeout),
- "global-rate-limit-memcached-max-idle-timeout": strconv.Itoa(memcachedMaxIdleTimeout),
- "global-rate-limit-memcached-pool-size": strconv.Itoa(memcachedPoolSize),
- "global-rate-limit-status-code": strconv.Itoa(statusCode),
- })
-
- ngxCfg = ""
- f.WaitForNginxConfiguration(func(cfg string) bool {
- if strings.Contains(cfg, "global_throttle") {
- ngxCfg = cfg
- return true
- }
- return false
- })
-
- assert.Contains(ginkgo.GinkgoT(), ngxCfg, fmt.Sprintf(`global_throttle = { `+
- `memcached = { host = "%v", port = %d, connect_timeout = %d, max_idle_timeout = %d, `+
- `pool_size = %d, }, status_code = %d, }`,
- memcachedHost, memcachedPort, memcachedConnectTimeout, memcachedMaxIdleTimeout,
- memcachedPoolSize, statusCode))
-
- f.HTTPTestClient().GET("/").WithHeader("Host", host).Expect().Status(http.StatusOK)
- })
-})
diff --git a/test/test-lua.sh b/test/test-lua.sh
index 1aff5f30c..e7ee5843e 100755
--- a/test/test-lua.sh
+++ b/test/test-lua.sh
@@ -36,7 +36,6 @@ SHDICT_ARGS=(
"--shdict" "high_throughput_tracker 1M"
"--shdict" "balancer_ewma_last_touched_at 1M"
"--shdict" "balancer_ewma_locks 512k"
- "--shdict" "global_throttle_cache 5M"
"./rootfs/etc/nginx/lua/test/run.lua"
)
From 8b20427d020216c4607d51603fd32620423b7008 Mon Sep 17 00:00:00 2001
From: Seonghyeon Cho
Date: Mon, 26 Aug 2024 05:12:02 +0900
Subject: [PATCH 203/283] Update maxmind post link about geolite2 license
changes (#11861)
Signed-off-by: Seonghyeon Cho
---
Changelog.md | 2 +-
charts/ingress-nginx/README.md | 2 +-
charts/ingress-nginx/values.yaml | 2 +-
docs/user-guide/cli-arguments.md | 2 +-
docs/user-guide/nginx-configuration/configmap.md | 2 +-
pkg/flags/flags.go | 2 +-
6 files changed, 6 insertions(+), 6 deletions(-)
diff --git a/Changelog.md b/Changelog.md
index 400c187f7..f74ff8119 100644
--- a/Changelog.md
+++ b/Changelog.md
@@ -2057,7 +2057,7 @@ _Breaking Changes:_
```
Due to upcoming data privacy regulations, we are making significant changes to how you access free GeoLite2 databases starting December 30, 2019.
- Learn more on our blog https://blog.maxmind.com/2019/12/18/significant-changes-to-accessing-and-using-geolite2-databases/
+ Learn more on our blog https://blog.maxmind.com/2019/12/significant-changes-to-accessing-and-using-geolite2-databases/
```
Because of this change, it is not clear we can provide the databases directly from the docker image.
diff --git a/charts/ingress-nginx/README.md b/charts/ingress-nginx/README.md
index f69d2951b..381ff3a6b 100644
--- a/charts/ingress-nginx/README.md
+++ b/charts/ingress-nginx/README.md
@@ -367,7 +367,7 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
| controller.livenessProbe.periodSeconds | int | `10` | |
| controller.livenessProbe.successThreshold | int | `1` | |
| controller.livenessProbe.timeoutSeconds | int | `1` | |
-| controller.maxmindLicenseKey | string | `""` | Maxmind license key to download GeoLite2 Databases. # https://blog.maxmind.com/2019/12/18/significant-changes-to-accessing-and-using-geolite2-databases |
+| controller.maxmindLicenseKey | string | `""` | Maxmind license key to download GeoLite2 Databases. # https://blog.maxmind.com/2019/12/significant-changes-to-accessing-and-using-geolite2-databases/ |
| controller.metrics.enabled | bool | `false` | |
| controller.metrics.port | int | `10254` | |
| controller.metrics.portName | string | `"metrics"` | |
diff --git a/charts/ingress-nginx/values.yaml b/charts/ingress-nginx/values.yaml
index 89cb718c4..eee537ffe 100644
--- a/charts/ingress-nginx/values.yaml
+++ b/charts/ingress-nginx/values.yaml
@@ -198,7 +198,7 @@ controller:
# -- Annotations to be added to the udp config configmap
annotations: {}
# -- Maxmind license key to download GeoLite2 Databases.
- ## https://blog.maxmind.com/2019/12/18/significant-changes-to-accessing-and-using-geolite2-databases
+ ## https://blog.maxmind.com/2019/12/significant-changes-to-accessing-and-using-geolite2-databases/
maxmindLicenseKey: ""
# -- Additional command line arguments to pass to Ingress-Nginx Controller
# E.g. to specify the default SSL certificate you can use
diff --git a/docs/user-guide/cli-arguments.md b/docs/user-guide/cli-arguments.md
index 018467dda..5315dd325 100644
--- a/docs/user-guide/cli-arguments.md
+++ b/docs/user-guide/cli-arguments.md
@@ -45,7 +45,7 @@ They are set in the container spec of the `ingress-nginx-controller` Deployment
| `--maxmind-edition-ids` | Maxmind edition ids to download GeoLite2 Databases. (default "GeoLite2-City,GeoLite2-ASN") |
| `--maxmind-retries-timeout` | Maxmind downloading delay between 1st and 2nd attempt, 0s - do not retry to download if something went wrong. (default 0s) |
| `--maxmind-retries-count` | Number of attempts to download the GeoIP DB. (default 1) |
-| `--maxmind-license-key` | Maxmind license key to download GeoLite2 Databases. https://blog.maxmind.com/2019/12/18/significant-changes-to-accessing-and-using-geolite2-databases . |
+| `--maxmind-license-key` | Maxmind license key to download GeoLite2 Databases. https://blog.maxmind.com/2019/12/significant-changes-to-accessing-and-using-geolite2-databases/ . |
| `--maxmind-mirror` | Maxmind mirror url (example: http://geoip.local/databases. |
| `--metrics-per-host` | Export metrics per-host. (default true) |
| `--monitor-max-batch-size` | Max batch size of NGINX metrics. (default 10000)|
diff --git a/docs/user-guide/nginx-configuration/configmap.md b/docs/user-guide/nginx-configuration/configmap.md
index ab96a17d1..51896e3a1 100644
--- a/docs/user-guide/nginx-configuration/configmap.md
+++ b/docs/user-guide/nginx-configuration/configmap.md
@@ -714,7 +714,7 @@ _**default:**_ true
## use-geoip2
Enables the [geoip2 module](https://github.com/leev/ngx_http_geoip2_module) for NGINX.
-Since `0.27.0` and due to a [change in the MaxMind databases](https://blog.maxmind.com/2019/12/18/significant-changes-to-accessing-and-using-geolite2-databases) a license is required to have access to the databases.
+Since `0.27.0` and due to a [change in the MaxMind databases](https://blog.maxmind.com/2019/12/significant-changes-to-accessing-and-using-geolite2-databases/) a license is required to have access to the databases.
For this reason, it is required to define a new flag `--maxmind-license-key` in the ingress controller deployment to download the databases needed during the initialization of the ingress controller.
Alternatively, it is possible to use a volume to mount the files `/etc/ingress-controller/geoip/GeoLite2-City.mmdb` and `/etc/ingress-controller/geoip/GeoLite2-ASN.mmdb`, avoiding the overhead of the download.
diff --git a/pkg/flags/flags.go b/pkg/flags/flags.go
index 15da701e7..5a1ab0aa9 100644
--- a/pkg/flags/flags.go
+++ b/pkg/flags/flags.go
@@ -234,7 +234,7 @@ Takes the form ":port". If not provided, no admission controller is starte
flags.StringVar(&nginx.MaxmindMirror, "maxmind-mirror", "", `Maxmind mirror url (example: http://geoip.local/databases.`)
flags.StringVar(&nginx.MaxmindLicenseKey, "maxmind-license-key", "", `Maxmind license key to download GeoLite2 Databases.
-https://blog.maxmind.com/2019/12/18/significant-changes-to-accessing-and-using-geolite2-databases .`)
+https://blog.maxmind.com/2019/12/significant-changes-to-accessing-and-using-geolite2-databases/ .`)
flags.StringVar(&nginx.MaxmindEditionIDs, "maxmind-edition-ids", "GeoLite2-City,GeoLite2-ASN", `Maxmind edition ids to download GeoLite2 Databases.`)
flags.IntVar(&nginx.MaxmindRetriesCount, "maxmind-retries-count", 1, "Number of attempts to download the GeoIP DB.")
flags.DurationVar(&nginx.MaxmindRetriesTimeout, "maxmind-retries-timeout", time.Second*0, "Maxmind downloading delay between 1st and 2nd attempt, 0s - do not retry to download if something went wrong.")
From b75bebb6c94999cb4ee5dda5fc1a816519f85983 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 26 Aug 2024 13:31:57 +0200
Subject: [PATCH 204/283] Bump github/codeql-action from 3.26.2 to 3.26.5 in
the all group (#11867)
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
.github/workflows/scorecards.yml | 2 +-
.github/workflows/vulnerability-scans.yaml | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/.github/workflows/scorecards.yml b/.github/workflows/scorecards.yml
index 3301b12cf..2a1489f5d 100644
--- a/.github/workflows/scorecards.yml
+++ b/.github/workflows/scorecards.yml
@@ -59,6 +59,6 @@ jobs:
# Upload the results to GitHub's code scanning dashboard.
- name: "Upload to code-scanning"
- uses: github/codeql-action/upload-sarif@429e1977040da7a23b6822b13c129cd1ba93dbb2 # v3.26.2
+ uses: github/codeql-action/upload-sarif@2c779ab0d087cd7fe7b826087247c2c81f27bfa6 # v3.26.5
with:
sarif_file: results.sarif
diff --git a/.github/workflows/vulnerability-scans.yaml b/.github/workflows/vulnerability-scans.yaml
index dcf012368..2d135695d 100644
--- a/.github/workflows/vulnerability-scans.yaml
+++ b/.github/workflows/vulnerability-scans.yaml
@@ -75,7 +75,7 @@ jobs:
# This step checks out a copy of your repository.
- name: Upload SARIF file
- uses: github/codeql-action/upload-sarif@429e1977040da7a23b6822b13c129cd1ba93dbb2 # v3.26.2
+ uses: github/codeql-action/upload-sarif@2c779ab0d087cd7fe7b826087247c2c81f27bfa6 # v3.26.5
with:
token: ${{ github.token }}
# Path to SARIF file relative to the root of the repository
From 93f9f9fbb30cb90b0f7e4f86908e38fedcb2a6fa Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 26 Aug 2024 15:58:34 +0200
Subject: [PATCH 205/283] Bump the all group with 2 updates (#11865)
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 4 ++--
go.sum | 8 ++++----
2 files changed, 6 insertions(+), 6 deletions(-)
diff --git a/go.mod b/go.mod
index 95123b04b..0f43520cc 100644
--- a/go.mod
+++ b/go.mod
@@ -14,10 +14,10 @@ require (
github.com/mitchellh/mapstructure v1.5.0
github.com/moul/pb v0.0.0-20220425114252-bca18df4138c
github.com/ncabatoff/process-exporter v0.8.3
- github.com/onsi/ginkgo/v2 v2.20.0
+ github.com/onsi/ginkgo/v2 v2.20.1
github.com/opencontainers/runc v1.1.13
github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2
- github.com/prometheus/client_golang v1.20.1
+ github.com/prometheus/client_golang v1.20.2
github.com/prometheus/client_model v0.6.1
github.com/prometheus/common v0.55.0
github.com/spf13/cobra v1.8.1
diff --git a/go.sum b/go.sum
index 790fd5215..b4022d912 100644
--- a/go.sum
+++ b/go.sum
@@ -165,8 +165,8 @@ github.com/onsi/ginkgo v1.6.0/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+W
github.com/onsi/ginkgo v1.12.1/go.mod h1:zj2OWP4+oCPe1qIXoGWkgMRwljMUYCdkwsT2108oapk=
github.com/onsi/ginkgo v1.16.5 h1:8xi0RTUf59SOSfEtZMvwTvXYMzG4gV23XVHOZiXNtnE=
github.com/onsi/ginkgo v1.16.5/go.mod h1:+E8gABHa3K6zRBolWtd+ROzc/U5bkGt0FwiG042wbpU=
-github.com/onsi/ginkgo/v2 v2.20.0 h1:PE84V2mHqoT1sglvHc8ZdQtPcwmvvt29WLEEO3xmdZw=
-github.com/onsi/ginkgo/v2 v2.20.0/go.mod h1:lG9ey2Z29hR41WMVthyJBGUBcBhGOtoPF2VFMvBXFCI=
+github.com/onsi/ginkgo/v2 v2.20.1 h1:YlVIbqct+ZmnEph770q9Q7NVAz4wwIiVNahee6JyUzo=
+github.com/onsi/ginkgo/v2 v2.20.1/go.mod h1:lG9ey2Z29hR41WMVthyJBGUBcBhGOtoPF2VFMvBXFCI=
github.com/onsi/gomega v1.7.1/go.mod h1:XdKZgCCFLUoM/7CFJVPcG8C1xQ1AJ0vpAezJrB7JYyY=
github.com/onsi/gomega v1.10.1/go.mod h1:iN09h71vgCQne3DLsj+A5owkum+a2tYe+TOCB1ybHNo=
github.com/onsi/gomega v1.34.1 h1:EUMJIKUjM8sKjYbtxQI9A4z2o+rruxnzNvpknOXie6k=
@@ -182,8 +182,8 @@ github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINE
github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 h1:Jamvg5psRIccs7FGNTlIRMkT8wgtp5eCXdBlqhYGL6U=
github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
-github.com/prometheus/client_golang v1.20.1 h1:IMJXHOD6eARkQpxo8KkhgEVFlBNm+nkrFUyGlIu7Na8=
-github.com/prometheus/client_golang v1.20.1/go.mod h1:PIEt8X02hGcP8JWbeHyeZ53Y/jReSnHgO035n//V5WE=
+github.com/prometheus/client_golang v1.20.2 h1:5ctymQzZlyOON1666svgwn3s6IKWgfbjsejTMiXIyjg=
+github.com/prometheus/client_golang v1.20.2/go.mod h1:PIEt8X02hGcP8JWbeHyeZ53Y/jReSnHgO035n//V5WE=
github.com/prometheus/client_model v0.6.1 h1:ZKSh/rekM+n3CeS952MLRAdFwIKqeY8b62p8ais2e9E=
github.com/prometheus/client_model v0.6.1/go.mod h1:OrxVMOVHjw3lKMa8+x6HeMGkHMQyHDk9E3jmP2AmGiY=
github.com/prometheus/common v0.55.0 h1:KEi6DK7lXW/m7Ig5i47x0vRzuBsHuvJdi5ee6Y3G1dc=
From 034c3ccad41374822a9180dceb3e5b999dc43f2f Mon Sep 17 00:00:00 2001
From: Jon Carl
Date: Mon, 26 Aug 2024 13:09:11 -0600
Subject: [PATCH 206/283] Metrics: Add `--metrics-per-undefined-host` argument.
(#11818)
Signed-off-by: Jon Carl
---
cmd/dataplane/main.go | 2 +-
cmd/nginx/main.go | 2 +-
docs/user-guide/cli-arguments.md | 1 +
docs/user-guide/monitoring.md | 4 +-
internal/ingress/controller/controller.go | 15 ++--
internal/ingress/metric/collectors/socket.go | 16 ++--
.../ingress/metric/collectors/socket_test.go | 75 ++++++++++++++++---
internal/ingress/metric/main.go | 4 +-
pkg/flags/flags.go | 8 ++
pkg/flags/flags_test.go | 26 +++++++
test/e2e/metrics/metrics.go | 47 ++++++++++++
11 files changed, 172 insertions(+), 28 deletions(-)
diff --git a/cmd/dataplane/main.go b/cmd/dataplane/main.go
index 29a175a6f..e7e4dc38f 100644
--- a/cmd/dataplane/main.go
+++ b/cmd/dataplane/main.go
@@ -66,7 +66,7 @@ func main() {
mc := metric.NewDummyCollector()
if conf.EnableMetrics {
// TODO: Ingress class is not a part of dataplane anymore
- mc, err = metric.NewCollector(conf.MetricsPerHost, conf.ReportStatusClasses, reg, conf.IngressClassConfiguration.Controller, *conf.MetricsBuckets, conf.MetricsBucketFactor, conf.MetricsMaxBuckets, conf.ExcludeSocketMetrics)
+ mc, err = metric.NewCollector(conf.MetricsPerHost, conf.MetricsPerUndefinedHost, conf.ReportStatusClasses, reg, conf.IngressClassConfiguration.Controller, *conf.MetricsBuckets, conf.MetricsBucketFactor, conf.MetricsMaxBuckets, conf.ExcludeSocketMetrics)
if err != nil {
klog.Fatalf("Error creating prometheus collector: %v", err)
}
diff --git a/cmd/nginx/main.go b/cmd/nginx/main.go
index ea5acedc2..781f3a8eb 100644
--- a/cmd/nginx/main.go
+++ b/cmd/nginx/main.go
@@ -130,7 +130,7 @@ func main() {
mc := metric.NewDummyCollector()
if conf.EnableMetrics {
- mc, err = metric.NewCollector(conf.MetricsPerHost, conf.ReportStatusClasses, reg, conf.IngressClassConfiguration.Controller, *conf.MetricsBuckets, conf.MetricsBucketFactor, conf.MetricsMaxBuckets, conf.ExcludeSocketMetrics)
+ mc, err = metric.NewCollector(conf.MetricsPerHost, conf.MetricsPerUndefinedHost, conf.ReportStatusClasses, reg, conf.IngressClassConfiguration.Controller, *conf.MetricsBuckets, conf.MetricsBucketFactor, conf.MetricsMaxBuckets, conf.ExcludeSocketMetrics)
if err != nil {
klog.Fatalf("Error creating prometheus collector: %v", err)
}
diff --git a/docs/user-guide/cli-arguments.md b/docs/user-guide/cli-arguments.md
index 5315dd325..1beb821c7 100644
--- a/docs/user-guide/cli-arguments.md
+++ b/docs/user-guide/cli-arguments.md
@@ -48,6 +48,7 @@ They are set in the container spec of the `ingress-nginx-controller` Deployment
| `--maxmind-license-key` | Maxmind license key to download GeoLite2 Databases. https://blog.maxmind.com/2019/12/significant-changes-to-accessing-and-using-geolite2-databases/ . |
| `--maxmind-mirror` | Maxmind mirror url (example: http://geoip.local/databases. |
| `--metrics-per-host` | Export metrics per-host. (default true) |
+| `--metrics-per-undefined-host` | Export metrics per-host even if the host is not defined in an ingress. Requires --metrics-per-host to be set to true. (default false) |
| `--monitor-max-batch-size` | Max batch size of NGINX metrics. (default 10000)|
| `--post-shutdown-grace-period` | Additional delay in seconds before controller container exits. (default 10) |
| `--profiler-port` | Port to use for expose the ingress controller Go profiler when it is enabled. (default 10245) |
diff --git a/docs/user-guide/monitoring.md b/docs/user-guide/monitoring.md
index b96914e1b..f08e1bc2f 100644
--- a/docs/user-guide/monitoring.md
+++ b/docs/user-guide/monitoring.md
@@ -166,7 +166,9 @@ According to the above example, this URL will be http://10.192.0.3:31086
#### Wildcard ingresses
- - By default request metrics are labeled with the hostname. When you have a wildcard domain ingress, then there will be no metrics for that ingress (to prevent the metrics from exploding in cardinality). To get metrics in this case you need to run the ingress controller with `--metrics-per-host=false` (you will lose labeling by hostname, but still have labeling by ingress).
+ - By default request metrics are labeled with the hostname. When you have a wildcard domain ingress, then there will be no metrics for that ingress (to prevent the metrics from exploding in cardinality). To get metrics in this case you have two options:
+ - Run the ingress controller with `--metrics-per-host=false`. You will lose labeling by hostname, but still have labeling by ingress.
+ - Run the ingress controller with `--metrics-per-undefined-host=true --metrics-per-host=true`. You will get labeling by hostname even if the hostname is not explicitly defined on an ingress. Be warned that cardinality could explode due to many hostnames.
### Grafana dashboard using ingress resource
- If you want to expose the dashboard for grafana using an ingress resource, then you can :
diff --git a/internal/ingress/controller/controller.go b/internal/ingress/controller/controller.go
index 45e11268c..aa8f4c4b9 100644
--- a/internal/ingress/controller/controller.go
+++ b/internal/ingress/controller/controller.go
@@ -105,13 +105,14 @@ type Configuration struct {
EnableProfiling bool
- EnableMetrics bool
- MetricsPerHost bool
- MetricsBuckets *collectors.HistogramBuckets
- MetricsBucketFactor float64
- MetricsMaxBuckets uint32
- ReportStatusClasses bool
- ExcludeSocketMetrics []string
+ EnableMetrics bool
+ MetricsPerHost bool
+ MetricsPerUndefinedHost bool
+ MetricsBuckets *collectors.HistogramBuckets
+ MetricsBucketFactor float64
+ MetricsMaxBuckets uint32
+ ReportStatusClasses bool
+ ExcludeSocketMetrics []string
FakeCertificate *ingress.SSLCert
diff --git a/internal/ingress/metric/collectors/socket.go b/internal/ingress/metric/collectors/socket.go
index d0b57eb43..0bdd816ae 100644
--- a/internal/ingress/metric/collectors/socket.go
+++ b/internal/ingress/metric/collectors/socket.go
@@ -81,8 +81,9 @@ type SocketCollector struct {
hosts sets.Set[string]
- metricsPerHost bool
- reportStatusClasses bool
+ metricsPerHost bool
+ metricsPerUndefinedHost bool
+ reportStatusClasses bool
}
var requestTags = []string{
@@ -99,7 +100,7 @@ var requestTags = []string{
// NewSocketCollector creates a new SocketCollector instance using
// the ingress watch namespace and class used by the controller
-func NewSocketCollector(pod, namespace, class string, metricsPerHost, reportStatusClasses bool, buckets HistogramBuckets, bucketFactor float64, maxBuckets uint32, excludeMetrics []string) (*SocketCollector, error) {
+func NewSocketCollector(pod, namespace, class string, metricsPerHost, metricsPerUndefinedHost, reportStatusClasses bool, buckets HistogramBuckets, bucketFactor float64, maxBuckets uint32, excludeMetrics []string) (*SocketCollector, error) {
socket := "/tmp/nginx/prometheus-nginx.socket"
// unix sockets must be unlink()ed before being used
//nolint:errcheck // Ignore unlink error
@@ -139,8 +140,9 @@ func NewSocketCollector(pod, namespace, class string, metricsPerHost, reportStat
sc := &SocketCollector{
listener: listener,
- metricsPerHost: metricsPerHost,
- reportStatusClasses: reportStatusClasses,
+ metricsPerHost: metricsPerHost,
+ metricsPerUndefinedHost: metricsPerUndefinedHost,
+ reportStatusClasses: reportStatusClasses,
connectTime: histogramMetric(
&prometheus.HistogramOpts{
@@ -306,8 +308,8 @@ func (sc *SocketCollector) handleMessage(msg []byte) {
for i := range statsBatch {
stats := &statsBatch[i]
- if sc.metricsPerHost && !sc.hosts.Has(stats.Host) {
- klog.V(3).InfoS("Skipping metric for host not being served", "host", stats.Host)
+ if sc.metricsPerHost && !sc.hosts.Has(stats.Host) && !sc.metricsPerUndefinedHost {
+ klog.V(3).InfoS("Skipping metric for host not explicitly defined in an ingress", "host", stats.Host)
continue
}
diff --git a/internal/ingress/metric/collectors/socket_test.go b/internal/ingress/metric/collectors/socket_test.go
index a8261a9ca..3a1f29f35 100644
--- a/internal/ingress/metric/collectors/socket_test.go
+++ b/internal/ingress/metric/collectors/socket_test.go
@@ -87,14 +87,15 @@ func TestCollector(t *testing.T) {
maxBuckets := uint32(100)
cases := []struct {
- name string
- data []string
- metrics []string
- useStatusClasses bool
- excludeMetrics []string
- wantBefore string
- removeIngresses []string
- wantAfter string
+ name string
+ data []string
+ metrics []string
+ metricsPerUndefinedHost bool
+ useStatusClasses bool
+ excludeMetrics []string
+ wantBefore string
+ removeIngresses []string
+ wantAfter string
}{
{
name: "invalid metric object should not increase prometheus metrics",
@@ -591,13 +592,69 @@ func TestCollector(t *testing.T) {
nginx_ingress_controller_response_duration_seconds_count{canary="",controller_class="ingress",controller_namespace="default",controller_pod="pod",host="testshop.com",ingress="web-yml",method="GET",namespace="test-app-production",path="/admin",service="test-app",status="2xx"} 1
`,
},
+ {
+ name: "metrics with a host should not be dropped when the host is not in the hosts slice but metricsPerUndefinedHost is true",
+ data: []string{`[{
+ "host":"wildcard.testshop.com",
+ "status":"200",
+ "bytesSent":150.0,
+ "method":"GET",
+ "path":"/admin",
+ "requestLength":300.0,
+ "requestTime":60.0,
+ "upstreamLatency":1.0,
+ "upstreamHeaderTime":5.0,
+ "upstreamName":"test-upstream",
+ "upstreamIP":"1.1.1.1:8080",
+ "upstreamResponseTime":200,
+ "upstreamStatus":"220",
+ "namespace":"test-app-production",
+ "ingress":"web-yml",
+ "service":"test-app",
+ "canary":""
+ }]`},
+ excludeMetrics: []string{"response_duration_seconds2", "test.*", "nginx_ingress_.*", "response_duration_secon"},
+ metrics: []string{"nginx_ingress_controller_requests"},
+ metricsPerUndefinedHost: true,
+ useStatusClasses: true,
+ wantBefore: `
+ # HELP nginx_ingress_controller_requests The total number of client requests
+ # TYPE nginx_ingress_controller_requests counter
+ nginx_ingress_controller_requests{canary="",controller_class="ingress",controller_namespace="default",controller_pod="pod",host="wildcard.testshop.com",ingress="web-yml",method="GET",namespace="test-app-production",path="/admin",service="test-app",status="2xx"} 1
+ `,
+ },
+ {
+ name: "metrics with a host should be dropped when the host is not in the hosts slice",
+ data: []string{`[{
+ "host":"wildcard.testshop.com",
+ "status":"200",
+ "bytesSent":150.0,
+ "method":"GET",
+ "path":"/admin",
+ "requestLength":300.0,
+ "requestTime":60.0,
+ "upstreamLatency":1.0,
+ "upstreamHeaderTime":5.0,
+ "upstreamName":"test-upstream",
+ "upstreamIP":"1.1.1.1:8080",
+ "upstreamResponseTime":200,
+ "upstreamStatus":"220",
+ "namespace":"test-app-production",
+ "ingress":"web-yml",
+ "service":"test-app",
+ "canary":""
+ }]`},
+ excludeMetrics: []string{"response_duration_seconds2", "test.*", "nginx_ingress_.*", "response_duration_secon"},
+ metrics: []string{"nginx_ingress_controller_requests"},
+ useStatusClasses: true,
+ },
}
for _, c := range cases {
t.Run(c.name, func(t *testing.T) {
registry := prometheus.NewPedanticRegistry()
- sc, err := NewSocketCollector("pod", "default", "ingress", true, c.useStatusClasses, buckets, bucketFactor, maxBuckets, c.excludeMetrics)
+ sc, err := NewSocketCollector("pod", "default", "ingress", true, c.metricsPerUndefinedHost, c.useStatusClasses, buckets, bucketFactor, maxBuckets, c.excludeMetrics)
if err != nil {
t.Errorf("%v: unexpected error creating new SocketCollector: %v", c.name, err)
}
diff --git a/internal/ingress/metric/main.go b/internal/ingress/metric/main.go
index 99128c3c6..9ed401d19 100644
--- a/internal/ingress/metric/main.go
+++ b/internal/ingress/metric/main.go
@@ -71,7 +71,7 @@ type collector struct {
}
// NewCollector creates a new metric collector the for ingress controller
-func NewCollector(metricsPerHost, reportStatusClasses bool, registry *prometheus.Registry, ingressclass string, buckets collectors.HistogramBuckets, bucketFactor float64, maxBuckets uint32, excludedSocketMetrics []string) (Collector, error) {
+func NewCollector(metricsPerHost, metricsPerUndefinedHost, reportStatusClasses bool, registry *prometheus.Registry, ingressclass string, buckets collectors.HistogramBuckets, bucketFactor float64, maxBuckets uint32, excludedSocketMetrics []string) (Collector, error) {
podNamespace := os.Getenv("POD_NAMESPACE")
if podNamespace == "" {
podNamespace = "default"
@@ -89,7 +89,7 @@ func NewCollector(metricsPerHost, reportStatusClasses bool, registry *prometheus
return nil, err
}
- s, err := collectors.NewSocketCollector(podName, podNamespace, ingressclass, metricsPerHost, reportStatusClasses, buckets, bucketFactor, maxBuckets, excludedSocketMetrics)
+ s, err := collectors.NewSocketCollector(podName, podNamespace, ingressclass, metricsPerHost, metricsPerUndefinedHost, reportStatusClasses, buckets, bucketFactor, maxBuckets, excludedSocketMetrics)
if err != nil {
return nil, err
}
diff --git a/pkg/flags/flags.go b/pkg/flags/flags.go
index 5a1ab0aa9..6f62f75b5 100644
--- a/pkg/flags/flags.go
+++ b/pkg/flags/flags.go
@@ -17,6 +17,7 @@ limitations under the License.
package flags
import (
+ "errors"
"flag"
"fmt"
"net"
@@ -177,6 +178,8 @@ Requires the update-status parameter.`)
`Enables the collection of NGINX metrics.`)
metricsPerHost = flags.Bool("metrics-per-host", true,
`Export metrics per-host.`)
+ metricsPerUndefinedHost = flags.Bool("metrics-per-undefined-host", false,
+ `Export metrics per-host even if the host is not defined in an ingress. Requires --metrics-per-host to be set to true.`)
reportStatusClasses = flags.Bool("report-status-classes", false,
`Use status classes (2xx, 3xx, 4xx and 5xx) instead of status codes in metrics.`)
@@ -319,6 +322,10 @@ https://blog.maxmind.com/2019/12/significant-changes-to-accessing-and-using-geol
}
}
+ if *metricsPerUndefinedHost && !*metricsPerHost {
+ return false, nil, errors.New("--metrics-per-undefined-host=true must be passed with --metrics-per-host=true")
+ }
+
if *electionTTL <= 0 {
*electionTTL = 30 * time.Second
}
@@ -340,6 +347,7 @@ https://blog.maxmind.com/2019/12/significant-changes-to-accessing-and-using-geol
EnableProfiling: *profiling,
EnableMetrics: *enableMetrics,
MetricsPerHost: *metricsPerHost,
+ MetricsPerUndefinedHost: *metricsPerUndefinedHost,
MetricsBuckets: histogramBuckets,
MetricsBucketFactor: *bucketFactor,
MetricsMaxBuckets: *maxBuckets,
diff --git a/pkg/flags/flags_test.go b/pkg/flags/flags_test.go
index e51d5fa6c..fdf153021 100644
--- a/pkg/flags/flags_test.go
+++ b/pkg/flags/flags_test.go
@@ -212,3 +212,29 @@ func TestLeaderElectionTTLParseValueInHours(t *testing.T) {
t.Fatalf("Expected --election-ttl and conf.ElectionTTL as 1h, but found: %v", conf.ElectionTTL)
}
}
+
+func TestMetricsPerUndefinedHost(t *testing.T) {
+ ResetForTesting(func() { t.Fatal("Parsing failed") })
+
+ oldArgs := os.Args
+ defer func() { os.Args = oldArgs }()
+ os.Args = []string{"cmd", "--metrics-per-undefined-host=true"}
+
+ _, _, err := ParseFlags()
+ if err != nil {
+ t.Fatalf("Expected no error but got: %s", err)
+ }
+}
+
+func TestMetricsPerUndefinedHostWithMetricsPerHostFalse(t *testing.T) {
+ ResetForTesting(func() { t.Fatal("Parsing failed") })
+
+ oldArgs := os.Args
+ defer func() { os.Args = oldArgs }()
+ os.Args = []string{"cmd", "--metrics-per-host=false", "--metrics-per-undefined-host=true"}
+
+ _, _, err := ParseFlags()
+ if err == nil {
+ t.Fatalf("Expected an error parsing flags but none returned")
+ }
+}
diff --git a/test/e2e/metrics/metrics.go b/test/e2e/metrics/metrics.go
index 907b53732..bec09bb37 100644
--- a/test/e2e/metrics/metrics.go
+++ b/test/e2e/metrics/metrics.go
@@ -36,6 +36,7 @@ const waitForMetrics = 2 * time.Second
var _ = framework.IngressNginxDescribe("[metrics] exported prometheus metrics", func() {
f := framework.NewDefaultFramework("metrics")
host := "foo.com"
+ wildcardHost := "wildcard." + host
ginkgo.BeforeEach(func() {
f.NewEchoDeployment()
@@ -91,4 +92,50 @@ var _ = framework.IngressNginxDescribe("[metrics] exported prometheus metrics",
assert.Nil(ginkgo.GinkgoT(), err)
assert.NotNil(ginkgo.GinkgoT(), mf)
})
+ ginkgo.It("request metrics per undefined host are present when flag is set", func() {
+ err := f.UpdateIngressControllerDeployment(func(deployment *appsv1.Deployment) error {
+ args := deployment.Spec.Template.Spec.Containers[0].Args
+ args = append(args, "--metrics-per-undefined-host=true")
+ deployment.Spec.Template.Spec.Containers[0].Args = args
+ _, err := f.KubeClientSet.AppsV1().Deployments(f.Namespace).Update(context.TODO(), deployment, metav1.UpdateOptions{})
+ return err
+ })
+ assert.Nil(ginkgo.GinkgoT(), err, "updating deployment")
+
+ f.HTTPTestClient().
+ GET("/").
+ WithHeader("Host", wildcardHost).
+ Expect().
+ Status(http.StatusNotFound)
+ time.Sleep(waitForMetrics)
+
+ ip := f.GetNginxPodIP()
+ reqMetrics, err := f.GetMetric("nginx_ingress_controller_requests", ip)
+ assert.Nil(ginkgo.GinkgoT(), err)
+ assert.NotNil(ginkgo.GinkgoT(), reqMetrics.Metric)
+ assert.Len(ginkgo.GinkgoT(), reqMetrics.Metric, 1)
+
+ containedLabel := false
+ for _, label := range reqMetrics.Metric[0].Label {
+ if *label.Name == "host" && *label.Value == wildcardHost {
+ containedLabel = true
+ break
+ }
+ }
+
+ assert.Truef(ginkgo.GinkgoT(), containedLabel, "expected reqMetrics to contain label with \"name\"=\"host\" \"value\"=%q, but it did not: %s", wildcardHost, reqMetrics.String())
+ })
+ ginkgo.It("request metrics per undefined host are not present when flag is not set", func() {
+ f.HTTPTestClient().
+ GET("/").
+ WithHeader("Host", wildcardHost).
+ Expect().
+ Status(http.StatusNotFound)
+ time.Sleep(waitForMetrics)
+
+ ip := f.GetNginxPodIP()
+ reqMetrics, err := f.GetMetric("nginx_ingress_controller_requests", ip)
+ assert.EqualError(ginkgo.GinkgoT(), err, "there is no metric with name nginx_ingress_controller_requests")
+ assert.Nil(ginkgo.GinkgoT(), reqMetrics)
+ })
})
From e6851d91df309e7251796873ac4c4d23da827b8e Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Mon, 26 Aug 2024 21:15:42 +0200
Subject: [PATCH 207/283] Dashboard: Remove `ingress_upstream_latency_seconds`.
(#11878)
---
.../request-handling-performance.json | 98 -------------------
1 file changed, 98 deletions(-)
diff --git a/deploy/grafana/dashboards/request-handling-performance.json b/deploy/grafana/dashboards/request-handling-performance.json
index 61db983a6..cde796384 100644
--- a/deploy/grafana/dashboards/request-handling-performance.json
+++ b/deploy/grafana/dashboards/request-handling-performance.json
@@ -893,104 +893,6 @@
],
"title": "Average Response Size by Method and Path",
"type": "timeseries"
- },
- {
- "datasource": {
- "type": "prometheus",
- "uid": "${DS_PROMETHEUS}"
- },
- "fieldConfig": {
- "defaults": {
- "color": {
- "mode": "palette-classic"
- },
- "custom": {
- "axisBorderShow": false,
- "axisCenteredZero": false,
- "axisColorMode": "text",
- "axisLabel": "",
- "axisPlacement": "auto",
- "barAlignment": 0,
- "drawStyle": "line",
- "fillOpacity": 10,
- "gradientMode": "none",
- "hideFrom": {
- "legend": false,
- "tooltip": false,
- "viz": false
- },
- "insertNulls": false,
- "lineInterpolation": "linear",
- "lineWidth": 1,
- "pointSize": 5,
- "scaleDistribution": {
- "type": "linear"
- },
- "showPoints": "never",
- "spanNulls": false,
- "stacking": {
- "group": "A",
- "mode": "none"
- },
- "thresholdsStyle": {
- "mode": "off"
- }
- },
- "links": [],
- "mappings": [],
- "thresholds": {
- "mode": "absolute",
- "steps": [
- {
- "color": "green"
- },
- {
- "color": "red",
- "value": 80
- }
- ]
- },
- "unit": "s"
- },
- "overrides": []
- },
- "gridPos": {
- "h": 8,
- "w": 12,
- "x": 0,
- "y": 32
- },
- "id": 96,
- "options": {
- "legend": {
- "calcs": [],
- "displayMode": "list",
- "placement": "bottom",
- "showLegend": true
- },
- "tooltip": {
- "mode": "multi",
- "sort": "desc"
- }
- },
- "pluginVersion": "10.4.3",
- "targets": [
- {
- "datasource": {
- "type": "prometheus",
- "uid": "${DS_PROMETHEUS}"
- },
- "expr": "sum (\n rate(\n nginx_ingress_controller_ingress_upstream_latency_seconds_sum {\n ingress =~ \"$ingress\",\n }[5m]\n)) / sum (\n rate(\n nginx_ingress_controller_ingress_upstream_latency_seconds_count {\n ingress =~ \"$ingress\",\n }[5m]\n )\n)\n",
- "hide": false,
- "instant": false,
- "interval": "",
- "intervalFactor": 1,
- "legendFormat": "average",
- "refId": "B"
- }
- ],
- "title": "Upstream Service Latency",
- "type": "timeseries"
}
],
"refresh": "30s",
From bde6a6bc3e5751c1223369462db365cfd1f1a268 Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Mon, 26 Aug 2024 21:18:18 +0200
Subject: [PATCH 208/283] Lua: Remove plugins from `.luacheckrc` & E2E docs.
(#11872)
---
.luacheckrc | 2 +-
docs/e2e-tests.md | 2 --
2 files changed, 1 insertion(+), 3 deletions(-)
diff --git a/.luacheckrc b/.luacheckrc
index a24399e26..5a1c249fe 100644
--- a/.luacheckrc
+++ b/.luacheckrc
@@ -1,6 +1,6 @@
std = 'ngx_lua'
max_line_length = 100
-exclude_files = {'./rootfs/etc/nginx/lua/test/**/*.lua', './rootfs/etc/nginx/lua/plugins/**/test/**/*.lua'}
+exclude_files = {'./rootfs/etc/nginx/lua/test/**/*.lua'}
files["rootfs/etc/nginx/lua/lua_ingress.lua"] = {
ignore = { "122" },
-- TODO(elvinefendi) figure out why this does not work
diff --git a/docs/e2e-tests.md b/docs/e2e-tests.md
index c95603853..c7f8259a2 100644
--- a/docs/e2e-tests.md
+++ b/docs/e2e-tests.md
@@ -495,8 +495,6 @@ Do not try to edit it manually.
- [should include opentelemetry_trust_incoming_spans on directive when enabled](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/opentelemetry.go#L76)
- [should not exists opentelemetry_operation_name directive when is empty](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/opentelemetry.go#L91)
- [should exists opentelemetry_operation_name directive when is configured](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/opentelemetry.go#L106)
-### [plugins](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/plugins.go#L28)
-- [should exist a x-hello-world header](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/plugins.go#L35)
### [proxy-connect-timeout](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/proxy_connect_timeout.go#L29)
- [should set valid proxy timeouts using configmap values](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/proxy_connect_timeout.go#L37)
- [should not set invalid proxy timeouts using configmap values](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/proxy_connect_timeout.go#L53)
From e9f6c8e8f2d630e7394b9d2788a4d3feee5aa919 Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Mon, 26 Aug 2024 22:09:16 +0200
Subject: [PATCH 209/283] Security: Follow-up on recent changes. (#11874)
---
.github/workflows/images.yaml | 2 +-
charts/ingress-nginx/templates/_params.tpl | 4 ++--
.../templates/controller-configmap.yaml | 4 +++-
.../nginx-configuration/configmap.md | 19 +++++++++----------
internal/ingress/resolver/mock.go | 2 +-
pkg/flags/flags.go | 2 +-
test/e2e/settings/proxy_host.go | 12 ++----------
test/e2e/wait-for-nginx.sh | 1 -
8 files changed, 19 insertions(+), 27 deletions(-)
diff --git a/.github/workflows/images.yaml b/.github/workflows/images.yaml
index fe83f1dd3..63a72dd3a 100644
--- a/.github/workflows/images.yaml
+++ b/.github/workflows/images.yaml
@@ -141,7 +141,7 @@ jobs:
(needs.changes.outputs.kube-webhook-certgen == 'true')
strategy:
matrix:
- k8s: [v1.26.15, v1.27.13, v1.28.9, v1.29.4, v1.30.0]
+ k8s: [v1.28.13, v1.29.8, v1.30.4, v1.31.0]
steps:
- name: Checkout
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
diff --git a/charts/ingress-nginx/templates/_params.tpl b/charts/ingress-nginx/templates/_params.tpl
index 48569a8b0..763e55570 100644
--- a/charts/ingress-nginx/templates/_params.tpl
+++ b/charts/ingress-nginx/templates/_params.tpl
@@ -1,7 +1,7 @@
{{- define "ingress-nginx.params" -}}
- /nginx-ingress-controller
-{{- if .Values.controller.enableAnnotationValidations }}
-- --enable-annotation-validation=true
+{{- if not .Values.controller.enableAnnotationValidations }}
+- --enable-annotation-validation=false
{{- end }}
{{- if .Values.defaultBackend.enabled }}
- --default-backend-service=$(POD_NAMESPACE)/{{ include "ingress-nginx.defaultBackend.fullname" . }}
diff --git a/charts/ingress-nginx/templates/controller-configmap.yaml b/charts/ingress-nginx/templates/controller-configmap.yaml
index 22080d115..b73cdc2d0 100644
--- a/charts/ingress-nginx/templates/controller-configmap.yaml
+++ b/charts/ingress-nginx/templates/controller-configmap.yaml
@@ -13,7 +13,9 @@ metadata:
name: {{ include "ingress-nginx.controller.fullname" . }}
namespace: {{ include "ingress-nginx.namespace" . }}
data:
- allow-snippet-annotations: "{{ .Values.controller.allowSnippetAnnotations }}"
+{{- if .Values.controller.allowSnippetAnnotations }}
+ allow-snippet-annotations: "true"
+{{- end }}
{{- if .Values.controller.addHeaders }}
add-headers: {{ include "ingress-nginx.namespace" . }}/{{ include "ingress-nginx.fullname" . }}-custom-add-headers
{{- end }}
diff --git a/docs/user-guide/nginx-configuration/configmap.md b/docs/user-guide/nginx-configuration/configmap.md
index 51896e3a1..c2e6935d5 100644
--- a/docs/user-guide/nginx-configuration/configmap.md
+++ b/docs/user-guide/nginx-configuration/configmap.md
@@ -29,9 +29,9 @@ The following table shows a configuration option's name, type, and the default v
|:--------------------------------------------------------------------------------|:-------------|:-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|:------------------------------------------------------------------------------------|
| [add-headers](#add-headers) | string | "" | |
| [allow-backend-server-header](#allow-backend-server-header) | bool | "false" | |
-| [allow-cross-namespace-resources](#allow-cross-namespace-resources) | bool | "true" | |
+| [allow-cross-namespace-resources](#allow-cross-namespace-resources) | bool | "false" | |
| [allow-snippet-annotations](#allow-snippet-annotations) | bool | "false" | |
-| [annotations-risk-level](#annotations-risk-level) | string | Critical | |
+| [annotations-risk-level](#annotations-risk-level) | string | High | |
| [annotation-value-word-blocklist](#annotation-value-word-blocklist) | string array | "" | |
| [hide-headers](#hide-headers) | string array | empty | |
| [access-log-params](#access-log-params) | string | "" | |
@@ -221,7 +221,7 @@ The following table shows a configuration option's name, type, and the default v
| [service-upstream](#service-upstream) | bool | "false" | |
| [ssl-reject-handshake](#ssl-reject-handshake) | bool | "false" | |
| [debug-connections](#debug-connections) | []string | "127.0.0.1,1.1.1.1/24" | |
-| [strict-validate-path-type](#strict-validate-path-type) | bool | "false" (v1.7.x) | |
+| [strict-validate-path-type](#strict-validate-path-type) | bool | "true" | |
| [grpc-buffer-size-kb](#grpc-buffer-size-kb) | int | 0 | |
## add-headers
@@ -234,18 +234,16 @@ Enables the return of the header Server from the backend instead of the generic
## allow-cross-namespace-resources
-Enables users to consume cross namespace resource on annotations, when was previously enabled . _**default:**_ true
+Enables users to consume cross namespace resource on annotations, when was previously enabled . _**default:**_ false
**Annotations that may be impacted with this change**:
+
* `auth-secret`
* `auth-proxy-set-header`
* `auth-tls-secret`
* `fastcgi-params-configmap`
* `proxy-ssl-secret`
-
-**This option will be defaulted to false in the next major release**
-
## allow-snippet-annotations
Enables Ingress to parse and add *-snippet annotations/directives created by the user. _**default:**_ `false`
@@ -253,15 +251,13 @@ Enables Ingress to parse and add *-snippet annotations/directives created by the
Warning: We recommend enabling this option only if you TRUST users with permission to create Ingress objects, as this
may allow a user to add restricted configurations to the final nginx.conf file
-**This option will be defaulted to false in the next major release**
-
## annotations-risk-level
Represents the risk accepted on an annotation. If the risk is, for instance `Medium`, annotations with risk High and Critical will not be accepted.
Accepted values are `Critical`, `High`, `Medium` and `Low`.
-Defaults to `Critical` but will be changed to `High` on the next minor release
+_**default:**_ `High`
## annotation-value-word-blocklist
@@ -1364,6 +1360,7 @@ _References:_
[http://nginx.org/en/docs/ngx_core_module.html#debug_connection](http://nginx.org/en/docs/ngx_core_module.html#debug_connection)
## strict-validate-path-type
+
Ingress objects contains a field called pathType that defines the proxy behavior. It can be `Exact`, `Prefix` and `ImplementationSpecific`.
When pathType is configured as `Exact` or `Prefix`, there should be a more strict validation, allowing only paths starting with "/" and
@@ -1377,6 +1374,8 @@ This means that Ingress objects that rely on paths containing regex characters s
The cluster admin should establish validation rules using mechanisms like [Open Policy Agent](https://www.openpolicyagent.org/) to
validate that only authorized users can use `ImplementationSpecific` pathType and that only the authorized characters can be used.
+_**default:**_ "true"
+
## grpc-buffer-size-kb
Sets the configuration for the GRPC Buffer Size parameter. If not set it will use the default from NGINX.
diff --git a/internal/ingress/resolver/mock.go b/internal/ingress/resolver/mock.go
index 679c3b13c..5a36155e9 100644
--- a/internal/ingress/resolver/mock.go
+++ b/internal/ingress/resolver/mock.go
@@ -39,7 +39,7 @@ func (m Mock) GetDefaultBackend() defaults.Backend {
func (m Mock) GetSecurityConfiguration() defaults.SecurityConfiguration {
defRisk := m.AnnotationsRiskLevel
if defRisk == "" {
- defRisk = "Critical"
+ defRisk = "High"
}
return defaults.SecurityConfiguration{
AnnotationsRiskLevel: defRisk,
diff --git a/pkg/flags/flags.go b/pkg/flags/flags.go
index 6f62f75b5..a64a37193 100644
--- a/pkg/flags/flags.go
+++ b/pkg/flags/flags.go
@@ -160,7 +160,7 @@ Requires the update-status parameter.`)
`Prefix of the Ingress annotations specific to the NGINX controller.`)
enableAnnotationValidation = flags.Bool("enable-annotation-validation", true,
- `If true, will enable the annotation validation feature. This value will be defaulted to true on a future release`)
+ `If true, will enable the annotation validation feature. Defaults to true`)
enableSSLChainCompletion = flags.Bool("enable-ssl-chain-completion", false,
`Autocomplete SSL certificate chains with missing intermediate CA certificates.
diff --git a/test/e2e/settings/proxy_host.go b/test/e2e/settings/proxy_host.go
index 3ce86127e..bb5dc9c01 100644
--- a/test/e2e/settings/proxy_host.go
+++ b/test/e2e/settings/proxy_host.go
@@ -58,16 +58,8 @@ var _ = framework.IngressNginxDescribe("Dynamic $proxy_host", func() {
})
ginkgo.It("should exist a proxy_host using the upstream-vhost annotation value", func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "true",
- "annotations-risk-level": "Critical", // To allow Configuration Snippet
- })
- defer func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "false",
- "annotations-risk-level": "High",
- })
- }()
+ disableSnippet := f.AllowSnippetConfiguration()
+ defer disableSnippet()
upstreamName := fmt.Sprintf("%v-%v-80", f.Namespace, framework.EchoService)
upstreamVHost := "different.host"
diff --git a/test/e2e/wait-for-nginx.sh b/test/e2e/wait-for-nginx.sh
index 506c4e03f..73023aba1 100755
--- a/test/e2e/wait-for-nginx.sh
+++ b/test/e2e/wait-for-nginx.sh
@@ -58,7 +58,6 @@ else
# TODO: remove the need to use fullnameOverride
fullnameOverride: nginx-ingress
controller:
- enableAnnotationValidations: true
image:
repository: ingress-controller/controller
chroot: ${IS_CHROOT}
From f6595f554abb6692f15296d75cc1f764e08679b8 Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Mon, 26 Aug 2024 22:30:48 +0200
Subject: [PATCH 210/283] Chart: Use generic values for `ConfigMap` test.
(#11877)
---
.../tests/controller-configmap_test.yaml | 12 ++++++++++--
1 file changed, 10 insertions(+), 2 deletions(-)
diff --git a/charts/ingress-nginx/tests/controller-configmap_test.yaml b/charts/ingress-nginx/tests/controller-configmap_test.yaml
index f0fc1c730..168b657d6 100644
--- a/charts/ingress-nginx/tests/controller-configmap_test.yaml
+++ b/charts/ingress-nginx/tests/controller-configmap_test.yaml
@@ -16,8 +16,16 @@ tests:
- it: should create a ConfigMap with templated values if `controller.config` contains templates
set:
controller.config:
- use-gzip: true
+ template: "test.{{ .Release.Namespace }}.svc.kubernetes.local"
+ integer: 12345
+ boolean: true
asserts:
- equal:
- path: data.use-gzip
+ path: data.template
+ value: test.NAMESPACE.svc.kubernetes.local
+ - equal:
+ path: data.integer
+ value: "12345"
+ - equal:
+ path: data.boolean
value: "true"
From 1c0a3ddf0369df411c05696186ca769d84e178d9 Mon Sep 17 00:00:00 2001
From: Seonghyeon Cho
Date: Tue, 27 Aug 2024 06:36:55 +0900
Subject: [PATCH 211/283] CI: Grant checks write permissions to E2E Test
Report. (#11862)
Signed-off-by: Seonghyeon Cho
---
.github/workflows/junit-reports.yaml | 4 ++++
1 file changed, 4 insertions(+)
diff --git a/.github/workflows/junit-reports.yaml b/.github/workflows/junit-reports.yaml
index 947b90c25..e2a82910e 100644
--- a/.github/workflows/junit-reports.yaml
+++ b/.github/workflows/junit-reports.yaml
@@ -5,6 +5,10 @@ on:
workflows: ['CI'] # runs after CI workflow
types:
- completed
+
+permissions:
+ checks: write
+
jobs:
report:
runs-on: ubuntu-latest
From d4c49112a4a5abdcced93bf34c589147b594da34 Mon Sep 17 00:00:00 2001
From: James Strong
Date: Mon, 26 Aug 2024 17:39:30 -0400
Subject: [PATCH 212/283] Annotations: Allow commas in URLs. (#11882)
Signed-off-by: James Strong
---
internal/ingress/annotations/parser/validators.go | 2 +-
internal/ingress/annotations/parser/validators_test.go | 5 +++++
2 files changed, 6 insertions(+), 1 deletion(-)
diff --git a/internal/ingress/annotations/parser/validators.go b/internal/ingress/annotations/parser/validators.go
index ffb4d9ba9..31524508f 100644
--- a/internal/ingress/annotations/parser/validators.go
+++ b/internal/ingress/annotations/parser/validators.go
@@ -44,7 +44,7 @@ var (
alphaNumericChars = `\-\.\_\~a-zA-Z0-9\/:`
extendedAlphaNumeric = alphaNumericChars + ", "
regexEnabledChars = regexp.QuoteMeta(`^$[](){}*+?|&=\`)
- urlEnabledChars = regexp.QuoteMeta(`:?&=`)
+ urlEnabledChars = regexp.QuoteMeta(`,:?&=`)
)
// IsValidRegex checks if the tested string can be used as a regex, but without any weird character.
diff --git a/internal/ingress/annotations/parser/validators_test.go b/internal/ingress/annotations/parser/validators_test.go
index ed8449452..6c88342e4 100644
--- a/internal/ingress/annotations/parser/validators_test.go
+++ b/internal/ingress/annotations/parser/validators_test.go
@@ -55,6 +55,11 @@ func TestValidateArrayOfServerName(t *testing.T) {
value: "*.so*mething.com,bla.com",
wantErr: false,
},
+ {
+ name: "should allow comma separated query params",
+ value: "https://oauth.example/oauth2/auth?allowed_groups=gid1,gid2",
+ wantErr: false,
+ },
{
name: "should deny names with weird characters",
value: "something.com,lolo;xpto.com,nothing.com",
From 5d457c7daa377b404d3d5bc2dbcfca477525ccfa Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Tue, 27 Aug 2024 00:04:17 +0200
Subject: [PATCH 213/283] Chart: Add tests for `PrometheusRule` &
`ServiceMonitor`. (#11883)
---
charts/ingress-nginx/README.md | 2 +-
...es.yaml => controller-prometheusrule.yaml} | 0
.../tests/controller-prometheusrule_test.yaml | 17 +++++++++++
.../tests/controller-servicemonitor_test.yaml | 29 +++++++++++++++++++
charts/ingress-nginx/values.yaml | 1 +
5 files changed, 48 insertions(+), 1 deletion(-)
rename charts/ingress-nginx/templates/{controller-prometheusrules.yaml => controller-prometheusrule.yaml} (100%)
create mode 100644 charts/ingress-nginx/tests/controller-prometheusrule_test.yaml
create mode 100644 charts/ingress-nginx/tests/controller-servicemonitor_test.yaml
diff --git a/charts/ingress-nginx/README.md b/charts/ingress-nginx/README.md
index 381ff3a6b..3896ee978 100644
--- a/charts/ingress-nginx/README.md
+++ b/charts/ingress-nginx/README.md
@@ -381,7 +381,7 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
| controller.metrics.service.servicePort | int | `10254` | |
| controller.metrics.service.type | string | `"ClusterIP"` | |
| controller.metrics.serviceMonitor.additionalLabels | object | `{}` | |
-| controller.metrics.serviceMonitor.annotations | object | `{}` | |
+| controller.metrics.serviceMonitor.annotations | object | `{}` | Annotations to be added to the ServiceMonitor. |
| controller.metrics.serviceMonitor.enabled | bool | `false` | |
| controller.metrics.serviceMonitor.metricRelabelings | list | `[]` | |
| controller.metrics.serviceMonitor.namespace | string | `""` | |
diff --git a/charts/ingress-nginx/templates/controller-prometheusrules.yaml b/charts/ingress-nginx/templates/controller-prometheusrule.yaml
similarity index 100%
rename from charts/ingress-nginx/templates/controller-prometheusrules.yaml
rename to charts/ingress-nginx/templates/controller-prometheusrule.yaml
diff --git a/charts/ingress-nginx/tests/controller-prometheusrule_test.yaml b/charts/ingress-nginx/tests/controller-prometheusrule_test.yaml
new file mode 100644
index 000000000..d60a98315
--- /dev/null
+++ b/charts/ingress-nginx/tests/controller-prometheusrule_test.yaml
@@ -0,0 +1,17 @@
+suite: Controller > PrometheusRule
+templates:
+ - controller-prometheusrule.yaml
+
+tests:
+ - it: should create a PrometheusRule if `controller.metrics.prometheusRule.enabled` is true
+ set:
+ controller.metrics.enabled: true
+ controller.metrics.prometheusRule.enabled: true
+ asserts:
+ - hasDocuments:
+ count: 1
+ - isKind:
+ of: PrometheusRule
+ - equal:
+ path: metadata.name
+ value: RELEASE-NAME-ingress-nginx-controller
diff --git a/charts/ingress-nginx/tests/controller-servicemonitor_test.yaml b/charts/ingress-nginx/tests/controller-servicemonitor_test.yaml
new file mode 100644
index 000000000..310097c1a
--- /dev/null
+++ b/charts/ingress-nginx/tests/controller-servicemonitor_test.yaml
@@ -0,0 +1,29 @@
+suite: Controller > ServiceMonitor
+templates:
+ - controller-servicemonitor.yaml
+
+tests:
+ - it: should create a ServiceMonitor if `controller.metrics.serviceMonitor.enabled` is true
+ set:
+ controller.metrics.enabled: true
+ controller.metrics.serviceMonitor.enabled: true
+ asserts:
+ - hasDocuments:
+ count: 1
+ - isKind:
+ of: ServiceMonitor
+ - equal:
+ path: metadata.name
+ value: RELEASE-NAME-ingress-nginx-controller
+
+ - it: should create a ServiceMonitor with annotations if `controller.metrics.serviceMonitor.annotations` is set
+ set:
+ controller.metrics.enabled: true
+ controller.metrics.serviceMonitor.enabled: true
+ controller.metrics.serviceMonitor.annotations:
+ my-little-annotation: test-value
+ asserts:
+ - equal:
+ path: metadata.annotations
+ value:
+ my-little-annotation: test-value
diff --git a/charts/ingress-nginx/values.yaml b/charts/ingress-nginx/values.yaml
index eee537ffe..a06093348 100644
--- a/charts/ingress-nginx/values.yaml
+++ b/charts/ingress-nginx/values.yaml
@@ -881,6 +881,7 @@ controller:
serviceMonitor:
enabled: false
additionalLabels: {}
+ # -- Annotations to be added to the ServiceMonitor.
annotations: {}
## The label to use to retrieve the job name from.
## jobLabel: "app.kubernetes.io/name"
From 3cde7770dd5bdc582d3bfc7e1307a04b6a80c094 Mon Sep 17 00:00:00 2001
From: Adrian Berger <43774417+adberger@users.noreply.github.com>
Date: Tue, 27 Aug 2024 01:35:17 +0200
Subject: [PATCH 214/283] Chart: Add
`controller.metrics.prometheusRule.annotations`. (#11849)
---
charts/ingress-nginx/README.md | 1 +
.../templates/controller-prometheusrule.yaml | 3 +++
.../tests/controller-prometheusrule_test.yaml | 12 ++++++++++++
charts/ingress-nginx/values.yaml | 2 ++
4 files changed, 18 insertions(+)
diff --git a/charts/ingress-nginx/README.md b/charts/ingress-nginx/README.md
index 3896ee978..99551e6d4 100644
--- a/charts/ingress-nginx/README.md
+++ b/charts/ingress-nginx/README.md
@@ -372,6 +372,7 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
| controller.metrics.port | int | `10254` | |
| controller.metrics.portName | string | `"metrics"` | |
| controller.metrics.prometheusRule.additionalLabels | object | `{}` | |
+| controller.metrics.prometheusRule.annotations | object | `{}` | Annotations to be added to the PrometheusRule. |
| controller.metrics.prometheusRule.enabled | bool | `false` | |
| controller.metrics.prometheusRule.rules | list | `[]` | |
| controller.metrics.service.annotations | object | `{}` | |
diff --git a/charts/ingress-nginx/templates/controller-prometheusrule.yaml b/charts/ingress-nginx/templates/controller-prometheusrule.yaml
index 41684c370..4a9357f71 100644
--- a/charts/ingress-nginx/templates/controller-prometheusrule.yaml
+++ b/charts/ingress-nginx/templates/controller-prometheusrule.yaml
@@ -14,6 +14,9 @@ metadata:
{{- if .Values.controller.metrics.prometheusRule.additionalLabels }}
{{- toYaml .Values.controller.metrics.prometheusRule.additionalLabels | nindent 4 }}
{{- end }}
+ {{- if .Values.controller.metrics.prometheusRule.annotations }}
+ annotations: {{ toYaml .Values.controller.metrics.prometheusRule.annotations | nindent 4 }}
+ {{- end }}
spec:
{{- if .Values.controller.metrics.prometheusRule.rules }}
groups:
diff --git a/charts/ingress-nginx/tests/controller-prometheusrule_test.yaml b/charts/ingress-nginx/tests/controller-prometheusrule_test.yaml
index d60a98315..2d330919d 100644
--- a/charts/ingress-nginx/tests/controller-prometheusrule_test.yaml
+++ b/charts/ingress-nginx/tests/controller-prometheusrule_test.yaml
@@ -15,3 +15,15 @@ tests:
- equal:
path: metadata.name
value: RELEASE-NAME-ingress-nginx-controller
+
+ - it: should create a PrometheusRule with annotations if `controller.metrics.prometheusRule.annotations` is set
+ set:
+ controller.metrics.enabled: true
+ controller.metrics.prometheusRule.enabled: true
+ controller.metrics.prometheusRule.annotations:
+ my-little-annotation: test-value
+ asserts:
+ - equal:
+ path: metadata.annotations
+ value:
+ my-little-annotation: test-value
diff --git a/charts/ingress-nginx/values.yaml b/charts/ingress-nginx/values.yaml
index a06093348..46cfa089b 100644
--- a/charts/ingress-nginx/values.yaml
+++ b/charts/ingress-nginx/values.yaml
@@ -899,6 +899,8 @@ controller:
prometheusRule:
enabled: false
additionalLabels: {}
+ # -- Annotations to be added to the PrometheusRule.
+ annotations: {}
# namespace: ""
rules: []
# # These are just examples rules, please adapt them to your needs
From e588b204c12e22fb0557f0f17744f8ced82efb00 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Thu, 29 Aug 2024 13:39:20 +0200
Subject: [PATCH 215/283] Bump github/codeql-action from 3.26.5 to 3.26.6 in
the all group (#11904)
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
.github/workflows/scorecards.yml | 2 +-
.github/workflows/vulnerability-scans.yaml | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/.github/workflows/scorecards.yml b/.github/workflows/scorecards.yml
index 2a1489f5d..aa8981aa3 100644
--- a/.github/workflows/scorecards.yml
+++ b/.github/workflows/scorecards.yml
@@ -59,6 +59,6 @@ jobs:
# Upload the results to GitHub's code scanning dashboard.
- name: "Upload to code-scanning"
- uses: github/codeql-action/upload-sarif@2c779ab0d087cd7fe7b826087247c2c81f27bfa6 # v3.26.5
+ uses: github/codeql-action/upload-sarif@4dd16135b69a43b6c8efb853346f8437d92d3c93 # v3.26.6
with:
sarif_file: results.sarif
diff --git a/.github/workflows/vulnerability-scans.yaml b/.github/workflows/vulnerability-scans.yaml
index 2d135695d..d4a53a352 100644
--- a/.github/workflows/vulnerability-scans.yaml
+++ b/.github/workflows/vulnerability-scans.yaml
@@ -75,7 +75,7 @@ jobs:
# This step checks out a copy of your repository.
- name: Upload SARIF file
- uses: github/codeql-action/upload-sarif@2c779ab0d087cd7fe7b826087247c2c81f27bfa6 # v3.26.5
+ uses: github/codeql-action/upload-sarif@4dd16135b69a43b6c8efb853346f8437d92d3c93 # v3.26.6
with:
token: ${{ github.token }}
# Path to SARIF file relative to the root of the repository
From 3bdaa57e0550f5f4fc340354b3ab88107e19b0eb Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Thu, 29 Aug 2024 13:39:32 +0200
Subject: [PATCH 216/283] Bump github.com/prometheus/common from 0.55.0 to
0.57.0 (#11903)
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 2 +-
go.sum | 4 ++--
2 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/go.mod b/go.mod
index 0f43520cc..62f2715cc 100644
--- a/go.mod
+++ b/go.mod
@@ -19,7 +19,7 @@ require (
github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2
github.com/prometheus/client_golang v1.20.2
github.com/prometheus/client_model v0.6.1
- github.com/prometheus/common v0.55.0
+ github.com/prometheus/common v0.57.0
github.com/spf13/cobra v1.8.1
github.com/spf13/pflag v1.0.5
github.com/stretchr/testify v1.9.0
diff --git a/go.sum b/go.sum
index b4022d912..0c7c819ad 100644
--- a/go.sum
+++ b/go.sum
@@ -186,8 +186,8 @@ github.com/prometheus/client_golang v1.20.2 h1:5ctymQzZlyOON1666svgwn3s6IKWgfbjs
github.com/prometheus/client_golang v1.20.2/go.mod h1:PIEt8X02hGcP8JWbeHyeZ53Y/jReSnHgO035n//V5WE=
github.com/prometheus/client_model v0.6.1 h1:ZKSh/rekM+n3CeS952MLRAdFwIKqeY8b62p8ais2e9E=
github.com/prometheus/client_model v0.6.1/go.mod h1:OrxVMOVHjw3lKMa8+x6HeMGkHMQyHDk9E3jmP2AmGiY=
-github.com/prometheus/common v0.55.0 h1:KEi6DK7lXW/m7Ig5i47x0vRzuBsHuvJdi5ee6Y3G1dc=
-github.com/prometheus/common v0.55.0/go.mod h1:2SECS4xJG1kd8XF9IcM1gMX6510RAEL65zxzNImwdc8=
+github.com/prometheus/common v0.57.0 h1:Ro/rKjwdq9mZn1K5QPctzh+MA4Lp0BuYk5ZZEVhoNcY=
+github.com/prometheus/common v0.57.0/go.mod h1:7uRPFSUTbfZWsJ7MHY56sqt7hLQu3bxXHDnNhl8E9qI=
github.com/prometheus/procfs v0.15.1 h1:YagwOFzUgYfKKHX6Dr+sHT7km/hxC76UB0learggepc=
github.com/prometheus/procfs v0.15.1/go.mod h1:fB45yRUv8NstnjriLhBQLuOUt+WW4BsoGhij/e3PBqk=
github.com/rogpeppe/go-internal v1.12.0 h1:exVL4IDcn6na9z1rAb56Vxr+CgyK3nn3O+epU5NdKM8=
From ab2f6d8e3ae4606cfaaaab0eaf6ce39853413205 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Thu, 29 Aug 2024 13:39:39 +0200
Subject: [PATCH 217/283] Bump google.golang.org/grpc from 1.65.0 to 1.66.0
(#11902)
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 2 +-
go.sum | 4 ++--
2 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/go.mod b/go.mod
index 62f2715cc..00e3ec55d 100644
--- a/go.mod
+++ b/go.mod
@@ -27,7 +27,7 @@ require (
github.com/zakjan/cert-chain-resolver v0.0.0-20221221105603-fcedb00c5b30
golang.org/x/crypto v0.26.0
golang.org/x/exp v0.0.0-20240719175910-8a7402abbf56
- google.golang.org/grpc v1.65.0
+ google.golang.org/grpc v1.66.0
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab
gopkg.in/go-playground/pool.v3 v3.1.1
gopkg.in/mcuadros/go-syslog.v2 v2.3.0
diff --git a/go.sum b/go.sum
index 0c7c819ad..4b6fec146 100644
--- a/go.sum
+++ b/go.sum
@@ -301,8 +301,8 @@ gomodules.xyz/jsonpatch/v2 v2.4.0 h1:Ci3iUJyx9UeRx7CeFN8ARgGbkESwJK+KB9lLcWxY/Zw
gomodules.xyz/jsonpatch/v2 v2.4.0/go.mod h1:AH3dM2RI6uoBZxn3LVrfvJ3E0/9dG4cSrbuBJT4moAY=
google.golang.org/genproto/googleapis/rpc v0.0.0-20240701130421-f6361c86f094 h1:BwIjyKYGsK9dMCBOorzRri8MQwmi7mT9rGHsCEinZkA=
google.golang.org/genproto/googleapis/rpc v0.0.0-20240701130421-f6361c86f094/go.mod h1:Ue6ibwXGpU+dqIcODieyLOcgj7z8+IcskoNIgZxtrFY=
-google.golang.org/grpc v1.65.0 h1:bs/cUb4lp1G5iImFFd3u5ixQzweKizoZJAwBNLR42lc=
-google.golang.org/grpc v1.65.0/go.mod h1:WgYC2ypjlB0EiQi6wdKixMqukr6lBc0Vo+oOgjrM5ZQ=
+google.golang.org/grpc v1.66.0 h1:DibZuoBznOxbDQxRINckZcUvnCEvrW9pcWIE2yF9r1c=
+google.golang.org/grpc v1.66.0/go.mod h1:s3/l6xSSCURdVfAnL+TqCNMyTDAGN6+lZeVxnZR128Y=
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab h1:tg8hvIl5RmFBuXlcJMuL0h4Psh1gx5Q5xEMwzBZIzWA=
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab/go.mod h1:liVNnGuZDITxuksuZ+BBvdy7FcJfeNk+efF9qgqNUmc=
google.golang.org/protobuf v0.0.0-20200109180630-ec00e32a8dfd/go.mod h1:DFci5gLYBciE7Vtevhsrf46CRTquxDuWsQurQQe4oz8=
From e99b512a5bea8b1a2d4476d8eb207b7d7c3718e8 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Thu, 29 Aug 2024 16:03:06 +0200
Subject: [PATCH 218/283] Bump github.com/onsi/ginkgo/v2 from 2.20.1 to 2.20.2
in the all group (#11901)
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: Marco Ebert
---
build/run-in-docker.sh | 2 +-
go.mod | 6 +++---
go.sum | 12 ++++++------
go.work.sum | 4 ++++
images/kube-webhook-certgen/rootfs/go.mod | 4 ++--
images/kube-webhook-certgen/rootfs/go.sum | 12 ++++++------
images/test-runner/Makefile | 4 ++--
test/e2e/run-chart-test.sh | 2 +-
test/e2e/run-kind-e2e.sh | 2 +-
9 files changed, 26 insertions(+), 22 deletions(-)
diff --git a/build/run-in-docker.sh b/build/run-in-docker.sh
index fcbf8f6cd..0c965666c 100755
--- a/build/run-in-docker.sh
+++ b/build/run-in-docker.sh
@@ -82,7 +82,7 @@ if [[ "$DOCKER_IN_DOCKER_ENABLED" == "true" ]]; then
echo "..reached DIND check TRUE block, inside run-in-docker.sh"
echo "FLAGS=$FLAGS"
#go env
- go install -mod=mod github.com/onsi/ginkgo/v2/ginkgo@v2.20.0
+ go install -mod=mod github.com/onsi/ginkgo/v2/ginkgo@v2.20.2
find / -type f -name ginkgo 2>/dev/null
which ginkgo
/bin/bash -c "${FLAGS}"
diff --git a/go.mod b/go.mod
index 00e3ec55d..f8002d09c 100644
--- a/go.mod
+++ b/go.mod
@@ -14,7 +14,7 @@ require (
github.com/mitchellh/mapstructure v1.5.0
github.com/moul/pb v0.0.0-20220425114252-bca18df4138c
github.com/ncabatoff/process-exporter v0.8.3
- github.com/onsi/ginkgo/v2 v2.20.1
+ github.com/onsi/ginkgo/v2 v2.20.2
github.com/opencontainers/runc v1.1.13
github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2
github.com/prometheus/client_golang v1.20.2
@@ -82,7 +82,7 @@ require (
github.com/google/gnostic-models v0.6.8 // indirect
github.com/google/go-cmp v0.6.0 // indirect
github.com/google/gofuzz v1.2.0 // indirect
- github.com/google/pprof v0.0.0-20240727154555-813a5fbdbec8 // indirect
+ github.com/google/pprof v0.0.0-20240827171923-fa2c70bbbfe5 // indirect
github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 // indirect
github.com/google/uuid v1.6.0 // indirect
github.com/gregjones/httpcache v0.0.0-20190611155906-901d90724c79 // indirect
@@ -117,7 +117,7 @@ require (
golang.org/x/net v0.28.0 // indirect
golang.org/x/oauth2 v0.21.0 // indirect
golang.org/x/sync v0.8.0 // indirect
- golang.org/x/sys v0.23.0 // indirect
+ golang.org/x/sys v0.24.0 // indirect
golang.org/x/term v0.23.0 // indirect
golang.org/x/text v0.17.0 // indirect
golang.org/x/time v0.5.0 // indirect
diff --git a/go.sum b/go.sum
index 4b6fec146..88cef0712 100644
--- a/go.sum
+++ b/go.sum
@@ -92,8 +92,8 @@ github.com/google/go-cmp v0.6.0/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeN
github.com/google/gofuzz v1.0.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
github.com/google/gofuzz v1.2.0 h1:xRy4A+RhZaiKjJ1bPfwQ8sedCA+YS2YcCHW6ec7JMi0=
github.com/google/gofuzz v1.2.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
-github.com/google/pprof v0.0.0-20240727154555-813a5fbdbec8 h1:FKHo8hFI3A+7w0aUQuYXQ+6EN5stWmeY/AZqtM8xk9k=
-github.com/google/pprof v0.0.0-20240727154555-813a5fbdbec8/go.mod h1:K1liHPHnj73Fdn/EKuT8nrFqBihUSKXoLYU0BuatOYo=
+github.com/google/pprof v0.0.0-20240827171923-fa2c70bbbfe5 h1:5iH8iuqE5apketRbSFBy+X1V0o+l+8NF1avt4HWl7cA=
+github.com/google/pprof v0.0.0-20240827171923-fa2c70bbbfe5/go.mod h1:vavhavw2zAxS5dIdcRluK6cSGGPlZynqzFM8NdvU144=
github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 h1:El6M4kTTCOh6aBiKaUGG7oYTSPP8MxqL4YI3kZKwcP4=
github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510/go.mod h1:pupxD2MaaD3pAXIBCelhxNneeOaAeabZDe5s4K6zSpQ=
github.com/google/uuid v1.6.0 h1:NIvaJDMOsjHA8n1jAhLSgzrAzy1Hgr+hNrb57e+94F0=
@@ -165,8 +165,8 @@ github.com/onsi/ginkgo v1.6.0/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+W
github.com/onsi/ginkgo v1.12.1/go.mod h1:zj2OWP4+oCPe1qIXoGWkgMRwljMUYCdkwsT2108oapk=
github.com/onsi/ginkgo v1.16.5 h1:8xi0RTUf59SOSfEtZMvwTvXYMzG4gV23XVHOZiXNtnE=
github.com/onsi/ginkgo v1.16.5/go.mod h1:+E8gABHa3K6zRBolWtd+ROzc/U5bkGt0FwiG042wbpU=
-github.com/onsi/ginkgo/v2 v2.20.1 h1:YlVIbqct+ZmnEph770q9Q7NVAz4wwIiVNahee6JyUzo=
-github.com/onsi/ginkgo/v2 v2.20.1/go.mod h1:lG9ey2Z29hR41WMVthyJBGUBcBhGOtoPF2VFMvBXFCI=
+github.com/onsi/ginkgo/v2 v2.20.2 h1:7NVCeyIWROIAheY21RLS+3j2bb52W0W82tkberYytp4=
+github.com/onsi/ginkgo/v2 v2.20.2/go.mod h1:K9gyxPIlb+aIvnZ8bd9Ak+YP18w3APlR+5coaZoE2ag=
github.com/onsi/gomega v1.7.1/go.mod h1:XdKZgCCFLUoM/7CFJVPcG8C1xQ1AJ0vpAezJrB7JYyY=
github.com/onsi/gomega v1.10.1/go.mod h1:iN09h71vgCQne3DLsj+A5owkum+a2tYe+TOCB1ybHNo=
github.com/onsi/gomega v1.34.1 h1:EUMJIKUjM8sKjYbtxQI9A4z2o+rruxnzNvpknOXie6k=
@@ -276,8 +276,8 @@ golang.org/x/sys v0.0.0-20220520151302-bc2c85ada10a/go.mod h1:oPkhp1MJrh7nUepCBc
golang.org/x/sys v0.0.0-20220715151400-c0bba94af5f8/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.0.0-20220811171246-fbc7d0a398ab/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.23.0 h1:YfKFowiIMvtgl1UERQoTPPToxltDeZfbj4H7dVUCwmM=
-golang.org/x/sys v0.23.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
+golang.org/x/sys v0.24.0 h1:Twjiwq9dn6R1fQcyiK+wQyHWfaz/BJB+YIpzU/Cv3Xg=
+golang.org/x/sys v0.24.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
golang.org/x/term v0.23.0 h1:F6D4vR+EHoL9/sWAWgAR1H2DcHr4PareCbAaCo1RpuU=
golang.org/x/term v0.23.0/go.mod h1:DgV24QBUrK6jhZXl+20l6UWznPlwAHm1Q1mGHtydmSk=
golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
diff --git a/go.work.sum b/go.work.sum
index 5a6fe2480..8b186c739 100644
--- a/go.work.sum
+++ b/go.work.sum
@@ -644,6 +644,7 @@ github.com/emicklei/go-restful/v3 v3.11.0/go.mod h1:6n3XBCmQQb25CM2LCACGz8ukIrRr
github.com/envoyproxy/go-control-plane v0.11.1/go.mod h1:uhMcXKCQMEJHiAb0w+YGefQLaTEw+YhGluxZkrTmD0g=
github.com/envoyproxy/go-control-plane v0.12.0 h1:4X+VP1GHd1Mhj6IB5mMeGbLCleqxjletLK6K0rbxyZI=
github.com/envoyproxy/go-control-plane v0.12.0/go.mod h1:ZBTaoJ23lqITozF0M6G4/IragXCQKCnYbmlmtHvwRG0=
+github.com/envoyproxy/go-control-plane v0.12.1-0.20240621013728-1eb8caab5155/go.mod h1:5Wkq+JduFtdAXihLmeTJf+tRYIT4KBc2vPXDhwVo1pA=
github.com/envoyproxy/protoc-gen-validate v1.0.2/go.mod h1:GpiZQP3dDbg4JouG/NNS7QWXpgx6x8QiMKdmN72jogE=
github.com/envoyproxy/protoc-gen-validate v1.0.4 h1:gVPz/FMfvh57HdSJQyvBtF00j8JU4zdyUgIUNhlgg0A=
github.com/envoyproxy/protoc-gen-validate v1.0.4/go.mod h1:qys6tmnRsYrQqIhm2bvKZH4Blx/1gTIZ2UKVY1M+Yew=
@@ -844,6 +845,7 @@ github.com/pierrec/lz4/v4 v4.1.15 h1:MO0/ucJhngq7299dKLwIMtgTfbkoSPF6AoMYDd8Q4q0
github.com/pkg/diff v0.0.0-20210226163009-20ebb0f2a09e h1:aoZm08cpOy4WuID//EZDgcC4zIxODThtZNPirFr42+A=
github.com/pkg/diff v0.0.0-20210226163009-20ebb0f2a09e/go.mod h1:pJLUxLENpZxwdsKMEsNbx1VGcRFpLqf3715MtcvvzbA=
github.com/pkg/sftp v1.13.1 h1:I2qBYMChEhIjOgazfJmV3/mZM256btk6wkCDRmW7JYs=
+github.com/planetscale/vtprotobuf v0.6.1-0.20240319094008-0393e58bdf10/go.mod h1:t/avpk3KcrXxUnYOhZhMXJlSEyie6gQbtLq5NM3loB8=
github.com/pquerna/cachecontrol v0.1.0 h1:yJMy84ti9h/+OEWa752kBTKv4XC30OtVVHYv/8cTqKc=
github.com/pquerna/cachecontrol v0.1.0/go.mod h1:NrUG3Z7Rdu85UNR3vm7SOsl1nFIeSiQnrHV5K9mBcUI=
github.com/prometheus/exporter-toolkit v0.11.0 h1:yNTsuZ0aNCNFQ3aFTD2uhPOvr4iD7fdBvKPAEGkNf+g=
@@ -1020,6 +1022,7 @@ golang.org/x/sys v0.19.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
golang.org/x/sys v0.20.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
golang.org/x/sys v0.21.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
golang.org/x/sys v0.22.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
+golang.org/x/sys v0.23.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
golang.org/x/telemetry v0.0.0-20240208230135-b75ee8823808/go.mod h1:KG1lNk5ZFNssSZLrpVb4sMXKMpGwGXOxSG3rnu2gZQQ=
golang.org/x/telemetry v0.0.0-20240228155512-f48c80bd79b2 h1:IRJeR9r1pYWsHKTRe/IInb7lYvbBVIqOgsX/u0mbOWY=
golang.org/x/telemetry v0.0.0-20240228155512-f48c80bd79b2/go.mod h1:TeRTkGYfJXctD9OcfyVLyj2J3IxLnKwHJR8f4D8a3YE=
@@ -1086,6 +1089,7 @@ google.golang.org/genproto/googleapis/api v0.0.0-20240227224415-6ceb2ff114de/go.
google.golang.org/genproto/googleapis/api v0.0.0-20240318140521-94a12d6c2237/go.mod h1:Z5Iiy3jtmioajWHDGFk7CeugTyHtPvMHA4UTmUkyalE=
google.golang.org/genproto/googleapis/api v0.0.0-20240528184218-531527333157 h1:7whR9kGa5LUwFtpLm2ArCEejtnxlGeLbAyjFY8sGNFw=
google.golang.org/genproto/googleapis/api v0.0.0-20240528184218-531527333157/go.mod h1:99sLkeliLXfdj2J75X3Ho+rrVCaJze0uwN7zDDkjPVU=
+google.golang.org/genproto/googleapis/api v0.0.0-20240604185151-ef581f913117/go.mod h1:OimBR/bc1wPO9iV4NC2bpyjy3VnAwZh5EBPQdtaE5oo=
google.golang.org/genproto/googleapis/bytestream v0.0.0-20230530153820-e85fd2cbaebc h1:g3hIDl0jRNd9PPTs2uBzYuaD5mQuwOkZY0vSc0LR32o=
google.golang.org/genproto/googleapis/bytestream v0.0.0-20231030173426-d783a09b4405/go.mod h1:GRUCuLdzVqZte8+Dl/D4N25yLzcGqqWaYkeVOwulFqw=
google.golang.org/genproto/googleapis/bytestream v0.0.0-20231212172506-995d672761c0/go.mod h1:guYXGPwC6jwxgWKW5Y405fKWOFNwlvUlUnzyp9i0uqo=
diff --git a/images/kube-webhook-certgen/rootfs/go.mod b/images/kube-webhook-certgen/rootfs/go.mod
index 52746ebd9..0270c0d87 100644
--- a/images/kube-webhook-certgen/rootfs/go.mod
+++ b/images/kube-webhook-certgen/rootfs/go.mod
@@ -33,14 +33,14 @@ require (
github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd // indirect
github.com/modern-go/reflect2 v1.0.2 // indirect
github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 // indirect
- github.com/onsi/ginkgo/v2 v2.20.0 // indirect
+ github.com/onsi/ginkgo/v2 v2.20.2 // indirect
github.com/onsi/gomega v1.34.1 // indirect
github.com/pkg/errors v0.9.1 // indirect
github.com/spf13/pflag v1.0.5 // indirect
github.com/stretchr/testify v1.9.0 // indirect
golang.org/x/net v0.28.0 // indirect
golang.org/x/oauth2 v0.18.0 // indirect
- golang.org/x/sys v0.23.0 // indirect
+ golang.org/x/sys v0.24.0 // indirect
golang.org/x/term v0.23.0 // indirect
golang.org/x/text v0.17.0 // indirect
golang.org/x/time v0.5.0 // indirect
diff --git a/images/kube-webhook-certgen/rootfs/go.sum b/images/kube-webhook-certgen/rootfs/go.sum
index 8ce13c672..f96347108 100644
--- a/images/kube-webhook-certgen/rootfs/go.sum
+++ b/images/kube-webhook-certgen/rootfs/go.sum
@@ -32,8 +32,8 @@ github.com/google/go-cmp v0.6.0/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeN
github.com/google/gofuzz v1.0.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
github.com/google/gofuzz v1.2.0 h1:xRy4A+RhZaiKjJ1bPfwQ8sedCA+YS2YcCHW6ec7JMi0=
github.com/google/gofuzz v1.2.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
-github.com/google/pprof v0.0.0-20240727154555-813a5fbdbec8 h1:FKHo8hFI3A+7w0aUQuYXQ+6EN5stWmeY/AZqtM8xk9k=
-github.com/google/pprof v0.0.0-20240727154555-813a5fbdbec8/go.mod h1:K1liHPHnj73Fdn/EKuT8nrFqBihUSKXoLYU0BuatOYo=
+github.com/google/pprof v0.0.0-20240827171923-fa2c70bbbfe5 h1:5iH8iuqE5apketRbSFBy+X1V0o+l+8NF1avt4HWl7cA=
+github.com/google/pprof v0.0.0-20240827171923-fa2c70bbbfe5/go.mod h1:vavhavw2zAxS5dIdcRluK6cSGGPlZynqzFM8NdvU144=
github.com/google/uuid v1.6.0 h1:NIvaJDMOsjHA8n1jAhLSgzrAzy1Hgr+hNrb57e+94F0=
github.com/google/uuid v1.6.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
github.com/imdario/mergo v0.3.16 h1:wwQJbIsHYGMUyLSPrEq1CT16AhnhNJQ51+4fdHUnCl4=
@@ -61,8 +61,8 @@ github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 h1:C3w9PqII01/Oq
github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822/go.mod h1:+n7T8mK8HuQTcFwEeznm/DIxMOiR9yIdICNftLE1DvQ=
github.com/onrik/logrus v0.11.0 h1:pu+BCaWL36t0yQaj/2UHK2erf88dwssAKOT51mxPUVs=
github.com/onrik/logrus v0.11.0/go.mod h1:fO2vlZwIdti6PidD3gV5YKt9Lq5ptpnP293RAe1ITwk=
-github.com/onsi/ginkgo/v2 v2.20.0 h1:PE84V2mHqoT1sglvHc8ZdQtPcwmvvt29WLEEO3xmdZw=
-github.com/onsi/ginkgo/v2 v2.20.0/go.mod h1:lG9ey2Z29hR41WMVthyJBGUBcBhGOtoPF2VFMvBXFCI=
+github.com/onsi/ginkgo/v2 v2.20.2 h1:7NVCeyIWROIAheY21RLS+3j2bb52W0W82tkberYytp4=
+github.com/onsi/ginkgo/v2 v2.20.2/go.mod h1:K9gyxPIlb+aIvnZ8bd9Ak+YP18w3APlR+5coaZoE2ag=
github.com/onsi/gomega v1.34.1 h1:EUMJIKUjM8sKjYbtxQI9A4z2o+rruxnzNvpknOXie6k=
github.com/onsi/gomega v1.34.1/go.mod h1:kU1QgUvBDLXBJq618Xvm2LUX6rSAfRaFRTcdOeDLwwY=
github.com/pkg/errors v0.9.1 h1:FEBLx1zS214owpjy7qsBeixbURkuhQAwrK5UwLGTwt4=
@@ -123,8 +123,8 @@ golang.org/x/sys v0.0.0-20210615035016-665e8c7367d1/go.mod h1:oPkhp1MJrh7nUepCBc
golang.org/x/sys v0.0.0-20220520151302-bc2c85ada10a/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.0.0-20220715151400-c0bba94af5f8/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.0.0-20220722155257-8c9f86f7a55f/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.23.0 h1:YfKFowiIMvtgl1UERQoTPPToxltDeZfbj4H7dVUCwmM=
-golang.org/x/sys v0.23.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
+golang.org/x/sys v0.24.0 h1:Twjiwq9dn6R1fQcyiK+wQyHWfaz/BJB+YIpzU/Cv3Xg=
+golang.org/x/sys v0.24.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8=
golang.org/x/term v0.23.0 h1:F6D4vR+EHoL9/sWAWgAR1H2DcHr4PareCbAaCo1RpuU=
diff --git a/images/test-runner/Makefile b/images/test-runner/Makefile
index 3d60a5313..74da2082f 100644
--- a/images/test-runner/Makefile
+++ b/images/test-runner/Makefile
@@ -59,7 +59,7 @@ image:
--build-arg YAML_LINT_VERSION=1.33.0 \
--build-arg YAMALE_VERSION=4.0.4 \
--build-arg HELM_VERSION=3.14.4 \
- --build-arg GINKGO_VERSION=2.20.0 \
+ --build-arg GINKGO_VERSION=2.20.2 \
--build-arg GOLINT_VERSION=latest \
-t ${IMAGE}:${TAG} rootfs
@@ -80,7 +80,7 @@ build: ensure-buildx
--build-arg YAML_LINT_VERSION=1.33.0 \
--build-arg YAMALE_VERSION=4.0.4 \
--build-arg HELM_VERSION=3.14.4 \
- --build-arg GINKGO_VERSION=2.20.0 \
+ --build-arg GINKGO_VERSION=2.20.2 \
--build-arg GOLINT_VERSION=latest \
-t ${IMAGE}:${TAG} rootfs
diff --git a/test/e2e/run-chart-test.sh b/test/e2e/run-chart-test.sh
index 7d388c215..0069af02b 100755
--- a/test/e2e/run-chart-test.sh
+++ b/test/e2e/run-chart-test.sh
@@ -78,7 +78,7 @@ fi
if [ "${SKIP_IMAGE_CREATION:-false}" = "false" ]; then
if ! command -v ginkgo &> /dev/null; then
- go install github.com/onsi/ginkgo/v2/ginkgo@v2.20.0
+ go install github.com/onsi/ginkgo/v2/ginkgo@v2.20.2
fi
echo "[dev-env] building image"
make -C ${DIR}/../../ clean-image build image
diff --git a/test/e2e/run-kind-e2e.sh b/test/e2e/run-kind-e2e.sh
index 9b4e82932..c2242e6f1 100755
--- a/test/e2e/run-kind-e2e.sh
+++ b/test/e2e/run-kind-e2e.sh
@@ -95,7 +95,7 @@ fi
if [ "${SKIP_E2E_IMAGE_CREATION}" = "false" ]; then
if ! command -v ginkgo &> /dev/null; then
- go install github.com/onsi/ginkgo/v2/ginkgo@v2.20.0
+ go install github.com/onsi/ginkgo/v2/ginkgo@v2.20.2
fi
echo "[dev-env] .. done building controller images"
From 2c4217629c37f5e72afad0ba135ea970115dee2a Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Thu, 29 Aug 2024 20:25:56 +0200
Subject: [PATCH 219/283] Images: Trigger `test-runner` build. (#11916)
---
images/test-runner/TAG | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/images/test-runner/TAG b/images/test-runner/TAG
index 384942600..0ec25f750 100644
--- a/images/test-runner/TAG
+++ b/images/test-runner/TAG
@@ -1 +1 @@
-v0.0.9
+v1.0.0
From 6ca67b5296fb0e43652692ff43eba08b246cf294 Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Thu, 29 Aug 2024 22:31:33 +0200
Subject: [PATCH 220/283] Tests: Bump `e2e-test-runner` to v20240829-2c421762.
(#11919)
---
build/run-in-docker.sh | 2 +-
test/e2e-image/Makefile | 2 +-
test/e2e/run-chart-test.sh | 2 +-
3 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/build/run-in-docker.sh b/build/run-in-docker.sh
index 0c965666c..915c29d7a 100755
--- a/build/run-in-docker.sh
+++ b/build/run-in-docker.sh
@@ -44,7 +44,7 @@ function cleanup {
}
trap cleanup EXIT
-E2E_IMAGE=${E2E_IMAGE:-registry.k8s.io/ingress-nginx/e2e-test-runner:v20240812-3f0129aa@sha256:95c2aaf2a66e8cbbf7a7453046f3b024383c273a0988efab841cd96116afd1a9}
+E2E_IMAGE=${E2E_IMAGE:-registry.k8s.io/ingress-nginx/e2e-test-runner:v20240829-2c421762@sha256:5b7809bfe9cbd9cd6bcb8033ca27576ca704f05ce729fe4dcb574810f7a25785}
if [[ "$RUNTIME" == podman ]]; then
# Podman does not support both tag and digest
diff --git a/test/e2e-image/Makefile b/test/e2e-image/Makefile
index 74f3cc437..8e3040177 100644
--- a/test/e2e-image/Makefile
+++ b/test/e2e-image/Makefile
@@ -1,6 +1,6 @@
DIR:=$(shell dirname $(realpath $(firstword $(MAKEFILE_LIST))))
-E2E_BASE_IMAGE ?= "registry.k8s.io/ingress-nginx/e2e-test-runner:v20240812-3f0129aa@sha256:95c2aaf2a66e8cbbf7a7453046f3b024383c273a0988efab841cd96116afd1a9"
+E2E_BASE_IMAGE ?= "registry.k8s.io/ingress-nginx/e2e-test-runner:v20240829-2c421762@sha256:5b7809bfe9cbd9cd6bcb8033ca27576ca704f05ce729fe4dcb574810f7a25785"
image:
echo "..entered Makefile in /test/e2e-image"
diff --git a/test/e2e/run-chart-test.sh b/test/e2e/run-chart-test.sh
index 0069af02b..95465ee32 100755
--- a/test/e2e/run-chart-test.sh
+++ b/test/e2e/run-chart-test.sh
@@ -109,7 +109,7 @@ docker run --rm --interactive --network host \
--volume $KUBECONFIG:/root/.kube/config \
--volume "${DIR}/../../":/workdir \
--workdir /workdir \
- registry.k8s.io/ingress-nginx/e2e-test-runner:v20240812-3f0129aa@sha256:95c2aaf2a66e8cbbf7a7453046f3b024383c273a0988efab841cd96116afd1a9 \
+ registry.k8s.io/ingress-nginx/e2e-test-runner:v20240829-2c421762@sha256:5b7809bfe9cbd9cd6bcb8033ca27576ca704f05ce729fe4dcb574810f7a25785 \
ct install \
--charts charts/ingress-nginx \
--helm-extra-args "--timeout 60s"
From 2cec24143d4b59a986560ff1e755adadd5d6bf4a Mon Sep 17 00:00:00 2001
From: Adam Sunderland
Date: Sat, 31 Aug 2024 11:26:45 -0400
Subject: [PATCH 221/283] Allow any protocol for cors origins (#11153)
Co-authored-by: Ricardo Katz
---
.../nginx-configuration/annotations.md | 8 ++---
internal/ingress/annotations/cors/main.go | 9 ++---
.../ingress/annotations/cors/main_test.go | 36 +++++++++++++++++--
test/e2e/annotations/cors.go | 29 +++++++++++++++
4 files changed, 72 insertions(+), 10 deletions(-)
diff --git a/docs/user-guide/nginx-configuration/annotations.md b/docs/user-guide/nginx-configuration/annotations.md
index 80ceccfa9..29cd9cf14 100755
--- a/docs/user-guide/nginx-configuration/annotations.md
+++ b/docs/user-guide/nginx-configuration/annotations.md
@@ -387,13 +387,13 @@ CORS can be controlled with the following annotations:
* `nginx.ingress.kubernetes.io/cors-allow-origin`: Controls what's the accepted Origin for CORS.
- This is a multi-valued field, separated by ','. It must follow this format: `http(s)://origin-site.com` or `http(s)://origin-site.com:port`
+ This is a multi-valued field, separated by ','. It must follow this format: `protocol://origin-site.com` or `protocol://origin-site.com:port`
- Default: `*`
- - Example: `nginx.ingress.kubernetes.io/cors-allow-origin: "https://origin-site.com:4443, http://origin-site.com, https://example.org:1199"`
+ - Example: `nginx.ingress.kubernetes.io/cors-allow-origin: "https://origin-site.com:4443, http://origin-site.com, myprotocol://example.org:1199"`
- It also supports single level wildcard subdomains and follows this format: `http(s)://*.foo.bar`, `http(s)://*.bar.foo:8080` or `http(s)://*.abc.bar.foo:9000`
- - Example: `nginx.ingress.kubernetes.io/cors-allow-origin: "https://*.origin-site.com:4443, http://*.origin-site.com, https://example.org:1199"`
+ It also supports single level wildcard subdomains and follows this format: `protocol://*.foo.bar`, `protocol://*.bar.foo:8080` or `protocol://*.abc.bar.foo:9000`
+ - Example: `nginx.ingress.kubernetes.io/cors-allow-origin: "https://*.origin-site.com:4443, http://*.origin-site.com, myprotocol://example.org:1199"`
* `nginx.ingress.kubernetes.io/cors-allow-credentials`: Controls if credentials can be passed during CORS operations.
diff --git a/internal/ingress/annotations/cors/main.go b/internal/ingress/annotations/cors/main.go
index d6e92b34d..b81514820 100644
--- a/internal/ingress/annotations/cors/main.go
+++ b/internal/ingress/annotations/cors/main.go
@@ -43,9 +43,9 @@ var (
// * Sets a group that can be (https?://)?*?.something.com:port?
// * Allows this to be repeated as much as possible, and separated by comma
// Otherwise it should be '*'
- corsOriginRegexValidator = regexp.MustCompile(`^((((https?://)?(\*\.)?[A-Za-z0-9\-.]*(:\d+)?,?)+)|\*)?$`)
+ corsOriginRegexValidator = regexp.MustCompile(`^(((([a-z]+://)?(\*\.)?[A-Za-z0-9\-.]*(:\d+)?,?)+)|\*)?$`)
// corsOriginRegex defines the regex for validation inside Parse
- corsOriginRegex = regexp.MustCompile(`^(https?://(\*\.)?[A-Za-z0-9\-.]*(:\d+)?|\*)?$`)
+ corsOriginRegex = regexp.MustCompile(`^([a-z]+://(\*\.)?[A-Za-z0-9\-.]*(:\d+)?|\*)?$`)
// Method must contain valid methods list (PUT, GET, POST, BLA)
// May contain or not spaces between each verb
corsMethodsRegex = regexp.MustCompile(`^([A-Za-z]+,?\s?)+$`)
@@ -78,8 +78,9 @@ var corsAnnotation = parser.Annotation{
Scope: parser.AnnotationScopeIngress,
Risk: parser.AnnotationRiskMedium,
Documentation: `This annotation controls what's the accepted Origin for CORS.
- This is a multi-valued field, separated by ','. It must follow this format: http(s)://origin-site.com or http(s)://origin-site.com:port
- It also supports single level wildcard subdomains and follows this format: http(s)://*.foo.bar, http(s)://*.bar.foo:8080 or http(s)://*.abc.bar.foo:9000`,
+ This is a multi-valued field, separated by ','. It must follow this format: protocol://origin-site.com or protocol://origin-site.com:port
+ It also supports single level wildcard subdomains and follows this format: https://*.foo.bar, http://*.bar.foo:8080 or myprotocol://*.abc.bar.foo:9000
+ Protocol can be any lowercase string, like http, https, or mycustomprotocol.`,
},
corsAllowHeadersAnnotation: {
Validator: parser.ValidateRegex(parser.HeadersVariable, true),
diff --git a/internal/ingress/annotations/cors/main_test.go b/internal/ingress/annotations/cors/main_test.go
index a69390a17..dee36fcae 100644
--- a/internal/ingress/annotations/cors/main_test.go
+++ b/internal/ingress/annotations/cors/main_test.go
@@ -27,6 +27,8 @@ import (
"k8s.io/ingress-nginx/internal/ingress/resolver"
)
+const enableAnnotation = "true"
+
func buildIngress() *networking.Ingress {
defaultBackend := networking.IngressBackend{
Service: &networking.IngressServiceBackend{
@@ -76,7 +78,7 @@ func TestIngressCorsConfigValid(t *testing.T) {
data := map[string]string{}
// Valid
- data[parser.GetAnnotationWithPrefix(corsEnableAnnotation)] = "true"
+ data[parser.GetAnnotationWithPrefix(corsEnableAnnotation)] = enableAnnotation
data[parser.GetAnnotationWithPrefix(corsAllowHeadersAnnotation)] = "DNT,X-CustomHeader, Keep-Alive,User-Agent"
data[parser.GetAnnotationWithPrefix(corsAllowCredentialsAnnotation)] = "false"
data[parser.GetAnnotationWithPrefix(corsAllowMethodsAnnotation)] = "GET, PATCH"
@@ -178,7 +180,7 @@ func TestIngresCorsConfigAllowOriginWithTrailingComma(t *testing.T) {
ing := buildIngress()
data := map[string]string{}
- data[parser.GetAnnotationWithPrefix(corsEnableAnnotation)] = "true"
+ data[parser.GetAnnotationWithPrefix(corsEnableAnnotation)] = enableAnnotation
// Include a trailing comma and an empty value between the commas.
data[parser.GetAnnotationWithPrefix(corsAllowOriginAnnotation)] = "https://origin123.test.com:4443, ,https://origin321.test.com:4443,"
@@ -203,3 +205,33 @@ func TestIngresCorsConfigAllowOriginWithTrailingComma(t *testing.T) {
t.Errorf("expected %v but returned %v", expectedCorsAllowOrigins, nginxCors.CorsAllowOrigin)
}
}
+
+func TestIngressCorsConfigAllowOriginWithNonHttpProtocol(t *testing.T) {
+ ing := buildIngress()
+
+ data := map[string]string{}
+ data[parser.GetAnnotationWithPrefix(corsEnableAnnotation)] = enableAnnotation
+
+ // Include a trailing comma and an empty value between the commas.
+ data[parser.GetAnnotationWithPrefix(corsAllowOriginAnnotation)] = "test://localhost"
+ ing.SetAnnotations(data)
+
+ corst, err := NewParser(&resolver.Mock{}).Parse(ing)
+ if err != nil {
+ t.Errorf("error parsing annotations: %v", err)
+ }
+
+ nginxCors, ok := corst.(*Config)
+ if !ok {
+ t.Errorf("expected a Config type but returned %t", corst)
+ }
+
+ if !nginxCors.CorsEnabled {
+ t.Errorf("expected %v but returned %v", data[parser.GetAnnotationWithPrefix(corsEnableAnnotation)], nginxCors.CorsEnabled)
+ }
+
+ expectedCorsAllowOrigins := []string{"test://localhost"}
+ if !reflect.DeepEqual(nginxCors.CorsAllowOrigin, expectedCorsAllowOrigins) {
+ t.Errorf("expected %v but returned %v", expectedCorsAllowOrigins, nginxCors.CorsAllowOrigin)
+ }
+}
diff --git a/test/e2e/annotations/cors.go b/test/e2e/annotations/cors.go
index a14a5761f..58f4445f7 100644
--- a/test/e2e/annotations/cors.go
+++ b/test/e2e/annotations/cors.go
@@ -669,4 +669,33 @@ var _ = framework.DescribeAnnotation("cors-*", func() {
Headers().
NotContainsKey("Access-Control-Allow-Origin")
})
+
+ ginkgo.It("should allow - origins with non-http[s] protocols", func() {
+ host := corsHost
+ origin := "test://localhost"
+ origin2 := "tauri://localhost:3000"
+ annotations := map[string]string{
+ "nginx.ingress.kubernetes.io/enable-cors": "true",
+ "nginx.ingress.kubernetes.io/cors-allow-origin": "test://localhost, tauri://localhost:3000",
+ }
+
+ ing := framework.NewSingleIngress(host, "/", host, f.Namespace, framework.EchoService, 80, annotations)
+ f.EnsureIngress(ing)
+
+ f.HTTPTestClient().
+ GET("/").
+ WithHeader("Host", host).
+ WithHeader("Origin", origin).
+ Expect().
+ Status(http.StatusOK).Headers().
+ ValueEqual("Access-Control-Allow-Origin", []string{"test://localhost"})
+
+ f.HTTPTestClient().
+ GET("/").
+ WithHeader("Host", host).
+ WithHeader("Origin", origin2).
+ Expect().
+ Status(http.StatusOK).Headers().
+ ValueEqual("Access-Control-Allow-Origin", []string{"tauri://localhost:3000"})
+ })
})
From c9743ae58599ad43236a7b28aea0f6bd8cd19c4a Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 2 Sep 2024 16:41:15 +0100
Subject: [PATCH 222/283] Bump the all group with 2 updates (#11922)
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
.github/workflows/ci.yaml | 4 ++--
.github/workflows/scorecards.yml | 2 +-
.github/workflows/zz-tmpl-k8s-e2e.yaml | 2 +-
3 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/.github/workflows/ci.yaml b/.github/workflows/ci.yaml
index d240181c3..05cf9269c 100644
--- a/.github/workflows/ci.yaml
+++ b/.github/workflows/ci.yaml
@@ -186,7 +186,7 @@ jobs:
| gzip > docker.tar.gz
- name: cache
- uses: actions/upload-artifact@834a144ee995460fba8ed112a2fc961b36a5ec5a # v4.3.6
+ uses: actions/upload-artifact@50769540e7f4bd5e21e526ee35c689e35e0d6874 # v4.4.0
with:
name: docker.tar.gz
path: docker.tar.gz
@@ -209,7 +209,7 @@ jobs:
- name: Set up Helm
uses: azure/setup-helm@fe7b79cd5ee1e45176fcad797de68ecaf3ca4814 # v4.2.0
- - uses: actions/setup-python@39cd14951b08e74b54015e9e001cdefcf80e669f # v5.1.1
+ - uses: actions/setup-python@f677139bbe7f9c59b41e40162b753c062f5d49a3 # v5.2.0
with:
python-version: '3.x'
diff --git a/.github/workflows/scorecards.yml b/.github/workflows/scorecards.yml
index aa8981aa3..a1e9c4ecc 100644
--- a/.github/workflows/scorecards.yml
+++ b/.github/workflows/scorecards.yml
@@ -51,7 +51,7 @@ jobs:
# Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF
# format to the repository Actions tab.
- name: "Upload artifact"
- uses: actions/upload-artifact@834a144ee995460fba8ed112a2fc961b36a5ec5a # v4.3.6
+ uses: actions/upload-artifact@50769540e7f4bd5e21e526ee35c689e35e0d6874 # v4.4.0
with:
name: SARIF file
path: results.sarif
diff --git a/.github/workflows/zz-tmpl-k8s-e2e.yaml b/.github/workflows/zz-tmpl-k8s-e2e.yaml
index 7ab75feab..33dd48418 100644
--- a/.github/workflows/zz-tmpl-k8s-e2e.yaml
+++ b/.github/workflows/zz-tmpl-k8s-e2e.yaml
@@ -49,7 +49,7 @@ jobs:
make kind-e2e-test
- name: Upload e2e junit-reports ${{ inputs.variation }}
- uses: actions/upload-artifact@834a144ee995460fba8ed112a2fc961b36a5ec5a # v4.3.6
+ uses: actions/upload-artifact@50769540e7f4bd5e21e526ee35c689e35e0d6874 # v4.4.0
if: success() || failure()
with:
name: e2e-test-reports-${{ inputs.k8s-version }}${{ inputs.variation }}
From e9259af906f462ff052e9fd80247945d1fb7f661 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Tue, 3 Sep 2024 22:11:37 +0100
Subject: [PATCH 223/283] Bump github.com/opencontainers/runc from 1.1.13 to
1.1.14 (#11928)
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 2 +-
go.sum | 4 ++--
2 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/go.mod b/go.mod
index f8002d09c..36b5f79e1 100644
--- a/go.mod
+++ b/go.mod
@@ -15,7 +15,7 @@ require (
github.com/moul/pb v0.0.0-20220425114252-bca18df4138c
github.com/ncabatoff/process-exporter v0.8.3
github.com/onsi/ginkgo/v2 v2.20.2
- github.com/opencontainers/runc v1.1.13
+ github.com/opencontainers/runc v1.1.14
github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2
github.com/prometheus/client_golang v1.20.2
github.com/prometheus/client_model v0.6.1
diff --git a/go.sum b/go.sum
index 88cef0712..51d85b04c 100644
--- a/go.sum
+++ b/go.sum
@@ -171,8 +171,8 @@ github.com/onsi/gomega v1.7.1/go.mod h1:XdKZgCCFLUoM/7CFJVPcG8C1xQ1AJ0vpAezJrB7J
github.com/onsi/gomega v1.10.1/go.mod h1:iN09h71vgCQne3DLsj+A5owkum+a2tYe+TOCB1ybHNo=
github.com/onsi/gomega v1.34.1 h1:EUMJIKUjM8sKjYbtxQI9A4z2o+rruxnzNvpknOXie6k=
github.com/onsi/gomega v1.34.1/go.mod h1:kU1QgUvBDLXBJq618Xvm2LUX6rSAfRaFRTcdOeDLwwY=
-github.com/opencontainers/runc v1.1.13 h1:98S2srgG9vw0zWcDpFMn5TRrh8kLxa/5OFUstuUhmRs=
-github.com/opencontainers/runc v1.1.13/go.mod h1:R016aXacfp/gwQBYw2FDGa9m+n6atbLWrYY8hNMT/sA=
+github.com/opencontainers/runc v1.1.14 h1:rgSuzbmgz5DUJjeSnw337TxDbRuqjs6iqQck/2weR6w=
+github.com/opencontainers/runc v1.1.14/go.mod h1:E4C2z+7BxR7GHXp0hAY53mek+x49X1LjPNeMTfRGvOA=
github.com/opencontainers/runtime-spec v1.2.0 h1:z97+pHb3uELt/yiAWD691HNHQIF07bE7dzrbT927iTk=
github.com/opencontainers/runtime-spec v1.2.0/go.mod h1:jwyrGlmzljRJv/Fgzds9SsS/C5hL+LL3ko9hs6T5lQ0=
github.com/peterbourgon/diskv v2.0.1+incompatible h1:UBdAOUP5p4RWqPBg048CAvpKN+vxiaj6gdUUzhl4XmI=
From a647bc1b7aca33171809b143e96b35da1c989b79 Mon Sep 17 00:00:00 2001
From: Ramiro Algozino
Date: Wed, 4 Sep 2024 23:11:01 +0200
Subject: [PATCH 224/283] Chart: Implement
`controller.admissionWebhooks.service.servicePort`. (#11931)
---
.../validating-webhook.yaml | 1 +
.../templates/controller-service-webhook.yaml | 2 +-
.../validating-webhook_test.yaml | 32 +++++++++++++++++++
.../controller-service-webhook_test.yaml | 32 +++++++++++++++++++
4 files changed, 66 insertions(+), 1 deletion(-)
create mode 100644 charts/ingress-nginx/tests/admission-webhooks/validating-webhook_test.yaml
create mode 100644 charts/ingress-nginx/tests/controller-service-webhook_test.yaml
diff --git a/charts/ingress-nginx/templates/admission-webhooks/validating-webhook.yaml b/charts/ingress-nginx/templates/admission-webhooks/validating-webhook.yaml
index 4cd36a62e..0949cea75 100644
--- a/charts/ingress-nginx/templates/admission-webhooks/validating-webhook.yaml
+++ b/charts/ingress-nginx/templates/admission-webhooks/validating-webhook.yaml
@@ -40,6 +40,7 @@ webhooks:
service:
name: {{ include "ingress-nginx.controller.fullname" . }}-admission
namespace: {{ include "ingress-nginx.namespace" . }}
+ port: {{ .Values.controller.admissionWebhooks.service.servicePort }}
path: /networking/v1/ingresses
{{- if .Values.controller.admissionWebhooks.timeoutSeconds }}
timeoutSeconds: {{ .Values.controller.admissionWebhooks.timeoutSeconds }}
diff --git a/charts/ingress-nginx/templates/controller-service-webhook.yaml b/charts/ingress-nginx/templates/controller-service-webhook.yaml
index 6dcf1a10a..67aac0d9a 100644
--- a/charts/ingress-nginx/templates/controller-service-webhook.yaml
+++ b/charts/ingress-nginx/templates/controller-service-webhook.yaml
@@ -29,7 +29,7 @@ spec:
{{- end }}
ports:
- name: https-webhook
- port: 443
+ port: {{ .Values.controller.admissionWebhooks.service.servicePort }}
targetPort: webhook
{{- if semverCompare ">=1.20.0-0" .Capabilities.KubeVersion.Version }}
appProtocol: https
diff --git a/charts/ingress-nginx/tests/admission-webhooks/validating-webhook_test.yaml b/charts/ingress-nginx/tests/admission-webhooks/validating-webhook_test.yaml
new file mode 100644
index 000000000..b9d6d780b
--- /dev/null
+++ b/charts/ingress-nginx/tests/admission-webhooks/validating-webhook_test.yaml
@@ -0,0 +1,32 @@
+suite: Admission Webhooks > ValidatingWebhookConfiguration
+templates:
+ - admission-webhooks/validating-webhook.yaml
+
+tests:
+ - it: should not create a ValidatingWebhookConfiguration if `controller.admissionWebhooks.enabled` is false
+ set:
+ controller.admissionWebhooks.enabled: false
+ asserts:
+ - hasDocuments:
+ count: 0
+
+ - it: should create a ValidatingWebhookConfiguration if `controller.admissionWebhooks.enabled` is true
+ set:
+ controller.admissionWebhooks.enabled: true
+ asserts:
+ - hasDocuments:
+ count: 1
+ - isKind:
+ of: ValidatingWebhookConfiguration
+ - equal:
+ path: metadata.name
+ value: RELEASE-NAME-admission
+
+ - it: should create a ValidatingWebhookConfiguration with a custom port if `controller.admissionWebhooks.service.servicePort` is set
+ set:
+ controller.admissionWebhooks.enabled: true
+ controller.admissionWebhooks.service.servicePort: 9443
+ asserts:
+ - equal:
+ path: webhooks[0].clientConfig.service.port
+ value: 9443
diff --git a/charts/ingress-nginx/tests/controller-service-webhook_test.yaml b/charts/ingress-nginx/tests/controller-service-webhook_test.yaml
new file mode 100644
index 000000000..1c759edbe
--- /dev/null
+++ b/charts/ingress-nginx/tests/controller-service-webhook_test.yaml
@@ -0,0 +1,32 @@
+suite: Controller > Service > Webhook
+templates:
+ - controller-service-webhook.yaml
+
+tests:
+ - it: should not create a webhook Service if `controller.admissionWebhooks.enabled` is false
+ set:
+ controller.admissionWebhooks.enabled: false
+ asserts:
+ - hasDocuments:
+ count: 0
+
+ - it: should create a webhook Service if `controller.admissionWebhooks.enabled` is true
+ set:
+ controller.admissionWebhooks.enabled: true
+ asserts:
+ - hasDocuments:
+ count: 1
+ - isKind:
+ of: Service
+ - equal:
+ path: metadata.name
+ value: RELEASE-NAME-ingress-nginx-controller-admission
+
+ - it: should create a webhook Service with a custom port if `controller.admissionWebhooks.service.servicePort` is set
+ set:
+ controller.admissionWebhooks.enabled: true
+ controller.admissionWebhooks.service.servicePort: 9443
+ asserts:
+ - equal:
+ path: spec.ports[0].port
+ value: 9443
From 4f230493742029212ce007c5e4b9aefa7d0a149b Mon Sep 17 00:00:00 2001
From: Nathan Baulch
Date: Sat, 7 Sep 2024 00:59:43 +1000
Subject: [PATCH 225/283] Fix minor typos (#11935)
---
.github/workflows/zz-tmpl-images.yaml | 2 +-
.github/workflows/zz-tmpl-k8s-e2e.yaml | 2 +-
Changelog.md | 52 +++++++++----------
MANUAL_RELEASE.md | 16 +++---
NEW_CONTRIBUTOR.md | 10 ++--
build/run-ingress-controller.sh | 2 +-
changelog/controller-1.11.0.md | 2 +-
changelog/controller-1.6.4.md | 2 +-
changelog/controller-1.7.1.md | 2 +-
changelog/controller-1.8.0.md | 2 +-
changelog/controller-1.9.0-beta.0.md | 2 +-
changelog/controller-1.9.0.md | 2 +-
.../changelog/helm-chart-4.1.2.md | 2 +-
.../changelog/helm-chart-4.7.0.md | 2 +-
cmd/plugin/request/request.go | 2 +-
docs/e2e-tests.md | 2 +-
docs/examples/index.md | 2 +-
docs/examples/openpolicyagent/README.md | 20 +++----
docs/examples/openpolicyagent/template.yaml | 10 ++--
.../third-party-addons/opentelemetry.md | 6 +--
.../rootfs/pkg/k8s/k8s_test.go | 2 +-
internal/admission/controller/server.go | 2 +-
.../ingress/annotations/loadbalancing/main.go | 14 ++---
.../ingress/annotations/mirror/main_test.go | 2 +-
.../ingress/annotations/serversnippet/main.go | 2 +-
.../annotations/serviceupstream/main.go | 2 +-
internal/ingress/annotations/snippet/main.go | 2 +-
.../ingress/annotations/streamsnippet/main.go | 2 +-
internal/ingress/controller/config/config.go | 8 +--
internal/ingress/controller/endpointslices.go | 2 +-
internal/ingress/controller/nginx_test.go | 2 +-
.../controller/store/endpointslice_test.go | 4 +-
.../ingress/controller/store/store_test.go | 6 +--
internal/ingress/controller/util.go | 2 +-
.../ingress/metric/collectors/controller.go | 6 +--
internal/ingress/resolver/main.go | 6 +--
internal/ingress/resolver/mock.go | 6 +--
internal/net/ssl/ssl.go | 4 +-
pkg/apis/ingress/types.go | 8 +--
.../nginx/lua/test/balancer/sticky_test.lua | 2 +-
test/e2e/endpointslices/topology.go | 2 +-
test/e2e/framework/deployment.go | 2 +-
test/e2e/framework/framework.go | 2 +-
test/e2e/gracefulshutdown/shutdown.go | 2 +-
test/e2e/settings/global_external_auth.go | 6 +--
test/k6/loadtest.js | 4 +-
test/k6/smoketest.js | 6 +--
47 files changed, 125 insertions(+), 125 deletions(-)
diff --git a/.github/workflows/zz-tmpl-images.yaml b/.github/workflows/zz-tmpl-images.yaml
index 4594a1de4..6d5a4ef17 100644
--- a/.github/workflows/zz-tmpl-images.yaml
+++ b/.github/workflows/zz-tmpl-images.yaml
@@ -1,5 +1,5 @@
#### THIS IS A TEMPLATE ####
-# This workflow is created to be a template for every time an e2e teest is required,
+# This workflow is created to be a template for every time an e2e test is required,
on:
workflow_call:
diff --git a/.github/workflows/zz-tmpl-k8s-e2e.yaml b/.github/workflows/zz-tmpl-k8s-e2e.yaml
index 33dd48418..20106cc95 100644
--- a/.github/workflows/zz-tmpl-k8s-e2e.yaml
+++ b/.github/workflows/zz-tmpl-k8s-e2e.yaml
@@ -1,5 +1,5 @@
#### THIS IS A TEMPLATE ####
-# This workflow is created to be a template for every time an e2e teest is required,
+# This workflow is created to be a template for every time an e2e test is required,
on:
workflow_call:
diff --git a/Changelog.md b/Changelog.md
index f74ff8119..f049654ee 100644
--- a/Changelog.md
+++ b/Changelog.md
@@ -2,7 +2,7 @@
All New change are in [Changelog](./changelog)
-### 1.5.1
+### 1.5.1
* Upgrade NGINX to 1.21.6
* Upgrade Golang 1.19.2
@@ -102,18 +102,18 @@ Images:
### Community Updates
We will discuss the results of our Community Survey, progress on the stabilization project, and ideas going
-forward with the project at
-[Kubecon NA 2022 in Detroit](https://events.linuxfoundation.org/kubecon-cloudnativecon-north-america/). Come join us
+forward with the project at
+[Kubecon NA 2022 in Detroit](https://events.linuxfoundation.org/kubecon-cloudnativecon-north-america/). Come join us
and let us hear what you'd like to see in the future for ingress-nginx.
https://kccncna2022.sched.com/event/18lgl?iframe=no
[**Kubernetes Registry change notice**](https://twitter.com/BenTheElder/status/1575898507235323904)
-The [@kubernetesio](https://twitter.com/kubernetesio) container image host http://k8s.gcr.io is
-*actually* getting redirected to the community controlled http://registry.k8s.io starting with a small portion of
+The [@kubernetesio](https://twitter.com/kubernetesio) container image host http://k8s.gcr.io is
+*actually* getting redirected to the community controlled http://registry.k8s.io starting with a small portion of
traffic on October 3rd.
-If you notice any issues, *please* ping [Ben Elder](https://twitter.com/BenTheElder),
+If you notice any issues, *please* ping [Ben Elder](https://twitter.com/BenTheElder),
[@thockin](https://twitter.com/thockin), [@ameukam](https://twitter.com/ameukam),or report issues in slack to
[sig-k8s-infra slack channel](https://kubernetes.slack.com/archives/CCK68P2Q2).
@@ -123,7 +123,7 @@ If you notice any issues, *please* ping [Ben Elder](https://twitter.com/BenTheEl
[8890](https://github.com/kubernetes/ingress-nginx/pull/8890)
* Update to Prometheus metric names, more information [available here]( https://github.com/kubernetes/ingress-nginx/pull/8728
)
-* Deprecated Kubernetes versions 1.20-1.21, Added support for, 1.25, currently supported versions v1.22, v1.23, v1.24, v1.25
+* Deprecated Kubernetes versions 1.20-1.21, Added support for, 1.25, currently supported versions v1.22, v1.23, v1.24, v1.25
ADDED
* `_request_duration_seconds` Histogram
@@ -203,11 +203,11 @@ Images:
### 1.3.1
-In v1.3.1 leader elections will be done entirely using the Lease API and no longer using configmaps.
+In v1.3.1 leader elections will be done entirely using the Lease API and no longer using configmaps.
v1.3.0 is a safe transition version, using v1.3.0 can automatically complete the merging of election locks, and then you can safely upgrade to v1.3.1.
-Also, *important note*, with the Release of Kubernetes v1.25 we are dropping support for the legacy branches,
-Also, *important note*, with the release of Kubernetes v1.25, we are dropping support for the legacy edition,
+Also, *important note*, with the Release of Kubernetes v1.25 we are dropping support for the legacy branches,
+Also, *important note*, with the release of Kubernetes v1.25, we are dropping support for the legacy edition,
that means all version <1.0.0 of the ingress-nginx-controller.
## Image:
@@ -277,11 +277,11 @@ All other Changes
### 1.3.0
-Image:
+Image:
- registry.k8s.io/ingress-nginx/controller:v1.3.0@sha256:d1707ca76d3b044ab8a28277a2466a02100ee9f58a86af1535a3edf9323ea1b5
- registry.k8s.io/ingress-nginx/controller-chroot:v1.3.0@sha256:0fcb91216a22aae43b374fc2e6a03b8afe9e8c78cbf07a09d75636dc4ea3c191
-_IMPORTANT CHANGES:_
+_IMPORTANT CHANGES:_
* This release removes support for Kubernetes v1.19.0
* This release adds support for Kubernetes v1.24.0
* Starting with this release, we will need permissions on the `coordination.k8s.io/leases` resource for leaderelection lock
@@ -352,11 +352,11 @@ _Changes:_
### 1.2.0
-Image:
+Image:
- k8s.gcr.io/ingress-nginx/controller:v1.2.0@sha256:d8196e3bc1e72547c5dec66d6556c0ff92a23f6d0919b206be170bc90d5f9185
- k8s.gcr.io/ingress-nginx/controller-chroot:v1.2.0@sha256:fb17f1700b77d4fcc52ca6f83ffc2821861ae887dbb87149cf5cbc52bea425e5
-This minor version release, introduces 2 breaking changes. For the first time, an option to jail/chroot the nginx process, inside the controller container, is being introduced.. This provides an additional layer of security, for sensitive information like K8S serviceaccounts. This release also brings a special new feature of deep inspection into objects. The inspection is a walk through of all the spec, checking for possible attempts to escape configs. Currently such an inspection only occurs for `networking.Ingress`. Additionally there are fixes for the recently announced CVEs on busybox & ssl_client. And there is a fix to a recently introduced redirection related bug, that was setting the protocol on URLs to "nil".
+This minor version release, introduces 2 breaking changes. For the first time, an option to jail/chroot the nginx process, inside the controller container, is being introduced. This provides an additional layer of security, for sensitive information like K8S serviceaccounts. This release also brings a special new feature of deep inspection into objects. The inspection is a walk through of all the spec, checking for possible attempts to escape configs. Currently such an inspection only occurs for `networking.Ingress`. Additionally there are fixes for the recently announced CVEs on busybox & ssl_client. And there is a fix to a recently introduced redirection related bug, that was setting the protocol on URLs to "nil".
_Changes:_
@@ -419,7 +419,7 @@ _Changes:_
**Image:**
- k8s.gcr.io/ingress-nginx/controller:v1.1.3@sha256:31f47c1e202b39fadecf822a9b76370bd4baed199a005b3e7d4d1455f4fd3fe2
-This release upgrades Alpine to 3.14.4 and nginx to 1.19.10
+This release upgrades Alpine to 3.14.4 and nginx to 1.19.10
Patches [OpenSSL CVE-2022-0778](https://github.com/kubernetes/ingress-nginx/issues/8339)
@@ -460,7 +460,7 @@ _Changes:_
### 1.1.2
-**Image:**
+**Image:**
- k8s.gcr.io/ingress-nginx/controller:v1.1.2@sha256:28b11ce69e57843de44e3db6413e98d09de0f6688e33d4bd384002a44f78405c
This release bumps grpc version to 1.44.0 & runc to version 1.1.0. The release also re-introduces the ingress.class annotation, which was previously declared as deprecated. Besides that, several bug fixes and improvements are listed below.
@@ -502,7 +502,7 @@ _Changes:_
### 1.1.1
-**Image:**
+**Image:**
- k8s.gcr.io/ingress-nginx/controller:v1.1.1@sha256:0bc88eb15f9e7f84e8e56c14fa5735aaa488b840983f87bd79b1054190e660de
This release contains several fixes and improvements. This image is now built using Go v1.17.6 and gRPC v1.43.0. See detailed list below.
@@ -571,9 +571,9 @@ _Changes:_
_Possible Breaking Change_
We now implement string sanitization in annotation values. This means that words like "location", "by_lua" and
-others will drop the reconciliation of an Ingress object.
+others will drop the reconciliation of an Ingress object.
-Users from mod_security and other features should be aware that some blocked values may be used by those features
+Users from mod_security and other features should be aware that some blocked values may be used by those features
and must be manually unblocked by the Ingress Administrator.
For more details please check [https://kubernetes.github.io/ingress-nginx/user-guide/nginx-configuration/configmap/#annotation-value-word-blocklist]
@@ -592,7 +592,7 @@ _Changes:_
- k8s.gcr.io/ingress-nginx/controller:v1.0.4@sha256:545cff00370f28363dad31e3b59a94ba377854d3a11f18988f5f9e56841ef9ef
_Possible Breaking Change_
-We have disabled the builtin ssl_session_cache due to possible memory fragmentation. This should not impact the majority of users, but please let us know
+We have disabled the builtin ssl_session_cache due to possible memory fragmentation. This should not impact the majority of users, but please let us know
if you face any problem
_Changes:_
@@ -608,7 +608,7 @@ _Changes:_
- k8s.gcr.io/ingress-nginx/controller:v1.0.3@sha256:4ade87838eb8256b094fbb5272d7dda9b6c7fa8b759e6af5383c1300996a7452
**Known Issues**
-* Ingress controller now (starting from v1.0.0) mandates cluster scoped access to IngressClass. This leads to problems when updating old Ingress controller to newest version, as described [here](https://github.com/kubernetes/ingress-nginx/issues/7510). We plan to fix it in v1.0.4, see [this](https://github.com/kubernetes/ingress-nginx/pull/7578).
+* Ingress controller now (starting from v1.0.0) mandates cluster scoped access to IngressClass. This leads to problems when updating old Ingress controller to newest version, as described [here](https://github.com/kubernetes/ingress-nginx/issues/7510). We plan to fix it in v1.0.4, see [this](https://github.com/kubernetes/ingress-nginx/pull/7578).
_New Features:_
@@ -624,7 +624,7 @@ _Changes:_
- k8s.gcr.io/ingress-nginx/controller:v1.0.2@sha256:85b53b493d6d658d8c013449223b0ffd739c76d76dc9bf9000786669ec04e049
**Known Issues**
-* Ingress controller now (starting from v1.0.0) mandates cluster scoped access to IngressClass. This leads to problems when updating old Ingress controller to newest version, as described [here](https://github.com/kubernetes/ingress-nginx/issues/7510). We plan to fix it in v1.0.3, see [this](https://github.com/kubernetes/ingress-nginx/pull/7578).
+* Ingress controller now (starting from v1.0.0) mandates cluster scoped access to IngressClass. This leads to problems when updating old Ingress controller to newest version, as described [here](https://github.com/kubernetes/ingress-nginx/issues/7510). We plan to fix it in v1.0.3, see [this](https://github.com/kubernetes/ingress-nginx/pull/7578).
_New Features:_
@@ -640,7 +640,7 @@ _Changes:_
- k8s.gcr.io/ingress-nginx/controller:v1.0.1@sha256:26bbd57f32bac3b30f90373005ef669aae324a4de4c19588a13ddba399c6664e
**Known Issues**
-* Ingress controller now (starting from v1.0.0) mandates cluster scoped access to IngressClass. This leads to problems when updating old Ingress controller to newest version, as described [here](https://github.com/kubernetes/ingress-nginx/issues/7510). We plan to fix it in v1.0.2, see [this](https://github.com/kubernetes/ingress-nginx/pull/7578).
+* Ingress controller now (starting from v1.0.0) mandates cluster scoped access to IngressClass. This leads to problems when updating old Ingress controller to newest version, as described [here](https://github.com/kubernetes/ingress-nginx/issues/7510). We plan to fix it in v1.0.2, see [this](https://github.com/kubernetes/ingress-nginx/pull/7578).
_New Features:_
@@ -883,7 +883,7 @@ _Changes:_
test #7255
- [X] [#7216](https://github.com/kubernetes/ingress-nginx/pull/7216) Admission: Skip validation checks if an ingress
is marked as deleted #7216
-
+
### 1.0.0-beta.3
** This is a breaking change**
@@ -2193,7 +2193,7 @@ _New Features:_
If the active connections end before that, the pod will terminate gracefully at that time.
- To efectively take advantage of this feature, the Configmap feature [worker-shutdown-timeout](https://kubernetes.github.io/ingress-nginx/user-guide/nginx-configuration/configmap/#worker-shutdown-timeout) new value is `240s` instead of `10s`.
+ To effectively take advantage of this feature, the Configmap feature [worker-shutdown-timeout](https://kubernetes.github.io/ingress-nginx/user-guide/nginx-configuration/configmap/#worker-shutdown-timeout) new value is `240s` instead of `10s`.
**IMPORTANT:** this value has a side effect during reloads, consuming more memory until the old NGINX workers are replaced.
@@ -2603,7 +2603,7 @@ _New Features:_
_Breaking changes:_
- The NGINX server listening in port 18080 was removed. It was replaced by a server using an unix socket as port [#3684](https://github.com/kubernetes/ingress-nginx/pull/3684)
- This server was internal to the ingress controller. In case this was being acceded from the outside, you can restore the old server using the `http-snipet` feature in the configuration configmap like:
+ This server was internal to the ingress controller. In case this was being acceded from the outside, you can restore the old server using the `http-snippet` feature in the configuration configmap like:
```yaml
http-snippet: |
diff --git a/MANUAL_RELEASE.md b/MANUAL_RELEASE.md
index d7144b85d..b1c1fd068 100644
--- a/MANUAL_RELEASE.md
+++ b/MANUAL_RELEASE.md
@@ -177,21 +177,21 @@ Promoting the images basically means that images, that were pushed to staging co
```
- The -L 38 was used for 2 reasons.
- Default number of results is 30 and there were more than 30 PRs merged while releasing v1.1.1. If you see the current/soon-to-be-old changelog, you can look at the most recent PR number that has been accounted for already, and start from after that last accounted for PR.
- - The other reason to use -L 38 was to ommit the 39th, the 40th and the 41st line in the resulting list. These were non-relevant PRs.
+ - The other reason to use -L 38 was to omit the 39th, the 40th and the 41st line in the resulting list. These were non-relevant PRs.
- If you save the output of above command to a file called prlist.txt. It looks somewhat like this ;
```
- % cat ~/Downloads/prlist.txt
+ % cat ~/Downloads/prlist.txt
8129 fix syntax in docs for multi-tls example
8120 Update go in runner and release v1.1.1
8119 Update to go v1.17.6
8118 Remove deprecated libraries, update other libs
8117 Fix codegen errors
- 8115 chart/ghaction: set the correct permission to have access to push a release
+ 8115 chart/ghaction: set the correct permission to have access to push a release
....
```
You can delete the lines, that refer to PRs of the release process itself. We only need to list the feature/bugfix PRs. You can also delete the lines that are housekeeping or not really worth mentioning in the changelog.
- - you use some easy automation in bash/python/other, to get the PR-List that can be used in the changelog. For example, its possible to use a bash scripty way, seen below, to convert those plaintext PR numbers into clickable links.
+ - you use some easy automation in bash/python/other, to get the PR-List that can be used in the changelog. For example, it's possible to use a bash scripty way, seen below, to convert those plaintext PR numbers into clickable links.
```
#!/usr/bin/bash
@@ -205,7 +205,7 @@ Promoting the images basically means that images, that were pushed to staging co
done <$file
```
- - There was a parsing issue and path issue on MacOS, so above scrpt had to be modified and MacOS monterey compatible script is below ;
+ - There was a parsing issue and path issue on MacOS, so above script had to be modified and MacOS monterey compatible script is below ;
```
#!/bin/bash
@@ -231,7 +231,7 @@ Promoting the images basically means that images, that were pushed to staging co
- tag
- digest
- - [helm-docs](https://github.com/norwoodj/helm-docs) is a tool that generates the README.md for a helm-chart automatically. In the CI pipeline workflow of github actions (/.github/workflows/ci.yaml), you can see how helm-docs is used. But the CI pipeline is not designed to make commits back into the project. So we need to run helm-docs manually, and check in the resulting autogenerated README.md at the path /charts/ingress-nginx/README.md
+ - [helm-docs](https://github.com/norwoodj/helm-docs) is a tool that generates the README.md for a helm-chart automatically. In the CI pipeline workflow of github actions (/.github/workflows/ci.yaml), you can see how helm-docs is used. But the CI pipeline is not designed to make commits back into the project. So we need to run helm-docs manually, and check in the resulting autogenerated README.md at the path /charts/ingress-nginx/README.md
```
GOBIN=$PWD GO111MODULE=on go install github.com/norwoodj/helm-docs/cmd/helm-docs@v1.11.0
./helm-docs --chart-search-root=${GITHUB_WORKSPACE}/charts
@@ -274,7 +274,7 @@ Promoting the images basically means that images, that were pushed to staging co
### h. Update README.md
-- Update the table in README.md in the root of the projet to reflect the support matrix. Add the new release version and details in there.
+- Update the table in README.md in the root of the project to reflect the support matrix. Add the new release version and details in there.
## 5. RELEASE new version
@@ -291,7 +291,7 @@ Promoting the images basically means that images, that were pushed to staging co
- `helm repo update`
- `helm search repo ingress-nginx`
-## 6. Github release
+## 6. GitHub release
- Release to github
diff --git a/NEW_CONTRIBUTOR.md b/NEW_CONTRIBUTOR.md
index e89c1ba88..20c4e3daa 100644
--- a/NEW_CONTRIBUTOR.md
+++ b/NEW_CONTRIBUTOR.md
@@ -20,14 +20,14 @@ It all starts with the OSI model...
### Approaching the problem
-Not everybody knows everything. But the factors that help are a love/passion for this to begin. But to move forward, its the approach and not the knowledge that sustains prolonged joy, while working on issues. If the approach is simple and powered by good-wishes-for-community, then info & tools are forthcoming and easy.
+Not everybody knows everything. But the factors that help are a love/passion for this to begin. But to move forward, it's the approach and not the knowledge that sustains prolonged joy, while working on issues. If the approach is simple and powered by good-wishes-for-community, then info & tools are forthcoming and easy.
Here we take a bird's eye-view of the hops in the network plumbing, that a packet takes, from source to destination, when we run `curl`, from a laptop to a nginx webserver process, running in a container, inside a pod, inside a Kubernetes cluster, created using `kind` or `minikube` or any other cluster-management tool.
### [Kind](https://kind.sigs.k8s.io/) cluster example on a Linux Host
#### TL;DR
-The destination of the packet from the curl command, is looked up, in the `routing table`. Based on the route, the the packet first travels to the virtual bridge `172.18.0.1` interface, created by docker, when we created the kind cluster on a laptop. Next the packet is forwarded to `172.18.0.2`(See below on how we got this IP address), within the kind cluster. The `kube-proxy` container creates iptables rules that make sure the packet goes to the correct pod ip in this case `10.244.0.5`
+The destination of the packet from the curl command, is looked up, in the `routing table`. Based on the route, the packet first travels to the virtual bridge `172.18.0.1` interface, created by docker, when we created the kind cluster on a laptop. Next the packet is forwarded to `172.18.0.2`(See below on how we got this IP address), within the kind cluster. The `kube-proxy` container creates iptables rules that make sure the packet goes to the correct pod ip in this case `10.244.0.5`
Command:
```
@@ -435,7 +435,7 @@ virbr0: flags=4163 mtu 1500
```
Output Relevance: From the above output you can see there are two Virtual Bridges created by minikube when we created the cluster on the network. Here, `virbr0` is the default NAT network bridge while `virbr2` is a isolated network bridge on which the pods run.
-Minikube creates a Virtual Machine, to enter the virtual machine we can simple do:
+Minikube creates a Virtual Machine, to enter the virtual machine we can simply do:
```
# minikube ssh
```
@@ -707,7 +707,7 @@ NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
httpd ClusterIP 10.104.111.0 80/TCP 13s
```
-Once we have this we can now create a n ingress using the following
+Once we have this we can now create an ingress using the following
```
kubectl -n httpd create ingress httpd --class nginx --rule httpd.dev.leonnunes.com/"*"=httpd:80
```
@@ -771,7 +771,7 @@ Hypertext Transfer Protocol
[Response in frame: 6]
```
-The above output shows the information that the `httpd` pod recieves. The `curl` command sends the host header, `Host: httpd.dev.leonnunes.com`, to the nginx controller, that then matches the rule and sends the information to the right controller
+The above output shows the information that the `httpd` pod receives. The `curl` command sends the host header, `Host: httpd.dev.leonnunes.com`, to the nginx controller, that then matches the rule and sends the information to the right controller
The following output shows what is sent via the laptop.
```
diff --git a/build/run-ingress-controller.sh b/build/run-ingress-controller.sh
index 29338241f..99f598b1f 100755
--- a/build/run-ingress-controller.sh
+++ b/build/run-ingress-controller.sh
@@ -49,7 +49,7 @@ fi
SSL_VOLUME=$(mktemp -d)
function cleanup {
- echo -e "${BGREEN}Stoping kubectl proxy${NC}"
+ echo -e "${BGREEN}Stopping kubectl proxy${NC}"
rm -rf "${SSL_VOLUME}"
kill "$proxy_pid"
}
diff --git a/changelog/controller-1.11.0.md b/changelog/controller-1.11.0.md
index 34330c441..d462f9574 100644
--- a/changelog/controller-1.11.0.md
+++ b/changelog/controller-1.11.0.md
@@ -94,7 +94,7 @@ Images:
* Chart: Improve IngressClass documentation. (#11104)
* Chart: Deploy `PodDisruptionBudget` with KEDA. (#11032)
* Undo #11062 since it breaks the nginx config (#11082)
-* [mTLS] Fix acme verfication when mTLS and Client CN verification is enabled (#11062)
+* [mTLS] Fix acme verification when mTLS and Client CN verification is enabled (#11062)
* golangci-lint update, ci cleanup, group dependabot updates (#11071)
* bump golang (#11070)
* feature(leader_election): flag to disable leader election feature on controller (#11064)
diff --git a/changelog/controller-1.6.4.md b/changelog/controller-1.6.4.md
index 256e5ec09..15b3f671a 100644
--- a/changelog/controller-1.6.4.md
+++ b/changelog/controller-1.6.4.md
@@ -83,7 +83,7 @@ Images:
* ModSecurity dependencies update to avoid Memory Leaks (#9330)
* fix(hpa): deprecated api version, bump to v2 (#9348)
* fix(typo): pluralize provider (#9346)
-* removed deprecation messsage for ingressClass annotation (#9357)
+* removed deprecation message for ingressClass annotation (#9357)
* added ginkgo junit reports (#9350)
* Fix typos found by codespell (#9353)
* bumped ginkgo to v2.5.1 in testrunner (#9340)
diff --git a/changelog/controller-1.7.1.md b/changelog/controller-1.7.1.md
index 632ffe963..a7a5c4bbf 100644
--- a/changelog/controller-1.7.1.md
+++ b/changelog/controller-1.7.1.md
@@ -15,7 +15,7 @@ Images:
* Add support for --container flag (#9703)
* Fix typo in OpenTelemetry (#9903)
* ensure make lua-test runs locally (#9902)
-* update k8s.io dependecies to v0.26.4 (#9893)
+* update k8s.io dependencies to v0.26.4 (#9893)
* Adding resource type to default HPA configuration to resolve issues with Terraform helm chart usage (#9803)
* I have not been able to fulfill my maintainer responsibilities for a while already, making it official now. (#9883)
* Update k8s versions (#9879)
diff --git a/changelog/controller-1.8.0.md b/changelog/controller-1.8.0.md
index 48b4cdefa..f335777d6 100644
--- a/changelog/controller-1.8.0.md
+++ b/changelog/controller-1.8.0.md
@@ -39,7 +39,7 @@ on our new [ingress-nginx-dev mailing list](https://groups.google.com/a/kubernet
* Correct annotations in monitoring docs (#9976)
* fix: avoid builds and tests for changes to markdown (#9962)
* Validate path types (#9967)
-* HPA: Use capabilites & align manifests. (#9521)
+* HPA: Use capabilities & align manifests. (#9521)
* Use dl.k8s.io instead of hardcoded GCS URIs (#9946)
* add option for annotations in PodDisruptionBudget (#9843)
* chore: update httpbin to httpbun (#9919)
diff --git a/changelog/controller-1.9.0-beta.0.md b/changelog/controller-1.9.0-beta.0.md
index 79ecf596e..5ca5cfeeb 100644
--- a/changelog/controller-1.9.0-beta.0.md
+++ b/changelog/controller-1.9.0-beta.0.md
@@ -26,7 +26,7 @@ Images:
* Add golangci github action and replace the deprecated golint (#10187)
* BUGFIX incorrect indentation (#10254)
* Upgrade OpenTelemetry to v1.11.0 and gRPC to v1.57.0 (#10352)
-* fix: path with sepecial characters warning #10281 #10308 (#10330)
+* fix: path with special characters warning #10281 #10308 (#10330)
* Fix golangci-lint errors (#10196)
* chore(build): Fix Run make dev-env syntax error (#10294)
* Add firewall configuration to quick start documentation (#10357)
diff --git a/changelog/controller-1.9.0.md b/changelog/controller-1.9.0.md
index 25442894f..d6b000acc 100644
--- a/changelog/controller-1.9.0.md
+++ b/changelog/controller-1.9.0.md
@@ -26,7 +26,7 @@ Images:
* Add golangci github action and replace the deprecated golint (#10187)
* BUGFIX incorrect indentation (#10254)
* Upgrade OpenTelemetry to v1.11.0 and gRPC to v1.57.0 (#10352)
-* fix: path with sepecial characters warning #10281 #10308 (#10330)
+* fix: path with special characters warning #10281 #10308 (#10330)
* Fix golangci-lint errors (#10196)
* chore(build): Fix Run make dev-env syntax error (#10294)
* Add firewall configuration to quick start documentation (#10357)
diff --git a/charts/ingress-nginx/changelog/helm-chart-4.1.2.md b/charts/ingress-nginx/changelog/helm-chart-4.1.2.md
index 0a1d80cf1..20618557f 100644
--- a/charts/ingress-nginx/changelog/helm-chart-4.1.2.md
+++ b/charts/ingress-nginx/changelog/helm-chart-4.1.2.md
@@ -5,7 +5,7 @@ This file documents all notable changes to [ingress-nginx](https://github.com/ku
### 4.1.2
* [8587](https://github.com/kubernetes/ingress-nginx/pull/8587) Add CAP_SYS_CHROOT to DS/PSP when needed
-* [8458](https://github.com/kubernetes/ingress-nginx/pull/8458) Add portNamePreffix Helm chart parameter
+* [8458](https://github.com/kubernetes/ingress-nginx/pull/8458) Add portNamePrefix Helm chart parameter
* [8522](https://github.com/kubernetes/ingress-nginx/pull/8522) Add documentation for controller.service.loadBalancerIP in Helm chart
**Full Changelog**: https://github.com/kubernetes/ingress-nginx/compare/helm-chart-4.1.0...helm-chart-4.1.2
diff --git a/charts/ingress-nginx/changelog/helm-chart-4.7.0.md b/charts/ingress-nginx/changelog/helm-chart-4.7.0.md
index 7399da777..9d5407053 100644
--- a/charts/ingress-nginx/changelog/helm-chart-4.7.0.md
+++ b/charts/ingress-nginx/changelog/helm-chart-4.7.0.md
@@ -6,7 +6,7 @@ This file documents all notable changes to [ingress-nginx](https://github.com/ku
* helm: Fix opentelemetry module installation for daemonset (#9792)
* Update charts/* to keep project name display aligned (#9931)
-* HPA: Use capabilites & align manifests. (#9521)
+* HPA: Use capabilities & align manifests. (#9521)
* PodDisruptionBudget spec logic update (#9904)
* add option for annotations in PodDisruptionBudget (#9843)
* Update Ingress-Nginx version controller-v1.8.0
diff --git a/cmd/plugin/request/request.go b/cmd/plugin/request/request.go
index 55df85d5e..57b02827e 100644
--- a/cmd/plugin/request/request.go
+++ b/cmd/plugin/request/request.go
@@ -131,7 +131,7 @@ func GetIngressDefinitions(flags *genericclioptions.ConfigFlags, namespace strin
return pods.Items, nil
}
-// GetNumEndpoints counts the number of endpointslices adresses for the service with the given name
+// GetNumEndpoints counts the number of endpointslices addresses for the service with the given name
func GetNumEndpoints(flags *genericclioptions.ConfigFlags, namespace, serviceName string) (*int, error) {
epss, err := GetEndpointSlicesByName(flags, namespace, serviceName)
if err != nil {
diff --git a/docs/e2e-tests.md b/docs/e2e-tests.md
index c7f8259a2..6dcf4e9f0 100644
--- a/docs/e2e-tests.md
+++ b/docs/e2e-tests.md
@@ -291,7 +291,7 @@ Do not try to edit it manually.
### [[Shutdown] Grace period shutdown](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/gracefulshutdown/grace_period.go#L32)
- [/healthz should return status code 500 during shutdown grace period](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/gracefulshutdown/grace_period.go#L35)
### [[Shutdown] ingress controller](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/gracefulshutdown/shutdown.go#L30)
-- [should shutdown in less than 60 secons without pending connections](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/gracefulshutdown/shutdown.go#L40)
+- [should shutdown in less than 60 seconds without pending connections](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/gracefulshutdown/shutdown.go#L40)
### [[Shutdown] Graceful shutdown with pending request](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/gracefulshutdown/slow_requests.go#L25)
- [should let slow requests finish before shutting down](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/gracefulshutdown/slow_requests.go#L33)
### [[Ingress] DeepInspection](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/ingress/deep_inspection.go#L27)
diff --git a/docs/examples/index.md b/docs/examples/index.md
index 59745e014..4efdae39f 100644
--- a/docs/examples/index.md
+++ b/docs/examples/index.md
@@ -23,7 +23,7 @@ Customization | [External authentication with response header propagation](custo
Customization | [Sysctl tuning](customization/sysctl/README.md) | TODO | TODO
Features | [Rewrite](rewrite/README.md) | TODO | TODO
Features | [Session stickiness](affinity/cookie/README.md) | route requests consistently to the same endpoint | Advanced
-Features | [Canary Deployments](canary/README.md) | weighted canary routing to a seperate deployment | Intermediate
+Features | [Canary Deployments](canary/README.md) | weighted canary routing to a separate deployment | Intermediate
Scaling | [Static IP](static-ip/README.md) | a single ingress gets a single static IP | Intermediate
TLS | [Multi TLS certificate termination](multi-tls/README.md) | TODO | TODO
TLS | [TLS termination](tls-termination/README.md) | TODO | TODO
diff --git a/docs/examples/openpolicyagent/README.md b/docs/examples/openpolicyagent/README.md
index 2d653a90c..8d6337a38 100644
--- a/docs/examples/openpolicyagent/README.md
+++ b/docs/examples/openpolicyagent/README.md
@@ -1,25 +1,25 @@
# OpenPolicyAgent and pathType enforcing
-Ingress API allows users to specify different [pathType](https://kubernetes.io/docs/concepts/services-networking/ingress/#path-types)
-on Ingress object.
+Ingress API allows users to specify different [pathType](https://kubernetes.io/docs/concepts/services-networking/ingress/#path-types)
+on Ingress object.
While pathType `Exact` and `Prefix` should allow only a small set of characters, pathType `ImplementationSpecific`
-allows any characters, as it may contain regexes, variables and other features that may be specific of the Ingress
+allows any characters, as it may contain regexes, variables and other features that may be specific of the Ingress
Controller being used.
-This means that the Ingress Admins (the persona who deployed the Ingress Controller) should trust the users
-allowed to use `pathType: ImplementationSpecific`, as this may allow arbitrary configuration, and this
+This means that the Ingress Admins (the persona who deployed the Ingress Controller) should trust the users
+allowed to use `pathType: ImplementationSpecific`, as this may allow arbitrary configuration, and this
configuration may end on the proxy (aka Nginx) configuration.
## Example
-The example in this repo uses [Gatekeeper](https://open-policy-agent.github.io/gatekeeper/website/) to block the usage of `pathType: ImplementationSpecific`,
+The example in this repo uses [Gatekeeper](https://open-policy-agent.github.io/gatekeeper/website/) to block the usage of `pathType: ImplementationSpecific`,
allowing just a specific list of namespaces to use it.
It is recommended that the admin modifies this rules to enforce a specific set of characters when the usage of ImplementationSpecific
is allowed, or in ways that best suits their needs.
-First, the `ConstraintTemplate` from [template.yaml](template.yaml) will define a rule that validates if the Ingress object
-is being created on an excempted namespace, and case not, will validate its pathType.
+First, the `ConstraintTemplate` from [template.yaml](template.yaml) will define a rule that validates if the Ingress object
+is being created on an exempted namespace, and case not, will validate its pathType.
-Then, the rule `K8sBlockIngressPathType` contained in [rule.yaml](rule.yaml) will define the parameters: what kind of
-object should be verified (Ingress), what are the excempted namespaces, and what kinds of pathType are blocked.
+Then, the rule `K8sBlockIngressPathType` contained in [rule.yaml](rule.yaml) will define the parameters: what kind of
+object should be verified (Ingress), what are the exempted namespaces, and what kinds of pathType are blocked.
diff --git a/docs/examples/openpolicyagent/template.yaml b/docs/examples/openpolicyagent/template.yaml
index ed2a6ba1c..4302415a2 100644
--- a/docs/examples/openpolicyagent/template.yaml
+++ b/docs/examples/openpolicyagent/template.yaml
@@ -17,11 +17,11 @@ spec:
properties:
blockedTypes:
type: array
- items:
- type: string
+ items:
+ type: string
namespacesExceptions:
type: array
- items:
+ items:
type: string
targets:
- target: admission.k8s.gatekeeper.sh
@@ -31,8 +31,8 @@ spec:
violation[{"msg": msg}] {
input.review.kind.kind == "Ingress"
ns := input.review.object.metadata.namespace
- excemptNS := [good | excempts = input.parameters.namespacesExceptions[_] ; good = excempts == ns]
- not any(excemptNS)
+ exemptNS := [good | exempts = input.parameters.namespacesExceptions[_] ; good = exempts == ns]
+ not any(exemptNS)
pathType := object.get(input.review.object.spec.rules[_].http.paths[_], "pathType", "")
blockedPath := [blocked | blockedTypes = input.parameters.blockedTypes[_] ; blocked = blockedTypes == pathType]
any(blockedPath)
diff --git a/docs/user-guide/third-party-addons/opentelemetry.md b/docs/user-guide/third-party-addons/opentelemetry.md
index 4d71ff675..d2cf56bf5 100644
--- a/docs/user-guide/third-party-addons/opentelemetry.md
+++ b/docs/user-guide/third-party-addons/opentelemetry.md
@@ -65,7 +65,7 @@ otel-max-queuesize
# The delay interval in milliseconds between two consecutive exports.
otel-schedule-delay-millis
-
+
# How long the export can run before it is cancelled.
otel-schedule-delay-millis
@@ -112,7 +112,7 @@ graph TB
end
subgraph otel
- otc["Otel Collector"]
+ otc["Otel Collector"]
end
subgraph observability
@@ -190,7 +190,7 @@ To install the example and collectors run:
helm repo add open-telemetry https://open-telemetry.github.io/opentelemetry-helm-charts
helm repo add grafana https://grafana.github.io/helm-charts
helm repo update
- # deply cert-manager needed for OpenTelemetry collector operator
+ # deploy cert-manager needed for OpenTelemetry collector operator
kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.9.1/cert-manager.yaml
# create observability namespace
kubectl apply -f https://raw.githubusercontent.com/esigo/nginx-example/main/observability/namespace.yaml
diff --git a/images/kube-webhook-certgen/rootfs/pkg/k8s/k8s_test.go b/images/kube-webhook-certgen/rootfs/pkg/k8s/k8s_test.go
index f11bef981..b326697b6 100644
--- a/images/kube-webhook-certgen/rootfs/pkg/k8s/k8s_test.go
+++ b/images/kube-webhook-certgen/rootfs/pkg/k8s/k8s_test.go
@@ -186,7 +186,7 @@ func Test_Patching_objects(t *testing.T) {
})
// This is to preserve old behavior and log format, it could be improved.
- t.Run("diffent_non_empty_names_are_specified_for_validating_and_mutating_webhook", func(t *testing.T) {
+ t.Run("different_non_empty_names_are_specified_for_validating_and_mutating_webhook", func(t *testing.T) {
t.Parallel()
k := testK8sWithUnpatchedObjects()
diff --git a/internal/admission/controller/server.go b/internal/admission/controller/server.go
index 7fc61bcbb..74f55fd01 100644
--- a/internal/admission/controller/server.go
+++ b/internal/admission/controller/server.go
@@ -47,7 +47,7 @@ type AdmissionControllerServer struct {
AdmissionController AdmissionController
}
-// NewAdmissionControllerServer instanciates an admission controller server with
+// NewAdmissionControllerServer instantiates an admission controller server with
// a default codec
func NewAdmissionControllerServer(ac AdmissionController) *AdmissionControllerServer {
return &AdmissionControllerServer{
diff --git a/internal/ingress/annotations/loadbalancing/main.go b/internal/ingress/annotations/loadbalancing/main.go
index ee89d2c1b..0e5ca8bd8 100644
--- a/internal/ingress/annotations/loadbalancing/main.go
+++ b/internal/ingress/annotations/loadbalancing/main.go
@@ -23,22 +23,22 @@ import (
"k8s.io/ingress-nginx/internal/ingress/resolver"
)
-// LB Alghorithms are defined in https://github.com/kubernetes/ingress-nginx/blob/d3e75b056f77be54e01bdb18675f1bb46caece31/rootfs/etc/nginx/lua/balancer.lua#L28
+// LB Algorithms are defined in https://github.com/kubernetes/ingress-nginx/blob/d3e75b056f77be54e01bdb18675f1bb46caece31/rootfs/etc/nginx/lua/balancer.lua#L28
const (
- loadBalanceAlghoritmAnnotation = "load-balance"
+ loadBalanceAlgorithmAnnotation = "load-balance"
)
-var loadBalanceAlghoritms = []string{"round_robin", "chash", "chashsubset", "sticky_balanced", "sticky_persistent", "ewma"}
+var loadBalanceAlgorithms = []string{"round_robin", "chash", "chashsubset", "sticky_balanced", "sticky_persistent", "ewma"}
var loadBalanceAnnotations = parser.Annotation{
Group: "backend",
Annotations: parser.AnnotationFields{
- loadBalanceAlghoritmAnnotation: {
- Validator: parser.ValidateOptions(loadBalanceAlghoritms, true, true),
+ loadBalanceAlgorithmAnnotation: {
+ Validator: parser.ValidateOptions(loadBalanceAlgorithms, true, true),
Scope: parser.AnnotationScopeLocation,
Risk: parser.AnnotationRiskLow,
- Documentation: `This annotation allows setting the load balancing alghorithm that should be used. If none is specified, defaults to
+ Documentation: `This annotation allows setting the load balancing algorithm that should be used. If none is specified, defaults to
the default configured by Ingress admin, otherwise to round_robin`,
},
},
@@ -61,7 +61,7 @@ func NewParser(r resolver.Resolver) parser.IngressAnnotation {
// used to indicate if the location/s contains a fragment of
// configuration to be included inside the paths of the rules
func (a loadbalancing) Parse(ing *networking.Ingress) (interface{}, error) {
- return parser.GetStringAnnotation(loadBalanceAlghoritmAnnotation, ing, a.annotationConfig.Annotations)
+ return parser.GetStringAnnotation(loadBalanceAlgorithmAnnotation, ing, a.annotationConfig.Annotations)
}
func (a loadbalancing) GetDocumentation() parser.AnnotationFields {
diff --git a/internal/ingress/annotations/mirror/main_test.go b/internal/ingress/annotations/mirror/main_test.go
index 1f6b44d61..805f1ef6d 100644
--- a/internal/ingress/annotations/mirror/main_test.go
+++ b/internal/ingress/annotations/mirror/main_test.go
@@ -90,7 +90,7 @@ func TestParse(t *testing.T) {
Target: "http://some.test.env.com:2121/$someparam=1&$someotherparam=2",
Host: "some.test.env.com",
}},
- {map[string]string{backendURL: "http://some.test.env.com", host: "someInvalidParm.%^&*()_=!@#'\""}, &Config{
+ {map[string]string{backendURL: "http://some.test.env.com", host: "someInvalidParam.%^&*()_=!@#'\""}, &Config{
Source: ngxURI,
RequestBody: "on",
Target: "http://some.test.env.com",
diff --git a/internal/ingress/annotations/serversnippet/main.go b/internal/ingress/annotations/serversnippet/main.go
index aa15608d0..bce764e69 100644
--- a/internal/ingress/annotations/serversnippet/main.go
+++ b/internal/ingress/annotations/serversnippet/main.go
@@ -33,7 +33,7 @@ var serverSnippetAnnotations = parser.Annotation{
serverSnippetAnnotation: {
Validator: parser.ValidateNull,
Scope: parser.AnnotationScopeIngress,
- Risk: parser.AnnotationRiskCritical, // Critical, this annotation is not validated at all and allows arbitrary configutations
+ Risk: parser.AnnotationRiskCritical, // Critical, this annotation is not validated at all and allows arbitrary configurations
Documentation: `This annotation allows setting a custom NGINX configuration on a server block. This annotation does not contain any validation and it's usage is not recommended!`,
},
},
diff --git a/internal/ingress/annotations/serviceupstream/main.go b/internal/ingress/annotations/serviceupstream/main.go
index d1851bc7b..7819d87d8 100644
--- a/internal/ingress/annotations/serviceupstream/main.go
+++ b/internal/ingress/annotations/serviceupstream/main.go
@@ -34,7 +34,7 @@ var serviceUpstreamAnnotations = parser.Annotation{
serviceUpstreamAnnotation: {
Validator: parser.ValidateBool,
Scope: parser.AnnotationScopeIngress,
- Risk: parser.AnnotationRiskLow, // Critical, this annotation is not validated at all and allows arbitrary configutations
+ Risk: parser.AnnotationRiskLow, // Critical, this annotation is not validated at all and allows arbitrary configurations
Documentation: `This annotation makes NGINX use Service's Cluster IP and Port instead of Endpoints as the backend endpoints`,
},
},
diff --git a/internal/ingress/annotations/snippet/main.go b/internal/ingress/annotations/snippet/main.go
index 2406093c5..c2df84cdd 100644
--- a/internal/ingress/annotations/snippet/main.go
+++ b/internal/ingress/annotations/snippet/main.go
@@ -33,7 +33,7 @@ var configurationSnippetAnnotations = parser.Annotation{
configurationSnippetAnnotation: {
Validator: parser.ValidateNull,
Scope: parser.AnnotationScopeLocation,
- Risk: parser.AnnotationRiskCritical, // Critical, this annotation is not validated at all and allows arbitrary configutations
+ Risk: parser.AnnotationRiskCritical, // Critical, this annotation is not validated at all and allows arbitrary configurations
Documentation: `This annotation allows setting a custom NGINX configuration on a location block. This annotation does not contain any validation and it's usage is not recommended!`,
},
},
diff --git a/internal/ingress/annotations/streamsnippet/main.go b/internal/ingress/annotations/streamsnippet/main.go
index 71ff3b140..7743d3fee 100644
--- a/internal/ingress/annotations/streamsnippet/main.go
+++ b/internal/ingress/annotations/streamsnippet/main.go
@@ -33,7 +33,7 @@ var streamSnippetAnnotations = parser.Annotation{
streamSnippetAnnotation: {
Validator: parser.ValidateNull,
Scope: parser.AnnotationScopeIngress,
- Risk: parser.AnnotationRiskCritical, // Critical, this annotation is not validated at all and allows arbitrary configutations
+ Risk: parser.AnnotationRiskCritical, // Critical, this annotation is not validated at all and allows arbitrary configurations
Documentation: `This annotation allows setting a custom NGINX configuration on a stream block. This annotation does not contain any validation and it's usage is not recommended!`,
},
},
diff --git a/internal/ingress/controller/config/config.go b/internal/ingress/controller/config/config.go
index 9b36667c1..a0275697f 100644
--- a/internal/ingress/controller/config/config.go
+++ b/internal/ingress/controller/config/config.go
@@ -119,7 +119,7 @@ type Configuration struct {
// By default this is disabled
AllowBackendServerHeader bool `json:"allow-backend-server-header"`
- // AccessLogParams sets additionals params for access_log
+ // AccessLogParams sets additional params for access_log
// http://nginx.org/en/docs/http/ngx_http_log_module.html#access_log
// By default it's empty
AccessLogParams string `json:"access-log-params,omitempty"`
@@ -418,7 +418,7 @@ type Configuration struct {
// Example '60s'
ProxyProtocolHeaderTimeout time.Duration `json:"proxy-protocol-header-timeout,omitempty"`
- // Enables or disables the directive aio_write that writes files files asynchronously
+ // Enables or disables the directive aio_write that writes files asynchronously
// https://nginx.org/en/docs/http/ngx_http_core_module.html#aio_write
EnableAioWrite bool `json:"enable-aio-write,omitempty"`
@@ -612,7 +612,7 @@ type Configuration struct {
// Default: 0.01
OtelSamplerRatio float32 `json:"otel-sampler-ratio"`
- // OtelSamplerParentBased specifies the parent based sampler to be use for any traces created
+ // OtelSamplerParentBased specifies the parent based sampler to be used for any traces created
// Default: true
OtelSamplerParentBased bool `json:"otel-sampler-parent-based"`
@@ -709,7 +709,7 @@ type Configuration struct {
DefaultSSLCertificate *ingress.SSLCert `json:"-"`
// ProxySSLLocationOnly controls whether the proxy-ssl parameters defined in the
- // proxy-ssl-* annotations are applied on on location level only in the nginx.conf file
+ // proxy-ssl-* annotations are applied on location level only in the nginx.conf file
// Default is that those are applied on server level, too
ProxySSLLocationOnly bool `json:"proxy-ssl-location-only"`
diff --git a/internal/ingress/controller/endpointslices.go b/internal/ingress/controller/endpointslices.go
index 4f98e3ce7..ed46e2c85 100644
--- a/internal/ingress/controller/endpointslices.go
+++ b/internal/ingress/controller/endpointslices.go
@@ -115,7 +115,7 @@ func getEndpointsFromSlices(s *corev1.Service, port *corev1.ServicePort, proto c
useTopologyHints = false
if zoneForHints != emptyZone {
useTopologyHints = true
- // check if all endpointslices has zone hints
+ // check if all endpointslices have zone hints
for _, ep := range eps.Endpoints {
if ep.Hints == nil || len(ep.Hints.ForZones) == 0 {
useTopologyHints = false
diff --git a/internal/ingress/controller/nginx_test.go b/internal/ingress/controller/nginx_test.go
index 27180e066..7b00916c7 100644
--- a/internal/ingress/controller/nginx_test.go
+++ b/internal/ingress/controller/nginx_test.go
@@ -410,7 +410,7 @@ func TestCleanTempNginxCfg(t *testing.T) {
}
}
-//nolint:unparam // Ingnore `network` always receives `"tcp"` error
+//nolint:unparam // Ignore `network` always receives `"tcp"` error
func tryListen(network, address string) (l net.Listener, err error) {
condFunc := func() (bool, error) {
l, err = net.Listen(network, address)
diff --git a/internal/ingress/controller/store/endpointslice_test.go b/internal/ingress/controller/store/endpointslice_test.go
index 5d423a3a6..0bdb3aa33 100644
--- a/internal/ingress/controller/store/endpointslice_test.go
+++ b/internal/ingress/controller/store/endpointslice_test.go
@@ -88,7 +88,7 @@ func TestEndpointSliceLister(t *testing.T) {
}
eps, err := el.MatchByKey(key)
if err != nil {
- t.Errorf("unexpeted error %v", err)
+ t.Errorf("unexpected error %v", err)
}
if err == nil && len(eps) != 1 {
t.Errorf("expected one slice %v, error, got %d slices", endpointSlice, len(eps))
@@ -130,7 +130,7 @@ func TestEndpointSliceLister(t *testing.T) {
}
eps, err := el.MatchByKey(key)
if err != nil {
- t.Errorf("unexpeted error %v", err)
+ t.Errorf("unexpected error %v", err)
}
if len(eps) != 1 {
t.Errorf("expected one slice %v, error, got %d slices", endpointSlice, len(eps))
diff --git a/internal/ingress/controller/store/store_test.go b/internal/ingress/controller/store/store_test.go
index 317c0f36c..9c719af3b 100644
--- a/internal/ingress/controller/store/store_test.go
+++ b/internal/ingress/controller/store/store_test.go
@@ -1208,13 +1208,13 @@ func TestStore(t *testing.T) {
}
}(updateCh)
- namesapceSelector, err := labels.Parse("foo=bar")
+ namespaceSelector, err := labels.Parse("foo=bar")
if err != nil {
t.Errorf("unexpected error: %v", err)
}
storer := New(
ns,
- namesapceSelector,
+ namespaceSelector,
fmt.Sprintf("%v/config", ns),
fmt.Sprintf("%v/tcp", ns),
fmt.Sprintf("%v/udp", ns),
@@ -1274,7 +1274,7 @@ func TestStore(t *testing.T) {
t.Errorf("expected 0 events of type Delete but %v occurred", del)
}
})
- // test add ingress with secret it doesn't exists and then add secret
+ // test add ingress with secret it doesn't exist and then add secret
// check secret is generated on fs
// check ocsp
// check invalid secret (missing crt)
diff --git a/internal/ingress/controller/util.go b/internal/ingress/controller/util.go
index 8851f323f..79bf931ef 100644
--- a/internal/ingress/controller/util.go
+++ b/internal/ingress/controller/util.go
@@ -129,7 +129,7 @@ func NewNginxCommand() NginxCommand {
return command
}
-// ExecCommand instanciates an exec.Cmd object to call nginx program
+// ExecCommand instantiates an exec.Cmd object to call nginx program
func (nc NginxCommand) ExecCommand(args ...string) *exec.Cmd {
cmdArgs := []string{}
diff --git a/internal/ingress/metric/collectors/controller.go b/internal/ingress/metric/collectors/controller.go
index 4ee84bc56..697b57ca8 100644
--- a/internal/ingress/metric/collectors/controller.go
+++ b/internal/ingress/metric/collectors/controller.go
@@ -225,7 +225,7 @@ func (cm *Controller) IncCheckErrorCount(namespace, name string) {
cm.checkIngressOperationErrors.MustCurryWith(cm.constLabels).With(labels).Inc()
}
-// IncOrphanIngress sets the the orphaned ingress gauge to one
+// IncOrphanIngress sets the orphaned ingress gauge to one
func (cm *Controller) IncOrphanIngress(namespace, name, orphanityType string) {
labels := prometheus.Labels{
"namespace": namespace,
@@ -235,7 +235,7 @@ func (cm *Controller) IncOrphanIngress(namespace, name, orphanityType string) {
cm.OrphanIngress.MustCurryWith(cm.constLabels).With(labels).Set(1.0)
}
-// DecOrphanIngress sets the the orphaned ingress gauge to zero (all services has their endpoints)
+// DecOrphanIngress sets the orphaned ingress gauge to zero (all services has their endpoints)
func (cm *Controller) DecOrphanIngress(namespace, name, orphanityType string) {
labels := prometheus.Labels{
"namespace": namespace,
@@ -311,7 +311,7 @@ func (cm *Controller) SetSSLExpireTime(servers []*ingress.Server) {
}
}
-// SetSSLInfo creates a metric with all certificates informations
+// SetSSLInfo creates a metric with all certificate information
func (cm *Controller) SetSSLInfo(servers []*ingress.Server) {
for _, s := range servers {
if s.SSLCert == nil || s.SSLCert.Certificate == nil || s.SSLCert.Certificate.SerialNumber == nil {
diff --git a/internal/ingress/resolver/main.go b/internal/ingress/resolver/main.go
index 7d17f4e16..259f44e49 100644
--- a/internal/ingress/resolver/main.go
+++ b/internal/ingress/resolver/main.go
@@ -29,10 +29,10 @@ type Resolver interface {
// GetSecurityConfiguration returns the configuration options from Ingress
GetSecurityConfiguration() defaults.SecurityConfiguration
- // GetConfigMap searches for configmap containing the namespace and name usting the character /
+ // GetConfigMap searches for configmap containing the namespace and name using the character /
GetConfigMap(string) (*apiv1.ConfigMap, error)
- // GetSecret searches for secrets containing the namespace and name using a the character /
+ // GetSecret searches for secrets containing the namespace and name using the character /
GetSecret(string) (*apiv1.Secret, error)
// GetAuthCertificate resolves a given secret name into an SSL certificate and CRL.
@@ -42,7 +42,7 @@ type Resolver interface {
// ca.crl: contains the revocation list used for authentication
GetAuthCertificate(string) (*AuthSSLCert, error)
- // GetService searches for services containing the namespace and name using a the character /
+ // GetService searches for services containing the namespace and name using the character /
GetService(string) (*apiv1.Service, error)
}
diff --git a/internal/ingress/resolver/mock.go b/internal/ingress/resolver/mock.go
index 5a36155e9..3abfe7eda 100644
--- a/internal/ingress/resolver/mock.go
+++ b/internal/ingress/resolver/mock.go
@@ -47,7 +47,7 @@ func (m Mock) GetSecurityConfiguration() defaults.SecurityConfiguration {
}
}
-// GetSecret searches for secrets contenating the namespace and name using a the character /
+// GetSecret searches for secrets containing the namespace and name using the character /
func (m Mock) GetSecret(string) (*apiv1.Secret, error) {
return nil, nil
}
@@ -60,12 +60,12 @@ func (m Mock) GetAuthCertificate(string) (*AuthSSLCert, error) {
return nil, nil
}
-// GetService searches for services contenating the namespace and name using a the character /
+// GetService searches for services containing the namespace and name using the character /
func (m Mock) GetService(string) (*apiv1.Service, error) {
return nil, nil
}
-// GetConfigMap searches for configMaps contenating the namespace and name using a the character /
+// GetConfigMap searches for configMaps containing the namespace and name using the character /
func (m Mock) GetConfigMap(name string) (*apiv1.ConfigMap, error) {
if v, ok := m.ConfigMaps[name]; ok {
return v, nil
diff --git a/internal/net/ssl/ssl.go b/internal/net/ssl/ssl.go
index f8bac2377..0592303bc 100644
--- a/internal/net/ssl/ssl.go
+++ b/internal/net/ssl/ssl.go
@@ -442,7 +442,7 @@ func getFakeHostSSLCert(host string) (cert, key []byte) {
// fullChainCert checks if a certificate file contains issues in the intermediate CA chain
// Returns a new certificate with the intermediate certificates.
-// If the certificate does not contains issues with the chain it return an empty byte array
+// If the certificate does not contain issues with the chain it returns an empty byte array
func fullChainCert(in []byte) ([]byte, error) {
cert, err := certUtil.DecodeCertificate(in)
if err != nil {
@@ -523,7 +523,7 @@ func (tl *TLSListener) GetCertificate(*tls.ClientHelloInfo) (*tls.Certificate, e
return tl.certificate, tl.err
}
-// TLSConfig instanciates a TLS configuration, always providing an up to date certificate
+// TLSConfig instantiates a TLS configuration, always providing an up to date certificate
func (tl *TLSListener) TLSConfig() *tls.Config {
return &tls.Config{
GetCertificate: tl.GetCertificate,
diff --git a/pkg/apis/ingress/types.go b/pkg/apis/ingress/types.go
index 9370333c1..ccdd49fe9 100644
--- a/pkg/apis/ingress/types.go
+++ b/pkg/apis/ingress/types.go
@@ -198,10 +198,10 @@ type Server struct {
Aliases []string `json:"aliases,omitempty"`
// RedirectFromToWWW returns if a redirect to/from prefix www is required
RedirectFromToWWW bool `json:"redirectFromToWWW,omitempty"`
- // CertificateAuth indicates the this server requires mutual authentication
+ // CertificateAuth indicates this server requires mutual authentication
// +optional
CertificateAuth authtls.Config `json:"certificateAuth"`
- // ProxySSL indicates the this server uses client certificate to access backends
+ // ProxySSL indicates this server uses client certificate to access backends
// +optional
ProxySSL proxyssl.Config `json:"proxySSL"`
// ServerSnippet returns the snippet of server
@@ -219,7 +219,7 @@ type Server struct {
// Location describes an URI inside a server.
// Also contains additional information about annotations in the Ingress.
//
-// In some cases when more than one annotations is defined a particular order in the execution
+// In some cases when more than one annotation is defined a particular order in the execution
// is required.
// The chain in the execution order of annotations should be:
// - Denylist
@@ -342,7 +342,7 @@ type Location struct {
// CustomHTTPErrors specifies the error codes that should be intercepted.
// +optional
CustomHTTPErrors []int `json:"custom-http-errors"`
- // ProxyInterceptErrors disables error intecepting when using CustomHTTPErrors
+ // ProxyInterceptErrors disables error interception when using CustomHTTPErrors
// e.g. custom 404 and 503 when service-a does not exist or is not available
// but service-a can return 404 and 503 error codes without intercept
// +optional
diff --git a/rootfs/etc/nginx/lua/test/balancer/sticky_test.lua b/rootfs/etc/nginx/lua/test/balancer/sticky_test.lua
index 80d0c0d0e..70723143b 100644
--- a/rootfs/etc/nginx/lua/test/balancer/sticky_test.lua
+++ b/rootfs/etc/nginx/lua/test/balancer/sticky_test.lua
@@ -357,7 +357,7 @@ describe("Sticky", function()
for _ = 1, 100 do
local new_upstream = sticky_balancer_instance:balance()
if change_on_failure == false then
- -- upstream should be the same inspite of error, if change_on_failure option is false
+ -- upstream should be the same in spite of error, if change_on_failure option is false
assert.equal(new_upstream, old_upstream)
else
-- upstream should change after error, if change_on_failure option is true
diff --git a/test/e2e/endpointslices/topology.go b/test/e2e/endpointslices/topology.go
index 38c5f8b76..70f7ff86b 100644
--- a/test/e2e/endpointslices/topology.go
+++ b/test/e2e/endpointslices/topology.go
@@ -84,7 +84,7 @@ var _ = framework.IngressNginxDescribeSerial("[TopologyHints] topology aware rou
}
if gotHints {
- // we have 2 replics, if there is just one backend it means that we are routing according slices hints to same zone as controller is
+ // we have 2 replicas, if there is just one backend it means that we are routing according slices hints to same zone as controller is
assert.Equal(ginkgo.GinkgoT(), 1, gotBackends)
} else {
// two replicas should have two endpoints without topology hints
diff --git a/test/e2e/framework/deployment.go b/test/e2e/framework/deployment.go
index 08a5353b2..9eaf42565 100644
--- a/test/e2e/framework/deployment.go
+++ b/test/e2e/framework/deployment.go
@@ -43,7 +43,7 @@ const HTTPBunService = "httpbun"
// NipService name of external service using nip.io
const NIPService = "external-nip"
-// HTTPBunImage is the default image that is used to deploy HTTPBun with the framwork
+// HTTPBunImage is the default image that is used to deploy HTTPBun with the framework
var HTTPBunImage = os.Getenv("HTTPBUN_IMAGE")
// EchoImage is the default image to be used by the echo service
diff --git a/test/e2e/framework/framework.go b/test/e2e/framework/framework.go
index 6e62a1df3..103d8d593 100644
--- a/test/e2e/framework/framework.go
+++ b/test/e2e/framework/framework.go
@@ -100,7 +100,7 @@ func NewDefaultFramework(baseName string, opts ...func(*Framework)) *Framework {
}
// NewSimpleFramework makes a new framework that allows the usage of a namespace
-// for arbitraty tests.
+// for arbitrary tests.
func NewSimpleFramework(baseName string, opts ...func(*Framework)) *Framework {
defer ginkgo.GinkgoRecover()
diff --git a/test/e2e/gracefulshutdown/shutdown.go b/test/e2e/gracefulshutdown/shutdown.go
index 604143da8..e9883338f 100644
--- a/test/e2e/gracefulshutdown/shutdown.go
+++ b/test/e2e/gracefulshutdown/shutdown.go
@@ -37,7 +37,7 @@ var _ = framework.IngressNginxDescribe("[Shutdown] ingress controller", func() {
f.NewSlowEchoDeployment()
})
- ginkgo.It("should shutdown in less than 60 secons without pending connections", func() {
+ ginkgo.It("should shutdown in less than 60 seconds without pending connections", func() {
f.EnsureIngress(framework.NewSingleIngress(host, "/", host, f.Namespace, framework.SlowEchoService, 80, nil))
f.WaitForNginxServer(host,
diff --git a/test/e2e/settings/global_external_auth.go b/test/e2e/settings/global_external_auth.go
index 741e6f955..f589a63e9 100644
--- a/test/e2e/settings/global_external_auth.go
+++ b/test/e2e/settings/global_external_auth.go
@@ -32,8 +32,8 @@ import (
)
const (
- disable = "false"
- noAuthLocaltionSetting = "no-auth-locations"
+ disable = "false"
+ noAuthLocationSetting = "no-auth-locations"
)
var _ = framework.DescribeSetting("[Security] global-auth-url", func() {
@@ -51,7 +51,7 @@ var _ = framework.DescribeSetting("[Security] global-auth-url", func() {
fooPath := "/foo"
barPath := "/bar"
- noAuthSetting := noAuthLocaltionSetting
+ noAuthSetting := noAuthLocationSetting
noAuthLocations := barPath
enableGlobalExternalAuthAnnotation := "nginx.ingress.kubernetes.io/enable-global-auth"
diff --git a/test/k6/loadtest.js b/test/k6/loadtest.js
index 2396948fc..51801765e 100644
--- a/test/k6/loadtest.js
+++ b/test/k6/loadtest.js
@@ -1,6 +1,6 @@
// This is a loadtest under development
// Test here is spec'd to have 100virtual-users
-// Other specs currently similar to smoktest
+// Other specs currently similar to smoketest
// But loadtest needs testplan that likely uses auth & data-transfer
import http from 'k6/http';
@@ -35,7 +35,7 @@ export default function () {
const req3 = {
params: {
headers: {
- 'Content-Type': 'application/x-www-form-urlencoded'
+ 'Content-Type': 'application/x-www-form-urlencoded'
},
},
method: 'POST',
diff --git a/test/k6/smoketest.js b/test/k6/smoketest.js
index 8fe9e950a..12691b63a 100644
--- a/test/k6/smoketest.js
+++ b/test/k6/smoketest.js
@@ -1,4 +1,4 @@
-// smotest.js edited after copy/pasting from https://k6.io docs
+// smoketest.js edited after copy/pasting from https://k6.io docs
// Using this like loadtest because of limited cpu/memory/other
import http from 'k6/http';
@@ -22,7 +22,7 @@ export const options = {
};
export default function () {
- // docs of k6 say this is how to adds host header
+ // docs of k6 say this is how to add host header
// needed as ingress is created with this host value
const params = {
headers: {'host': 'test.ingress-nginx-controller.ga'},
@@ -39,7 +39,7 @@ export default function () {
const req3 = {
params: {
headers: {
- 'Content-Type': 'application/json'
+ 'Content-Type': 'application/json'
},
},
method: 'POST',
From 8d0e2ef9f473d49a0766a818401006d155774e66 Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Sat, 7 Sep 2024 20:51:20 +0200
Subject: [PATCH 226/283] Images: Use latest Alpine 3.20 everywhere. (#11944)
---
docs/examples/customization/sysctl/patch.json | 2 +-
images/cfssl/rootfs/Dockerfile | 4 ++--
images/nginx-1.25/rootfs/Dockerfile | 4 ++--
images/nginx/rootfs/Dockerfile | 4 ++--
images/opentelemetry/rootfs/Dockerfile | 2 +-
images/test-runner/rootfs/Dockerfile | 2 +-
rootfs/Dockerfile-chroot | 2 +-
test/e2e-image/Dockerfile | 2 +-
8 files changed, 11 insertions(+), 11 deletions(-)
diff --git a/docs/examples/customization/sysctl/patch.json b/docs/examples/customization/sysctl/patch.json
index e87c9affa..fb4fc057f 100644
--- a/docs/examples/customization/sysctl/patch.json
+++ b/docs/examples/customization/sysctl/patch.json
@@ -4,7 +4,7 @@
"spec": {
"initContainers": [{
"name": "sysctl",
- "image": "alpine:3.18",
+ "image": "alpine:3.20",
"securityContext": {
"privileged": true
},
diff --git a/images/cfssl/rootfs/Dockerfile b/images/cfssl/rootfs/Dockerfile
index c23f66d49..7f7003f10 100644
--- a/images/cfssl/rootfs/Dockerfile
+++ b/images/cfssl/rootfs/Dockerfile
@@ -12,9 +12,9 @@
# See the License for the specific language governing permissions and
# limitations under the License.
-FROM alpine:3.20.0
+FROM alpine:3.20
-RUN echo "@testing http://nl.alpinelinux.org/alpine/edge/testing" >> /etc/apk/repositories
+RUN echo "@testing https://dl-cdn.alpinelinux.org/alpine/edge/testing" >> /etc/apk/repositories
RUN apk update \
&& apk upgrade && \
apk add --no-cache \
diff --git a/images/nginx-1.25/rootfs/Dockerfile b/images/nginx-1.25/rootfs/Dockerfile
index 13dcec33d..1d2b6b623 100644
--- a/images/nginx-1.25/rootfs/Dockerfile
+++ b/images/nginx-1.25/rootfs/Dockerfile
@@ -11,7 +11,7 @@
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
-FROM alpine:3.20.0 as builder
+FROM alpine:3.20 as builder
COPY . /
@@ -21,7 +21,7 @@ RUN apk update \
&& /build.sh
# Use a multi-stage build
-FROM alpine:3.20.0
+FROM alpine:3.20
ENV PATH=$PATH:/usr/local/luajit/bin:/usr/local/nginx/sbin:/usr/local/nginx/bin
diff --git a/images/nginx/rootfs/Dockerfile b/images/nginx/rootfs/Dockerfile
index f3d61017e..245bb353b 100644
--- a/images/nginx/rootfs/Dockerfile
+++ b/images/nginx/rootfs/Dockerfile
@@ -11,7 +11,7 @@
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
-FROM alpine:3.20.0 as builder
+FROM alpine:3.20 as builder
COPY . /
@@ -21,7 +21,7 @@ RUN apk update \
&& /build.sh
# Use a multi-stage build
-FROM alpine:3.20.0
+FROM alpine:3.20
ENV PATH=$PATH:/usr/local/luajit/bin:/usr/local/nginx/sbin:/usr/local/nginx/bin
diff --git a/images/opentelemetry/rootfs/Dockerfile b/images/opentelemetry/rootfs/Dockerfile
index f67948b86..9f3cb2eae 100644
--- a/images/opentelemetry/rootfs/Dockerfile
+++ b/images/opentelemetry/rootfs/Dockerfile
@@ -13,7 +13,7 @@
# limitations under the License.
-FROM alpine:3.20.0 AS base
+FROM alpine:3.20 AS base
RUN mkdir -p /opt/third_party/install
COPY . /opt/third_party/
diff --git a/images/test-runner/rootfs/Dockerfile b/images/test-runner/rootfs/Dockerfile
index fd664f2e5..7bcc2f25c 100644
--- a/images/test-runner/rootfs/Dockerfile
+++ b/images/test-runner/rootfs/Dockerfile
@@ -48,7 +48,7 @@ RUN mkdir -p "$GOPATH/src" "$GOPATH/bin" && chmod -R 777 "$GOPATH"
COPY --from=etcd /usr/local/bin/etcd /usr/local/bin/etcd
-RUN echo "@testing https://nl.alpinelinux.org/alpine/edge/testing" >> /etc/apk/repositories
+RUN echo "@testing https://dl-cdn.alpinelinux.org/alpine/edge/testing" >> /etc/apk/repositories
RUN apk update && apk upgrade && apk add --no-cache \
bash \
diff --git a/rootfs/Dockerfile-chroot b/rootfs/Dockerfile-chroot
index c06db2252..b719f2fc3 100644
--- a/rootfs/Dockerfile-chroot
+++ b/rootfs/Dockerfile-chroot
@@ -23,7 +23,7 @@ RUN apk update \
&& apk upgrade \
&& /chroot.sh
-FROM alpine:3.20.0
+FROM alpine:3.20
ARG TARGETARCH
ARG VERSION
diff --git a/test/e2e-image/Dockerfile b/test/e2e-image/Dockerfile
index 7bd7c9c1c..5e7417477 100644
--- a/test/e2e-image/Dockerfile
+++ b/test/e2e-image/Dockerfile
@@ -1,7 +1,7 @@
ARG E2E_BASE_IMAGE
FROM ${E2E_BASE_IMAGE} AS BASE
-FROM alpine:3.20.0
+FROM alpine:3.20
RUN apk update \
&& apk upgrade && apk add -U --no-cache \
From 0b98b1783e4b50de4ba82c340dc7a37392720837 Mon Sep 17 00:00:00 2001
From: Long Wu Yuan
Date: Sun, 8 Sep 2024 10:45:20 +0530
Subject: [PATCH 227/283] Docs: Add note about `--watch-namespace`. (#11947)
---
docs/deploy/index.md | 5 ++---
1 file changed, 2 insertions(+), 3 deletions(-)
diff --git a/docs/deploy/index.md b/docs/deploy/index.md
index e298cb27f..ae5458eea 100644
--- a/docs/deploy/index.md
+++ b/docs/deploy/index.md
@@ -266,7 +266,6 @@ In AWS, we use a Network load balancer (NLB) to expose the Ingress-Nginx Control
[Network load balancing on Amazon EKS](https://docs.aws.amazon.com/eks/latest/userguide/network-load-balancing.html)
with [AWS Load Balancer Controller](https://github.com/kubernetes-sigs/aws-load-balancer-controller).
-
##### Network Load Balancer (NLB)
```console
@@ -364,8 +363,8 @@ kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/cont
```console
kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.11.2/deploy/static/provider/scw/deploy.yaml
```
-Refer to the [dedicated tutorial](https://www.scaleway.com/en/docs/tutorials/proxy-protocol-v2-load-balancer/#configuring-proxy-protocol-for-ingress-nginx) in the Scaleway documentation for configuring the proxy protocol for ingress-nginx with the Scaleway load balancer.
+Refer to the [dedicated tutorial](https://www.scaleway.com/en/docs/tutorials/proxy-protocol-v2-load-balancer/#configuring-proxy-protocol-for-ingress-nginx) in the Scaleway documentation for configuring the proxy protocol for ingress-nginx with the Scaleway load balancer.
#### Exoscale
@@ -428,7 +427,7 @@ kubectl exec $POD_NAME -n $POD_NAMESPACE -- /nginx-ingress-controller --version
By default, the controller watches Ingress objects from all namespaces. If you want to change this behavior,
use the flag `--watch-namespace` or check the Helm chart value `controller.scope` to limit the controller to a single
-namespace.
+namespace. Although the use of this flag is not popular, one important fact to note is that the secret containing the default-ssl-certificate needs to also be present in the watched namespace(s).
See also
[“How to easily install multiple instances of the Ingress NGINX controller in the same cluster”](https://kubernetes.github.io/ingress-nginx/#how-to-easily-install-multiple-instances-of-the-ingress-nginx-controller-in-the-same-cluster)
From ee61440780fd62f30e7328aae061894c4d387c7f Mon Sep 17 00:00:00 2001
From: Damien Mehala
Date: Sun, 8 Sep 2024 10:47:20 +0200
Subject: [PATCH 228/283] Images: Bump OpenTelemetry C++ Contrib. (#11629)
---
images/nginx-1.25/rootfs/build.sh | 2 +-
images/opentelemetry/rootfs/build.sh | 4 ++--
2 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/images/nginx-1.25/rootfs/build.sh b/images/nginx-1.25/rootfs/build.sh
index ca636d03a..3baf775fc 100755
--- a/images/nginx-1.25/rootfs/build.sh
+++ b/images/nginx-1.25/rootfs/build.sh
@@ -512,7 +512,7 @@ make
make modules
make install
-export OPENTELEMETRY_CONTRIB_COMMIT=aaa51e2297bcb34297f3c7aa44fa790497d2f7f3
+export OPENTELEMETRY_CONTRIB_COMMIT=e11348bb400d5472bf1da5d6128bead66fa111ff
cd "$BUILD_PATH"
git clone https://github.com/open-telemetry/opentelemetry-cpp-contrib.git opentelemetry-cpp-contrib-${OPENTELEMETRY_CONTRIB_COMMIT}
diff --git a/images/opentelemetry/rootfs/build.sh b/images/opentelemetry/rootfs/build.sh
index 649595a75..6f803fc9f 100755
--- a/images/opentelemetry/rootfs/build.sh
+++ b/images/opentelemetry/rootfs/build.sh
@@ -116,8 +116,8 @@ install_otel()
install_nginx()
{
- # Check for recent changes: https://github.com/open-telemetry/opentelemetry-cpp-contrib/compare/2656a4...main
- export OPENTELEMETRY_CONTRIB_COMMIT=aaa51e2297bcb34297f3c7aa44fa790497d2f7f3
+ # Check for recent changes: https://github.com/open-telemetry/opentelemetry-cpp-contrib/compare/e11348bb400d5472bf1da5d6128bead66fa111ff...main
+ export OPENTELEMETRY_CONTRIB_COMMIT=e11348bb400d5472bf1da5d6128bead66fa111ff
mkdir -p /etc/nginx
cd "$BUILD_PATH"
From 6510535ae0164e48d60d0c3df79bffd35031b3f3 Mon Sep 17 00:00:00 2001
From: Ricardo Katz
Date: Sun, 8 Sep 2024 18:48:12 -0300
Subject: [PATCH 229/283] NGINX: Remove inline Lua from template. (#11806)
---
.github/workflows/ci.yaml | 16 ++
hack/verify-lualint.sh | 9 +-
internal/ingress/controller/nginx.go | 30 +++
.../ingress/controller/template/template.go | 93 +++++----
internal/ingress/controller/util.go | 5 +-
rootfs/etc/nginx/lua/lua_ingress.lua | 12 +-
.../etc/nginx/lua/nginx/ngx_conf_balancer.lua | 2 +
.../lua/nginx/ngx_conf_balancer_tcp_udp.lua | 2 +
.../nginx/lua/nginx/ngx_conf_certificate.lua | 2 +
.../lua/nginx/ngx_conf_configuration.lua | 2 +
.../lua/nginx/ngx_conf_content_tcp_udp.lua | 2 +
.../nginx/lua/nginx/ngx_conf_init_tcp_udp.lua | 2 +
.../ngx_conf_is_dynamic_lb_initialized.lua | 9 +
rootfs/etc/nginx/lua/nginx/ngx_conf_log.lua | 2 +
.../nginx/lua/nginx/ngx_conf_log_block.lua | 11 +
.../nginx/lua/nginx/ngx_conf_rewrite_auth.lua | 1 +
.../lua/nginx/ngx_conf_srv_hdr_filter.lua | 2 +
rootfs/etc/nginx/lua/nginx/ngx_rewrite.lua | 5 +
.../etc/nginx/lua/nginx/ngx_srv_redirect.lua | 24 +++
rootfs/etc/nginx/lua/ngx_conf_init.lua | 53 +++++
rootfs/etc/nginx/lua/ngx_conf_init_stream.lua | 30 +++
rootfs/etc/nginx/lua/ngx_conf_init_worker.lua | 15 ++
rootfs/etc/nginx/lua/util.lua | 4 +
rootfs/etc/nginx/template/nginx.tmpl | 189 ++----------------
test/e2e/annotations/fromtowwwredirect.go | 4 +-
test/e2e/framework/framework.go | 33 +++
test/e2e/lua/dynamic_configuration.go | 7 +-
.../e2e/settings/no_tls_redirect_locations.go | 4 +-
test/e2e/settings/ocsp/ocsp.go | 6 +-
test/e2e/settings/tls.go | 18 +-
30 files changed, 361 insertions(+), 233 deletions(-)
create mode 100644 rootfs/etc/nginx/lua/nginx/ngx_conf_balancer.lua
create mode 100644 rootfs/etc/nginx/lua/nginx/ngx_conf_balancer_tcp_udp.lua
create mode 100644 rootfs/etc/nginx/lua/nginx/ngx_conf_certificate.lua
create mode 100644 rootfs/etc/nginx/lua/nginx/ngx_conf_configuration.lua
create mode 100644 rootfs/etc/nginx/lua/nginx/ngx_conf_content_tcp_udp.lua
create mode 100644 rootfs/etc/nginx/lua/nginx/ngx_conf_init_tcp_udp.lua
create mode 100644 rootfs/etc/nginx/lua/nginx/ngx_conf_is_dynamic_lb_initialized.lua
create mode 100644 rootfs/etc/nginx/lua/nginx/ngx_conf_log.lua
create mode 100644 rootfs/etc/nginx/lua/nginx/ngx_conf_log_block.lua
create mode 100644 rootfs/etc/nginx/lua/nginx/ngx_conf_rewrite_auth.lua
create mode 100644 rootfs/etc/nginx/lua/nginx/ngx_conf_srv_hdr_filter.lua
create mode 100644 rootfs/etc/nginx/lua/nginx/ngx_rewrite.lua
create mode 100644 rootfs/etc/nginx/lua/nginx/ngx_srv_redirect.lua
create mode 100644 rootfs/etc/nginx/lua/ngx_conf_init.lua
create mode 100644 rootfs/etc/nginx/lua/ngx_conf_init_stream.lua
create mode 100644 rootfs/etc/nginx/lua/ngx_conf_init_worker.lua
diff --git a/.github/workflows/ci.yaml b/.github/workflows/ci.yaml
index 05cf9269c..77a03fe7b 100644
--- a/.github/workflows/ci.yaml
+++ b/.github/workflows/ci.yaml
@@ -71,6 +71,22 @@ jobs:
- 'images/nginx-1.25/**'
docs:
- '**/*.md'
+ lua:
+ - '**/*.lua'
+
+ lua-lint:
+ runs-on: ubuntu-latest
+ needs: changes
+ if: |
+ (needs.changes.outputs.lua == 'true') || ${{ github.event.workflow_dispatch.run_e2e == 'true' }}
+ steps:
+ - name: Checkout
+ uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
+
+ - name: Lint Lua
+ uses: lunarmodules/luacheck@v1
+ with:
+ args: --codes --globals lua_ingress --globals configuration --globals balancer --globals monitor --globals certificate --globals tcp_udp_configuration --globals tcp_udp_balancer --no-max-comment-line-length -q rootfs/etc/nginx/lua/
test-go:
runs-on: ubuntu-latest
diff --git a/hack/verify-lualint.sh b/hack/verify-lualint.sh
index 1f6048de0..769d7a6cd 100755
--- a/hack/verify-lualint.sh
+++ b/hack/verify-lualint.sh
@@ -18,6 +18,13 @@ set -o errexit
set -o nounset
set -o pipefail
-luacheck --codes -q rootfs/etc/nginx/lua/
+luacheck --codes --globals lua_ingress \
+ --globals configuration \
+ --globals balancer \
+ --globals monitor \
+ --globals certificate \
+ --globals tcp_udp_configuration \
+ --globals tcp_udp_balancer \
+ --no-max-comment-line-length -q rootfs/etc/nginx/lua/
find rootfs/etc/nginx/lua/ -name "*.lua" -not -path "*/test/*" -exec lj-releng -L -s {} + && echo "lj-releng validation is success!"
diff --git a/internal/ingress/controller/nginx.go b/internal/ingress/controller/nginx.go
index f74b3245e..7d6dcc3fa 100644
--- a/internal/ingress/controller/nginx.go
+++ b/internal/ingress/controller/nginx.go
@@ -690,6 +690,10 @@ func (n *NGINXController) OnUpdate(ingressCfg ingress.Configuration) error {
return err
}
+ err = n.createLuaConfig(&cfg)
+ if err != nil {
+ return err
+ }
err = createOpentelemetryCfg(&cfg)
if err != nil {
return err
@@ -1079,6 +1083,32 @@ func createOpentelemetryCfg(cfg *ngx_config.Configuration) error {
return os.WriteFile(cfg.OpentelemetryConfig, tmplBuf.Bytes(), file.ReadWriteByUser)
}
+func (n *NGINXController) createLuaConfig(cfg *ngx_config.Configuration) error {
+ luaconfigs := &ngx_template.LuaConfig{
+ EnableMetrics: n.cfg.EnableMetrics,
+ ListenPorts: ngx_template.LuaListenPorts{
+ HTTPSPort: strconv.Itoa(n.cfg.ListenPorts.HTTPS),
+ StatusPort: strconv.Itoa(nginx.StatusPort),
+ SSLProxyPort: strconv.Itoa(n.cfg.ListenPorts.SSLProxy),
+ },
+ UseProxyProtocol: cfg.UseProxyProtocol,
+ UseForwardedHeaders: cfg.UseForwardedHeaders,
+ IsSSLPassthroughEnabled: n.cfg.EnableSSLPassthrough,
+ HTTPRedirectCode: cfg.HTTPRedirectCode,
+ EnableOCSP: cfg.EnableOCSP,
+ MonitorBatchMaxSize: n.cfg.MonitorMaxBatchSize,
+ HSTS: cfg.HSTS,
+ HSTSMaxAge: cfg.HSTSMaxAge,
+ HSTSIncludeSubdomains: cfg.HSTSIncludeSubdomains,
+ HSTSPreload: cfg.HSTSPreload,
+ }
+ jsonCfg, err := json.Marshal(luaconfigs)
+ if err != nil {
+ return err
+ }
+ return os.WriteFile(luaCfgPath, jsonCfg, file.ReadWriteByUser)
+}
+
func cleanTempNginxCfg() error {
var files []string
diff --git a/internal/ingress/controller/template/template.go b/internal/ingress/controller/template/template.go
index 42ff7417e..d2c8a05a9 100644
--- a/internal/ingress/controller/template/template.go
+++ b/internal/ingress/controller/template/template.go
@@ -194,6 +194,41 @@ func cleanConf(in, out *bytes.Buffer) error {
}
}
+/* LuaConfig defines the structure that will be written as a config for lua scripts
+The json format should follow what's expected by lua:
+ use_forwarded_headers = %t,
+ use_proxy_protocol = %t,
+ is_ssl_passthrough_enabled = %t,
+ http_redirect_code = %v,
+ listen_ports = { ssl_proxy = "%v", https = "%v" },
+
+ hsts = %t,
+ hsts_max_age = %v,
+ hsts_include_subdomains = %t,
+ hsts_preload = %t,
+*/
+
+type LuaConfig struct {
+ EnableMetrics bool `json:"enable_metrics"`
+ ListenPorts LuaListenPorts `json:"listen_ports"`
+ UseForwardedHeaders bool `json:"use_forwarded_headers"`
+ UseProxyProtocol bool `json:"use_proxy_protocol"`
+ IsSSLPassthroughEnabled bool `json:"is_ssl_passthrough_enabled"`
+ HTTPRedirectCode int `json:"http_redirect_code"`
+ EnableOCSP bool `json:"enable_ocsp"`
+ MonitorBatchMaxSize int `json:"monitor_batch_max_size"`
+ HSTS bool `json:"hsts"`
+ HSTSMaxAge string `json:"hsts_max_age"`
+ HSTSIncludeSubdomains bool `json:"hsts_include_subdomains"`
+ HSTSPreload bool `json:"hsts_preload"`
+}
+
+type LuaListenPorts struct {
+ HTTPSPort string `json:"https"`
+ StatusPort string `json:"status_port"`
+ SSLProxyPort string `json:"ssl_proxy"`
+}
+
// Write populates a buffer using a template with NGINX configuration
// and the servers and upstreams created by Ingress rules
func (t *Template) Write(conf *config.TemplateConfig) ([]byte, error) {
@@ -256,7 +291,6 @@ var funcMap = text_template.FuncMap{
"filterRateLimits": filterRateLimits,
"buildRateLimitZones": buildRateLimitZones,
"buildRateLimit": buildRateLimit,
- "configForLua": configForLua,
"locationConfigForLua": locationConfigForLua,
"buildResolvers": buildResolvers,
"buildUpstreamName": buildUpstreamName,
@@ -383,41 +417,6 @@ func luaConfigurationRequestBodySize(c interface{}) string {
return dictKbToStr(size)
}
-// configForLua returns some general configuration as Lua table represented as string
-func configForLua(input interface{}) string {
- all, ok := input.(config.TemplateConfig)
- if !ok {
- klog.Errorf("expected a 'config.TemplateConfig' type but %T was given", input)
- return "{}"
- }
-
- return fmt.Sprintf(`{
- use_forwarded_headers = %t,
- use_proxy_protocol = %t,
- is_ssl_passthrough_enabled = %t,
- http_redirect_code = %v,
- listen_ports = { ssl_proxy = "%v", https = "%v" },
-
- hsts = %t,
- hsts_max_age = %v,
- hsts_include_subdomains = %t,
- hsts_preload = %t,
-
- }`,
- all.Cfg.UseForwardedHeaders,
- all.Cfg.UseProxyProtocol,
- all.IsSSLPassthroughEnabled,
- all.Cfg.HTTPRedirectCode,
- all.ListenPorts.SSLProxy,
- all.ListenPorts.HTTPS,
-
- all.Cfg.HSTS,
- all.Cfg.HSTSMaxAge,
- all.Cfg.HSTSIncludeSubdomains,
- all.Cfg.HSTSPreload,
- )
-}
-
// locationConfigForLua formats some location specific configuration into Lua table represented as string
func locationConfigForLua(l, a interface{}) string {
location, ok := l.(*ingress.Location)
@@ -432,13 +431,21 @@ func locationConfigForLua(l, a interface{}) string {
return "{}"
}
- return fmt.Sprintf(`{
- force_ssl_redirect = %t,
- ssl_redirect = %t,
- force_no_ssl_redirect = %t,
- preserve_trailing_slash = %t,
- use_port_in_redirects = %t,
- }`,
+ /* Lua expects the following vars
+ force_ssl_redirect = string_to_bool(ngx.var.force_ssl_redirect),
+ ssl_redirect = string_to_bool(ngx.var.ssl_redirect),
+ force_no_ssl_redirect = string_to_bool(ngx.var.force_no_ssl_redirect),
+ preserve_trailing_slash = string_to_bool(ngx.var.preserve_trailing_slash),
+ use_port_in_redirects = string_to_bool(ngx.var.use_port_in_redirects),
+ */
+
+ return fmt.Sprintf(`
+ set $force_ssl_redirect "%t";
+ set $ssl_redirect "%t";
+ set $force_no_ssl_redirect "%t";
+ set $preserve_trailing_slash "%t";
+ set $use_port_in_redirects "%t";
+ `,
location.Rewrite.ForceSSLRedirect,
location.Rewrite.SSLRedirect,
isLocationInLocationList(l, all.Cfg.NoTLSRedirectLocations),
diff --git a/internal/ingress/controller/util.go b/internal/ingress/controller/util.go
index 79bf931ef..975fb822a 100644
--- a/internal/ingress/controller/util.go
+++ b/internal/ingress/controller/util.go
@@ -98,8 +98,9 @@ func rlimitMaxNumFiles() int {
}
const (
- defBinary = "/usr/bin/nginx"
- cfgPath = "/etc/nginx/nginx.conf"
+ defBinary = "/usr/bin/nginx"
+ cfgPath = "/etc/nginx/nginx.conf"
+ luaCfgPath = "/etc/nginx/lua/cfg.json"
)
// NginxExecTester defines the interface to execute
diff --git a/rootfs/etc/nginx/lua/lua_ingress.lua b/rootfs/etc/nginx/lua/lua_ingress.lua
index 65cf5a257..a513928cf 100644
--- a/rootfs/etc/nginx/lua/lua_ingress.lua
+++ b/rootfs/etc/nginx/lua/lua_ingress.lua
@@ -1,4 +1,5 @@
local ngx_re_split = require("ngx.re").split
+local string_to_bool = require("util").string_to_bool
local certificate_configured_for_current_request =
require("certificate").configured_for_current_request
@@ -108,7 +109,16 @@ end
-- rewrite gets called in every location context.
-- This is where we do variable assignments to be used in subsequent
-- phases or redirection
-function _M.rewrite(location_config)
+function _M.rewrite()
+
+ local location_config = {
+ force_ssl_redirect = string_to_bool(ngx.var.force_ssl_redirect),
+ ssl_redirect = string_to_bool(ngx.var.ssl_redirect),
+ force_no_ssl_redirect = string_to_bool(ngx.var.force_no_ssl_redirect),
+ preserve_trailing_slash = string_to_bool(ngx.var.preserve_trailing_slash),
+ use_port_in_redirects = string_to_bool(ngx.var.use_port_in_redirects),
+ }
+
ngx.var.pass_access_scheme = ngx.var.scheme
ngx.var.best_http_host = ngx.var.http_host or ngx.var.host
diff --git a/rootfs/etc/nginx/lua/nginx/ngx_conf_balancer.lua b/rootfs/etc/nginx/lua/nginx/ngx_conf_balancer.lua
new file mode 100644
index 000000000..977d3e964
--- /dev/null
+++ b/rootfs/etc/nginx/lua/nginx/ngx_conf_balancer.lua
@@ -0,0 +1,2 @@
+local balancer = require("balancer")
+balancer.balance()
\ No newline at end of file
diff --git a/rootfs/etc/nginx/lua/nginx/ngx_conf_balancer_tcp_udp.lua b/rootfs/etc/nginx/lua/nginx/ngx_conf_balancer_tcp_udp.lua
new file mode 100644
index 000000000..0442df7d8
--- /dev/null
+++ b/rootfs/etc/nginx/lua/nginx/ngx_conf_balancer_tcp_udp.lua
@@ -0,0 +1,2 @@
+local tcp_udp_balancer = require("tcp_udp_balancer")
+tcp_udp_balancer.balance()
\ No newline at end of file
diff --git a/rootfs/etc/nginx/lua/nginx/ngx_conf_certificate.lua b/rootfs/etc/nginx/lua/nginx/ngx_conf_certificate.lua
new file mode 100644
index 000000000..d33d2171b
--- /dev/null
+++ b/rootfs/etc/nginx/lua/nginx/ngx_conf_certificate.lua
@@ -0,0 +1,2 @@
+local certificate = require("certificate")
+certificate.call()
\ No newline at end of file
diff --git a/rootfs/etc/nginx/lua/nginx/ngx_conf_configuration.lua b/rootfs/etc/nginx/lua/nginx/ngx_conf_configuration.lua
new file mode 100644
index 000000000..7864f40ef
--- /dev/null
+++ b/rootfs/etc/nginx/lua/nginx/ngx_conf_configuration.lua
@@ -0,0 +1,2 @@
+local configuration = require("configuration")
+configuration.call()
\ No newline at end of file
diff --git a/rootfs/etc/nginx/lua/nginx/ngx_conf_content_tcp_udp.lua b/rootfs/etc/nginx/lua/nginx/ngx_conf_content_tcp_udp.lua
new file mode 100644
index 000000000..ed81e7ff3
--- /dev/null
+++ b/rootfs/etc/nginx/lua/nginx/ngx_conf_content_tcp_udp.lua
@@ -0,0 +1,2 @@
+local tcp_udp_configuration = require("tcp_udp_configuration")
+tcp_udp_configuration.call()
\ No newline at end of file
diff --git a/rootfs/etc/nginx/lua/nginx/ngx_conf_init_tcp_udp.lua b/rootfs/etc/nginx/lua/nginx/ngx_conf_init_tcp_udp.lua
new file mode 100644
index 000000000..926ab7a03
--- /dev/null
+++ b/rootfs/etc/nginx/lua/nginx/ngx_conf_init_tcp_udp.lua
@@ -0,0 +1,2 @@
+local tcp_udp_balancer = require("tcp_udp_balancer")
+tcp_udp_balancer.init_worker()
\ No newline at end of file
diff --git a/rootfs/etc/nginx/lua/nginx/ngx_conf_is_dynamic_lb_initialized.lua b/rootfs/etc/nginx/lua/nginx/ngx_conf_is_dynamic_lb_initialized.lua
new file mode 100644
index 000000000..ade3114b1
--- /dev/null
+++ b/rootfs/etc/nginx/lua/nginx/ngx_conf_is_dynamic_lb_initialized.lua
@@ -0,0 +1,9 @@
+local configuration = require("configuration")
+local backend_data = configuration.get_backends_data()
+if not backend_data then
+ ngx.exit(ngx.HTTP_INTERNAL_SERVER_ERROR)
+ return
+end
+
+ngx.say("OK")
+ngx.exit(ngx.HTTP_OK)
\ No newline at end of file
diff --git a/rootfs/etc/nginx/lua/nginx/ngx_conf_log.lua b/rootfs/etc/nginx/lua/nginx/ngx_conf_log.lua
new file mode 100644
index 000000000..8f3d57be6
--- /dev/null
+++ b/rootfs/etc/nginx/lua/nginx/ngx_conf_log.lua
@@ -0,0 +1,2 @@
+local monitor = require("monitor")
+monitor.call()
\ No newline at end of file
diff --git a/rootfs/etc/nginx/lua/nginx/ngx_conf_log_block.lua b/rootfs/etc/nginx/lua/nginx/ngx_conf_log_block.lua
new file mode 100644
index 000000000..72f6a6430
--- /dev/null
+++ b/rootfs/etc/nginx/lua/nginx/ngx_conf_log_block.lua
@@ -0,0 +1,11 @@
+local balancer = require("balancer")
+local monitor = require("monitor")
+
+local luaconfig = ngx.shared.luaconfig
+local enablemetrics = luaconfig:get("enablemetrics")
+
+balancer.log()
+
+if enablemetrics then
+ monitor.call()
+end
\ No newline at end of file
diff --git a/rootfs/etc/nginx/lua/nginx/ngx_conf_rewrite_auth.lua b/rootfs/etc/nginx/lua/nginx/ngx_conf_rewrite_auth.lua
new file mode 100644
index 000000000..0d16faba0
--- /dev/null
+++ b/rootfs/etc/nginx/lua/nginx/ngx_conf_rewrite_auth.lua
@@ -0,0 +1 @@
+ngx.var.cache_key = ngx.encode_base64(ngx.sha1_bin(ngx.var.tmp_cache_key))
\ No newline at end of file
diff --git a/rootfs/etc/nginx/lua/nginx/ngx_conf_srv_hdr_filter.lua b/rootfs/etc/nginx/lua/nginx/ngx_conf_srv_hdr_filter.lua
new file mode 100644
index 000000000..311a9b433
--- /dev/null
+++ b/rootfs/etc/nginx/lua/nginx/ngx_conf_srv_hdr_filter.lua
@@ -0,0 +1,2 @@
+local lua_ingress = require("lua_ingress")
+lua_ingress.header()
\ No newline at end of file
diff --git a/rootfs/etc/nginx/lua/nginx/ngx_rewrite.lua b/rootfs/etc/nginx/lua/nginx/ngx_rewrite.lua
new file mode 100644
index 000000000..66fdd6d55
--- /dev/null
+++ b/rootfs/etc/nginx/lua/nginx/ngx_rewrite.lua
@@ -0,0 +1,5 @@
+local lua_ingress = require("lua_ingress")
+local balancer = require("balancer")
+
+lua_ingress.rewrite()
+balancer.rewrite()
\ No newline at end of file
diff --git a/rootfs/etc/nginx/lua/nginx/ngx_srv_redirect.lua b/rootfs/etc/nginx/lua/nginx/ngx_srv_redirect.lua
new file mode 100644
index 000000000..4b9445d00
--- /dev/null
+++ b/rootfs/etc/nginx/lua/nginx/ngx_srv_redirect.lua
@@ -0,0 +1,24 @@
+local request_uri = ngx.var.request_uri
+local redirect_to = ngx.arg[1]
+
+local luaconfig = ngx.shared.luaconfig
+local use_forwarded_headers = luaconfig:get("use_forwarded_headers")
+
+if string.sub(request_uri, -1) == "/" then
+ request_uri = string.sub(request_uri, 1, -2)
+end
+
+local redirectScheme = ngx.var.scheme
+local redirectPort = ngx.var.server_port
+
+if use_forwarded_headers then
+ if ngx.var.http_x_forwarded_proto then
+ redirectScheme = ngx.var.http_x_forwarded_proto
+ end
+ if ngx.var.http_x_forwarded_port then
+ redirectPort = ngx.var.http_x_forwarded_port
+ end
+end
+
+return string.format("%s://%s:%s%s", redirectScheme,
+ redirect_to, redirectPort, request_uri)
\ No newline at end of file
diff --git a/rootfs/etc/nginx/lua/ngx_conf_init.lua b/rootfs/etc/nginx/lua/ngx_conf_init.lua
new file mode 100644
index 000000000..9789386ac
--- /dev/null
+++ b/rootfs/etc/nginx/lua/ngx_conf_init.lua
@@ -0,0 +1,53 @@
+local cjson = require("cjson.safe")
+
+collectgarbage("collect")
+local f = io.open("/etc/nginx/lua/cfg.json", "r")
+local content = f:read("*a")
+f:close()
+local configfile = cjson.decode(content)
+
+local luaconfig = ngx.shared.luaconfig
+luaconfig:set("enablemetrics", configfile.enable_metrics)
+luaconfig:set("use_forwarded_headers", configfile.use_forwarded_headers)
+-- init modules
+local ok, res
+ok, res = pcall(require, "lua_ingress")
+if not ok then
+ error("require failed: " .. tostring(res))
+else
+ lua_ingress = res
+ lua_ingress.set_config(configfile)
+end
+ok, res = pcall(require, "configuration")
+if not ok then
+ error("require failed: " .. tostring(res))
+else
+ configuration = res
+ if not configfile.listen_ports.status_port then
+ error("required status port not found")
+ end
+ configuration.prohibited_localhost_port = configfile.listen_ports.status_port
+end
+ok, res = pcall(require, "balancer")
+if not ok then
+ error("require failed: " .. tostring(res))
+else
+ balancer = res
+end
+if configfile.enable_metrics then
+ ok, res = pcall(require, "monitor")
+ if not ok then
+ error("require failed: " .. tostring(res))
+ else
+ monitor = res
+ end
+end
+ok, res = pcall(require, "certificate")
+if not ok then
+ error("require failed: " .. tostring(res))
+else
+ certificate = res
+ if configfile.enable_ocsp then
+ certificate.is_ocsp_stapling_enabled = configfile.enable_ocsp
+ end
+end
\ No newline at end of file
diff --git a/rootfs/etc/nginx/lua/ngx_conf_init_stream.lua b/rootfs/etc/nginx/lua/ngx_conf_init_stream.lua
new file mode 100644
index 000000000..a78062d0a
--- /dev/null
+++ b/rootfs/etc/nginx/lua/ngx_conf_init_stream.lua
@@ -0,0 +1,30 @@
+local cjson = require("cjson.safe")
+collectgarbage("collect")
+local f = io.open("/etc/nginx/lua/cfg.json", "r")
+local content = f:read("*a")
+f:close()
+local configfile = cjson.decode(content)
+-- init modules
+local ok, res
+ok, res = pcall(require, "configuration")
+if not ok then
+ error("require failed: " .. tostring(res))
+else
+ configuration = res
+end
+ok, res = pcall(require, "tcp_udp_configuration")
+if not ok then
+ error("require failed: " .. tostring(res))
+else
+ tcp_udp_configuration = res
+ if not configfile.listen_ports.status_port then
+ error("required status port not found")
+ end
+ tcp_udp_configuration.prohibited_localhost_port = configfile.listen_ports.status_port
+end
+ok, res = pcall(require, "tcp_udp_balancer")
+if not ok then
+ error("require failed: " .. tostring(res))
+else
+ tcp_udp_balancer = res
+end
diff --git a/rootfs/etc/nginx/lua/ngx_conf_init_worker.lua b/rootfs/etc/nginx/lua/ngx_conf_init_worker.lua
new file mode 100644
index 000000000..cba866136
--- /dev/null
+++ b/rootfs/etc/nginx/lua/ngx_conf_init_worker.lua
@@ -0,0 +1,15 @@
+local cjson = require("cjson.safe")
+
+local f = io.open("/etc/nginx/lua/cfg.json", "r")
+local content = f:read("*a")
+f:close()
+local configfile = cjson.decode(content)
+
+local lua_ingress = require("lua_ingress")
+local balancer = require("balancer")
+local monitor = require("monitor")
+lua_ingress.init_worker()
+balancer.init_worker()
+if configfile.enable_metrics and configfile.monitor_batch_max_size then
+ monitor.init_worker(configfile.monitor_batch_max_size)
+end
\ No newline at end of file
diff --git a/rootfs/etc/nginx/lua/util.lua b/rootfs/etc/nginx/lua/util.lua
index 7389f3226..1e4cd7c01 100644
--- a/rootfs/etc/nginx/lua/util.lua
+++ b/rootfs/etc/nginx/lua/util.lua
@@ -146,6 +146,10 @@ function _M.is_blank(str)
return str == nil or string_len(str) == 0
end
+function _M.string_to_bool(str)
+ return str == "true"
+end
+
-- this implementation is taken from:
-- https://github.com/luafun/luafun/blob/master/fun.lua#L33
-- SHA: 04c99f9c393e54a604adde4b25b794f48104e0d0
diff --git a/rootfs/etc/nginx/template/nginx.tmpl b/rootfs/etc/nginx/template/nginx.tmpl
index 4f705976f..f32860dc2 100644
--- a/rootfs/etc/nginx/template/nginx.tmpl
+++ b/rootfs/etc/nginx/template/nginx.tmpl
@@ -68,60 +68,11 @@ http {
{{ buildLuaSharedDictionaries $cfg $servers }}
- init_by_lua_block {
- collectgarbage("collect")
+ lua_shared_dict luaconfig 5m;
- -- init modules
- local ok, res
+ init_by_lua_file /etc/nginx/lua/ngx_conf_init.lua;
- ok, res = pcall(require, "lua_ingress")
- if not ok then
- error("require failed: " .. tostring(res))
- else
- lua_ingress = res
- lua_ingress.set_config({{ configForLua $all }})
- end
-
- ok, res = pcall(require, "configuration")
- if not ok then
- error("require failed: " .. tostring(res))
- else
- configuration = res
- configuration.prohibited_localhost_port = '{{ .StatusPort }}'
- end
-
- ok, res = pcall(require, "balancer")
- if not ok then
- error("require failed: " .. tostring(res))
- else
- balancer = res
- end
-
- {{ if $all.EnableMetrics }}
- ok, res = pcall(require, "monitor")
- if not ok then
- error("require failed: " .. tostring(res))
- else
- monitor = res
- end
- {{ end }}
-
- ok, res = pcall(require, "certificate")
- if not ok then
- error("require failed: " .. tostring(res))
- else
- certificate = res
- certificate.is_ocsp_stapling_enabled = {{ $cfg.EnableOCSP }}
- end
- }
-
- init_worker_by_lua_block {
- lua_ingress.init_worker()
- balancer.init_worker()
- {{ if $all.EnableMetrics }}
- monitor.init_worker({{ $all.MonitorMaxBatchSize }})
- {{ end }}
- }
+ init_worker_by_lua_file /etc/nginx/lua/ngx_conf_init_worker.lua;
{{/* Enable the real_ip module only if we use either X-Forwarded headers or Proxy Protocol. */}}
{{/* we use the value of the real IP for the geo_ip module */}}
@@ -539,9 +490,7 @@ http {
server 0.0.0.1; # placeholder
- balancer_by_lua_block {
- balancer.balance()
- }
+ balancer_by_lua_file /etc/nginx/lua/nginx/ngx_conf_balancer.lua;
{{ if (gt $cfg.UpstreamKeepaliveConnections 0) }}
keepalive {{ $cfg.UpstreamKeepaliveConnections }};
@@ -606,9 +555,7 @@ http {
{{ buildHTTPListener $all $redirect.From }}
{{ buildHTTPSListener $all $redirect.From }}
- ssl_certificate_by_lua_block {
- certificate.call()
- }
+ ssl_certificate_by_lua_file /etc/nginx/lua/nginx/ngx_conf_certificate.lua;
{{ if gt (len $cfg.BlockUserAgents) 0 }}
if ($block_ua) {
@@ -621,30 +568,7 @@ http {
}
{{ end }}
- set_by_lua_block $redirect_to {
- local request_uri = ngx.var.request_uri
- if string.sub(request_uri, -1) == "/" then
- request_uri = string.sub(request_uri, 1, -2)
- end
-
- {{ if $cfg.UseForwardedHeaders }}
- local redirectScheme
- if not ngx.var.http_x_forwarded_proto then
- redirectScheme = ngx.var.scheme
- else
- redirectScheme = ngx.var.http_x_forwarded_proto
- end
- {{ else }}
- local redirectScheme = ngx.var.scheme
- {{ end }}
-
- {{ if ne $all.ListenPorts.HTTPS 443 }}
- {{ $redirect_port := (printf ":%v" $all.ListenPorts.HTTPS) }}
- return string.format("%s://%s%s%s", redirectScheme, "{{ $redirect.To }}", "{{ $redirect_port }}", request_uri)
- {{ else }}
- return string.format("%s://%s%s", redirectScheme, "{{ $redirect.To }}", request_uri)
- {{ end }}
- }
+ set_by_lua_file $redirect_to /etc/nginx/lua/nginx/ngx_srv_redirect.lua {{ $redirect.To }};
return {{ $all.Cfg.HTTPRedirectCode }} $redirect_to;
}
@@ -739,17 +663,7 @@ http {
}
location /is-dynamic-lb-initialized {
- content_by_lua_block {
- local configuration = require("configuration")
- local backend_data = configuration.get_backends_data()
- if not backend_data then
- ngx.exit(ngx.HTTP_INTERNAL_SERVER_ERROR)
- return
- end
-
- ngx.say("OK")
- ngx.exit(ngx.HTTP_OK)
- }
+ content_by_lua_file /etc/nginx/lua/nginx/ngx_conf_is_dynamic_lb_initialized.lua;
}
location {{ .StatusPath }} {
@@ -761,15 +675,11 @@ http {
client_body_buffer_size {{ luaConfigurationRequestBodySize $cfg }};
proxy_buffering off;
- content_by_lua_block {
- configuration.call()
- }
+ content_by_lua_file /etc/nginx/lua/nginx/ngx_conf_configuration.lua;
}
location / {
- content_by_lua_block {
- ngx.exit(ngx.HTTP_NOT_FOUND)
- }
+ return 404;
}
}
}
@@ -781,39 +691,9 @@ stream {
{{ buildResolvers $cfg.Resolver $cfg.DisableIpv6DNS }}
- init_by_lua_block {
- collectgarbage("collect")
+ init_by_lua_file /etc/nginx/lua/ngx_conf_init_stream.lua;
- -- init modules
- local ok, res
-
- ok, res = pcall(require, "configuration")
- if not ok then
- error("require failed: " .. tostring(res))
- else
- configuration = res
- end
-
- ok, res = pcall(require, "tcp_udp_configuration")
- if not ok then
- error("require failed: " .. tostring(res))
- else
- tcp_udp_configuration = res
- tcp_udp_configuration.prohibited_localhost_port = '{{ .StatusPort }}'
-
- end
-
- ok, res = pcall(require, "tcp_udp_balancer")
- if not ok then
- error("require failed: " .. tostring(res))
- else
- tcp_udp_balancer = res
- end
- }
-
- init_worker_by_lua_block {
- tcp_udp_balancer.init_worker()
- }
+ init_worker_by_lua_file /etc/nginx/lua/nginx/ngx_conf_init_tcp_udp.lua;
lua_add_variable $proxy_upstream_name;
@@ -835,10 +715,7 @@ stream {
upstream upstream_balancer {
server 0.0.0.1:1234; # placeholder
-
- balancer_by_lua_block {
- tcp_udp_balancer.balance()
- }
+ balancer_by_lua_file /etc/nginx/lua/nginx/ngx_conf_balancer_tcp_udp.lua;
}
server {
@@ -846,9 +723,7 @@ stream {
access_log off;
- content_by_lua_block {
- tcp_udp_configuration.call()
- }
+ content_by_lua_file /etc/nginx/lua/nginx/ngx_conf_content_tcp_udp.lua;
}
# TCP services
@@ -948,11 +823,9 @@ stream {
rewrite (.*) / break;
proxy_pass http://upstream_balancer;
- log_by_lua_block {
- {{ if $enableMetrics }}
- monitor.call()
- {{ end }}
- }
+ {{ if $enableMetrics }}
+ log_by_lua_file /etc/nginx/lua/nginx/ngx_conf_log.lua;
+ {{ end }}
}
{{ end }}
{{ end }}
@@ -1012,9 +885,7 @@ stream {
ssl_reject_handshake {{ if $all.Cfg.SSLRejectHandshake }}on{{ else }}off{{ end }};
{{ end }}
- ssl_certificate_by_lua_block {
- certificate.call()
- }
+ ssl_certificate_by_lua_file /etc/nginx/lua/nginx/ngx_conf_certificate.lua;
{{ if not (empty $server.AuthTLSError) }}
# {{ $server.AuthTLSError }}
@@ -1115,9 +986,7 @@ stream {
set $tmp_cache_key '{{ $server.Hostname }}{{ $authPath }}{{ $externalAuth.AuthCacheKey }}';
set $cache_key '';
- rewrite_by_lua_block {
- ngx.var.cache_key = ngx.encode_base64(ngx.sha1_bin(ngx.var.tmp_cache_key))
- }
+ rewrite_by_lua_file /etc/nginx/lua/nginx/ngx_conf_rewrite_auth.lua;
proxy_cache auth_cache;
@@ -1250,27 +1119,13 @@ stream {
mirror_request_body {{ $location.Mirror.RequestBody }};
{{ end }}
- rewrite_by_lua_block {
- lua_ingress.rewrite({{ locationConfigForLua $location $all }})
- balancer.rewrite()
- }
+ {{ locationConfigForLua $location $all }}
- # be careful with `access_by_lua_block` and `satisfy any` directives as satisfy any
- # will always succeed when there's `access_by_lua_block` that does not have any lua code doing `ngx.exit(ngx.DECLINED)`
- # other authentication method such as basic auth or external auth useless - all requests will be allowed.
- #access_by_lua_block {
- #}
+ rewrite_by_lua_file /etc/nginx/lua/nginx/ngx_rewrite.lua;
- header_filter_by_lua_block {
- lua_ingress.header()
- }
+ header_filter_by_lua_file /etc/nginx/lua/nginx/ngx_conf_srv_hdr_filter.lua;
- log_by_lua_block {
- balancer.log()
- {{ if $all.EnableMetrics }}
- monitor.call()
- {{ end }}
- }
+ log_by_lua_file /etc/nginx/lua/nginx/ngx_conf_log_block.lua;
{{ if not $location.Logs.Access }}
access_log off;
diff --git a/test/e2e/annotations/fromtowwwredirect.go b/test/e2e/annotations/fromtowwwredirect.go
index f578963ed..a3fb3b9b5 100644
--- a/test/e2e/annotations/fromtowwwredirect.go
+++ b/test/e2e/annotations/fromtowwwredirect.go
@@ -58,7 +58,7 @@ var _ = framework.DescribeAnnotation("from-to-www-redirect", func() {
WithHeader("Host", fmt.Sprintf("%s.%s", "www", host)).
Expect().
Status(http.StatusPermanentRedirect).
- Header("Location").Equal("http://fromtowwwredirect.bar.com/foo")
+ Header("Location").Equal("http://fromtowwwredirect.bar.com:80/foo")
})
ginkgo.It("should redirect from www HTTPS to HTTPS", func() {
@@ -101,7 +101,7 @@ var _ = framework.DescribeAnnotation("from-to-www-redirect", func() {
WithHeader("Host", toHost).
Expect().
Status(http.StatusPermanentRedirect).
- Header("Location").Equal(fmt.Sprintf("https://%v", fromHost))
+ Header("Location").Equal(fmt.Sprintf("https://%v:443", fromHost))
ginkgo.By("sending request to domain should not redirect to www")
f.HTTPTestClientWithTLSConfig(&tls.Config{
diff --git a/test/e2e/framework/framework.go b/test/e2e/framework/framework.go
index 103d8d593..204da7df0 100644
--- a/test/e2e/framework/framework.go
+++ b/test/e2e/framework/framework.go
@@ -16,6 +16,7 @@ package framework
import (
"context"
"crypto/tls"
+ "encoding/json"
"fmt"
"net"
"net/http"
@@ -283,6 +284,15 @@ func (f *Framework) WaitForNginxConfiguration(matcher func(cfg string) bool) {
Sleep(1 * time.Second)
}
+// WaitForLuaConfiguration waits until the nginx configuration contains a particular configuration
+// `cfg` passed to matcher is normalized by replacing all tabs and spaces with single space.
+func (f *Framework) WaitForLuaConfiguration(matcher func(jsonCfg map[string]interface{}) bool) {
+ //nolint:staticcheck // TODO: will replace it since wait.Poll is deprecated
+ err := wait.Poll(Poll, DefaultTimeout, f.matchLuaConditions(matcher))
+ assert.Nil(ginkgo.GinkgoT(), err, "waiting for nginx lua configuration condition/s")
+ Sleep(1 * time.Second)
+}
+
// WaitForNginxCustomConfiguration waits until the nginx configuration given part (from, to) contains a particular configuration
func (f *Framework) WaitForNginxCustomConfiguration(from, to string, matcher func(cfg string) bool) {
//nolint:staticcheck // TODO: will replace it since wait.Poll is deprecated
@@ -326,6 +336,29 @@ func (f *Framework) matchNginxConditions(name string, matcher func(cfg string) b
}
}
+func (f *Framework) matchLuaConditions(matcher func(jsonCfg map[string]interface{}) bool) wait.ConditionFunc {
+ return func() (bool, error) {
+ cmd := "cat /etc/nginx/lua/cfg.json"
+
+ o, err := f.ExecCommand(f.pod, cmd)
+ if err != nil {
+ return false, nil
+ }
+
+ if klog.V(10).Enabled() && o != "" {
+ klog.InfoS("Lua", "configuration", o)
+ }
+
+ luaConfig := make(map[string]interface{}) // Use unstructured so we can walk through JSON
+ if err := json.Unmarshal([]byte(o), &luaConfig); err != nil {
+ return false, err
+ }
+
+ // passes the lua interface to the function
+ return matcher(luaConfig), nil
+ }
+}
+
func (f *Framework) matchNginxCustomConditions(from, to string, matcher func(cfg string) bool) wait.ConditionFunc {
return func() (bool, error) {
cmd := fmt.Sprintf("cat /etc/nginx/nginx.conf| awk '/%v/,/%v/'", from, to)
diff --git a/test/e2e/lua/dynamic_configuration.go b/test/e2e/lua/dynamic_configuration.go
index 8ec1ef839..a5e2196ce 100644
--- a/test/e2e/lua/dynamic_configuration.go
+++ b/test/e2e/lua/dynamic_configuration.go
@@ -48,12 +48,7 @@ var _ = framework.IngressNginxDescribe("[Lua] dynamic configuration", func() {
ginkgo.It("configures balancer Lua middleware correctly", func() {
f.WaitForNginxConfiguration(func(cfg string) bool {
- return strings.Contains(cfg, "balancer.init_worker()") && strings.Contains(cfg, "balancer.balance()")
- })
-
- host := "foo.com"
- f.WaitForNginxServer(host, func(server string) bool {
- return strings.Contains(server, "balancer.rewrite()") && strings.Contains(server, "balancer.log()")
+ return strings.Contains(cfg, "balancer_by_lua_file /etc/nginx/lua/nginx/ngx_conf_balancer.lua")
})
})
diff --git a/test/e2e/settings/no_tls_redirect_locations.go b/test/e2e/settings/no_tls_redirect_locations.go
index 8339eb23e..18fd09e26 100644
--- a/test/e2e/settings/no_tls_redirect_locations.go
+++ b/test/e2e/settings/no_tls_redirect_locations.go
@@ -33,7 +33,7 @@ var _ = framework.DescribeSetting("Add no tls redirect locations", func() {
f.EnsureIngress(ing)
f.WaitForNginxConfiguration(func(server string) bool {
- return !strings.Contains(server, "force_no_ssl_redirect = true,")
+ return strings.Contains(server, "set $force_no_ssl_redirect \"false\"")
})
wlKey := "no-tls-redirect-locations"
@@ -42,7 +42,7 @@ var _ = framework.DescribeSetting("Add no tls redirect locations", func() {
f.UpdateNginxConfigMapData(wlKey, wlValue)
f.WaitForNginxConfiguration(func(server string) bool {
- return strings.Contains(server, "force_no_ssl_redirect = true,")
+ return strings.Contains(server, "set $force_no_ssl_redirect \"true\"")
})
})
})
diff --git a/test/e2e/settings/ocsp/ocsp.go b/test/e2e/settings/ocsp/ocsp.go
index ef3bfb58a..5dcaccc2f 100644
--- a/test/e2e/settings/ocsp/ocsp.go
+++ b/test/e2e/settings/ocsp/ocsp.go
@@ -34,6 +34,7 @@ import (
appsv1 "k8s.io/api/apps/v1"
corev1 "k8s.io/api/core/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
+ "k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
"k8s.io/apimachinery/pkg/util/intstr"
"k8s.io/ingress-nginx/test/e2e/framework"
@@ -107,8 +108,9 @@ var _ = framework.DescribeSetting("OCSP", func() {
err = framework.WaitForEndpoints(f.KubeClientSet, framework.DefaultTimeout, "ocspserve", f.Namespace, 1)
assert.Nil(ginkgo.GinkgoT(), err, "waiting for endpoints to become ready")
- f.WaitForNginxConfiguration(func(cfg string) bool {
- return strings.Contains(cfg, "certificate.is_ocsp_stapling_enabled = true")
+ f.WaitForLuaConfiguration(func(jsonCfg map[string]interface{}) bool {
+ val, ok, err := unstructured.NestedBool(jsonCfg, "enable_ocsp")
+ return err == nil && ok && val
})
f.WaitForNginxServer(host,
diff --git a/test/e2e/settings/tls.go b/test/e2e/settings/tls.go
index 51f760df8..1ebf358c1 100644
--- a/test/e2e/settings/tls.go
+++ b/test/e2e/settings/tls.go
@@ -25,10 +25,11 @@ import (
"github.com/onsi/ginkgo/v2"
"github.com/stretchr/testify/assert"
+ "k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
"k8s.io/ingress-nginx/test/e2e/framework"
)
-var _ = framework.DescribeSetting("[SSL] TLS protocols, ciphers and headers)", func() {
+var _ = framework.DescribeSetting("[SSL] TLS protocols, ciphers and headers", func() {
f := framework.NewDefaultFramework("settings-tls")
host := "settings-tls"
@@ -109,8 +110,9 @@ var _ = framework.DescribeSetting("[SSL] TLS protocols, ciphers and headers)", f
ginkgo.It("setting max-age parameter", func() {
f.UpdateNginxConfigMapData(hstsMaxAge, "86400")
- f.WaitForNginxConfiguration(func(server string) bool {
- return strings.Contains(server, `hsts_max_age = 86400,`)
+ f.WaitForLuaConfiguration(func(jsonCfg map[string]interface{}) bool {
+ val, ok, err := unstructured.NestedString(jsonCfg, "hsts_max_age")
+ return err == nil && ok && val == "86400"
})
f.HTTPTestClientWithTLSConfig(tlsConfig).
@@ -128,8 +130,9 @@ var _ = framework.DescribeSetting("[SSL] TLS protocols, ciphers and headers)", f
hstsIncludeSubdomains: "false",
})
- f.WaitForNginxConfiguration(func(server string) bool {
- return strings.Contains(server, `hsts_include_subdomains = false,`)
+ f.WaitForLuaConfiguration(func(jsonCfg map[string]interface{}) bool {
+ val, ok, err := unstructured.NestedBool(jsonCfg, "hsts_include_subdomains")
+ return err == nil && ok && !val
})
f.HTTPTestClientWithTLSConfig(tlsConfig).
@@ -148,8 +151,9 @@ var _ = framework.DescribeSetting("[SSL] TLS protocols, ciphers and headers)", f
hstsIncludeSubdomains: "false",
})
- f.WaitForNginxConfiguration(func(server string) bool {
- return strings.Contains(server, `hsts_preload = true,`)
+ f.WaitForLuaConfiguration(func(jsonCfg map[string]interface{}) bool {
+ val, ok, err := unstructured.NestedBool(jsonCfg, "hsts_preload")
+ return err == nil && ok && val
})
f.HTTPTestClientWithTLSConfig(tlsConfig).
From f4454e2651ad11dcb4df5bfd4b3ce0d435191b6f Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 9 Sep 2024 15:16:28 +0100
Subject: [PATCH 230/283] Bump github.com/prometheus/client_golang from 1.20.2
to 1.20.3 in the all group (#11953)
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 2 +-
go.sum | 4 ++--
2 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/go.mod b/go.mod
index 36b5f79e1..789fae3f0 100644
--- a/go.mod
+++ b/go.mod
@@ -17,7 +17,7 @@ require (
github.com/onsi/ginkgo/v2 v2.20.2
github.com/opencontainers/runc v1.1.14
github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2
- github.com/prometheus/client_golang v1.20.2
+ github.com/prometheus/client_golang v1.20.3
github.com/prometheus/client_model v0.6.1
github.com/prometheus/common v0.57.0
github.com/spf13/cobra v1.8.1
diff --git a/go.sum b/go.sum
index 51d85b04c..7d5f2c9a3 100644
--- a/go.sum
+++ b/go.sum
@@ -182,8 +182,8 @@ github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINE
github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 h1:Jamvg5psRIccs7FGNTlIRMkT8wgtp5eCXdBlqhYGL6U=
github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
-github.com/prometheus/client_golang v1.20.2 h1:5ctymQzZlyOON1666svgwn3s6IKWgfbjsejTMiXIyjg=
-github.com/prometheus/client_golang v1.20.2/go.mod h1:PIEt8X02hGcP8JWbeHyeZ53Y/jReSnHgO035n//V5WE=
+github.com/prometheus/client_golang v1.20.3 h1:oPksm4K8B+Vt35tUhw6GbSNSgVlVSBH0qELP/7u83l4=
+github.com/prometheus/client_golang v1.20.3/go.mod h1:PIEt8X02hGcP8JWbeHyeZ53Y/jReSnHgO035n//V5WE=
github.com/prometheus/client_model v0.6.1 h1:ZKSh/rekM+n3CeS952MLRAdFwIKqeY8b62p8ais2e9E=
github.com/prometheus/client_model v0.6.1/go.mod h1:OrxVMOVHjw3lKMa8+x6HeMGkHMQyHDk9E3jmP2AmGiY=
github.com/prometheus/common v0.57.0 h1:Ro/rKjwdq9mZn1K5QPctzh+MA4Lp0BuYk5ZZEVhoNcY=
From c229246676f523e4ce62bab4dc52b3bd67c7428b Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 9 Sep 2024 15:18:28 +0100
Subject: [PATCH 231/283] Bump golang.org/x/crypto from 0.26.0 to 0.27.0
(#11955)
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 8 ++++----
go.sum | 16 ++++++++--------
2 files changed, 12 insertions(+), 12 deletions(-)
diff --git a/go.mod b/go.mod
index 789fae3f0..e3e203a3a 100644
--- a/go.mod
+++ b/go.mod
@@ -25,7 +25,7 @@ require (
github.com/stretchr/testify v1.9.0
github.com/yudai/gojsondiff v1.0.0
github.com/zakjan/cert-chain-resolver v0.0.0-20221221105603-fcedb00c5b30
- golang.org/x/crypto v0.26.0
+ golang.org/x/crypto v0.27.0
golang.org/x/exp v0.0.0-20240719175910-8a7402abbf56
google.golang.org/grpc v1.66.0
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab
@@ -117,9 +117,9 @@ require (
golang.org/x/net v0.28.0 // indirect
golang.org/x/oauth2 v0.21.0 // indirect
golang.org/x/sync v0.8.0 // indirect
- golang.org/x/sys v0.24.0 // indirect
- golang.org/x/term v0.23.0 // indirect
- golang.org/x/text v0.17.0 // indirect
+ golang.org/x/sys v0.25.0 // indirect
+ golang.org/x/term v0.24.0 // indirect
+ golang.org/x/text v0.18.0 // indirect
golang.org/x/time v0.5.0 // indirect
golang.org/x/tools v0.24.0 // indirect
google.golang.org/genproto/googleapis/rpc v0.0.0-20240701130421-f6361c86f094 // indirect
diff --git a/go.sum b/go.sum
index 7d5f2c9a3..51ddb2264 100644
--- a/go.sum
+++ b/go.sum
@@ -238,8 +238,8 @@ golang.org/dl v0.0.0-20190829154251-82a15e2f2ead/go.mod h1:IUMfjQLJQd4UTqG1Z90te
golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
-golang.org/x/crypto v0.26.0 h1:RrRspgV4mU+YwB4FYnuBoKsUapNIL5cohGAmSH3azsw=
-golang.org/x/crypto v0.26.0/go.mod h1:GY7jblb9wI+FOo5y8/S2oY4zWP07AkOJ4+jxCqdqn54=
+golang.org/x/crypto v0.27.0 h1:GXm2NjJrPaiv/h1tb2UH8QfgC/hOf/+z0p6PT8o1w7A=
+golang.org/x/crypto v0.27.0/go.mod h1:1Xngt8kV6Dvbssa53Ziq6Eqn0HqbZi5Z6R0ZpwQzt70=
golang.org/x/exp v0.0.0-20240719175910-8a7402abbf56 h1:2dVuKD2vS7b0QIHQbpyTISPd0LeHDbnYEryqj5Q1ug8=
golang.org/x/exp v0.0.0-20240719175910-8a7402abbf56/go.mod h1:M4RDyNAINzryxdtnbRXRL/OHtkFuWGRjvuhBJpk2IlY=
golang.org/x/mod v0.2.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
@@ -276,14 +276,14 @@ golang.org/x/sys v0.0.0-20220520151302-bc2c85ada10a/go.mod h1:oPkhp1MJrh7nUepCBc
golang.org/x/sys v0.0.0-20220715151400-c0bba94af5f8/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.0.0-20220811171246-fbc7d0a398ab/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.24.0 h1:Twjiwq9dn6R1fQcyiK+wQyHWfaz/BJB+YIpzU/Cv3Xg=
-golang.org/x/sys v0.24.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
-golang.org/x/term v0.23.0 h1:F6D4vR+EHoL9/sWAWgAR1H2DcHr4PareCbAaCo1RpuU=
-golang.org/x/term v0.23.0/go.mod h1:DgV24QBUrK6jhZXl+20l6UWznPlwAHm1Q1mGHtydmSk=
+golang.org/x/sys v0.25.0 h1:r+8e+loiHxRqhXVl6ML1nO3l1+oFoWbnlu2Ehimmi34=
+golang.org/x/sys v0.25.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
+golang.org/x/term v0.24.0 h1:Mh5cbb+Zk2hqqXNO7S1iTjEphVL+jb8ZWaqh/g+JWkM=
+golang.org/x/term v0.24.0/go.mod h1:lOBK/LVxemqiMij05LGJ0tzNr8xlmwBRJ81PX6wVLH8=
golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
golang.org/x/text v0.3.3/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
-golang.org/x/text v0.17.0 h1:XtiM5bkSOt+ewxlOE/aE/AKEHibwj/6gvWMl9Rsh0Qc=
-golang.org/x/text v0.17.0/go.mod h1:BuEKDfySbSR4drPmRPG/7iBdf8hvFMuRexcpahXilzY=
+golang.org/x/text v0.18.0 h1:XvMDiNzPAl0jr17s6W9lcaIhGUfUORdGCNsuLmPG224=
+golang.org/x/text v0.18.0/go.mod h1:BuEKDfySbSR4drPmRPG/7iBdf8hvFMuRexcpahXilzY=
golang.org/x/time v0.5.0 h1:o7cqy6amK/52YcAKIPlM3a+Fpj35zvRj2TP+e1xFSfk=
golang.org/x/time v0.5.0/go.mod h1:3BpzKBy/shNhVucY/MWOyx10tF3SFh9QdLuxbVysPQM=
golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
From 1c2aecbf02898845b45cee3d0b493347b440995e Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 9 Sep 2024 16:35:36 +0100
Subject: [PATCH 232/283] Bump github.com/prometheus/common from 0.57.0 to
0.59.1 (#11954)
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 4 ++--
go.sum | 8 ++++----
2 files changed, 6 insertions(+), 6 deletions(-)
diff --git a/go.mod b/go.mod
index e3e203a3a..2055ad7c6 100644
--- a/go.mod
+++ b/go.mod
@@ -19,7 +19,7 @@ require (
github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2
github.com/prometheus/client_golang v1.20.3
github.com/prometheus/client_model v0.6.1
- github.com/prometheus/common v0.57.0
+ github.com/prometheus/common v0.59.1
github.com/spf13/cobra v1.8.1
github.com/spf13/pflag v1.0.5
github.com/stretchr/testify v1.9.0
@@ -115,7 +115,7 @@ require (
go.uber.org/zap v1.27.0 // indirect
golang.org/x/mod v0.20.0 // indirect
golang.org/x/net v0.28.0 // indirect
- golang.org/x/oauth2 v0.21.0 // indirect
+ golang.org/x/oauth2 v0.22.0 // indirect
golang.org/x/sync v0.8.0 // indirect
golang.org/x/sys v0.25.0 // indirect
golang.org/x/term v0.24.0 // indirect
diff --git a/go.sum b/go.sum
index 51ddb2264..5e87f616c 100644
--- a/go.sum
+++ b/go.sum
@@ -186,8 +186,8 @@ github.com/prometheus/client_golang v1.20.3 h1:oPksm4K8B+Vt35tUhw6GbSNSgVlVSBH0q
github.com/prometheus/client_golang v1.20.3/go.mod h1:PIEt8X02hGcP8JWbeHyeZ53Y/jReSnHgO035n//V5WE=
github.com/prometheus/client_model v0.6.1 h1:ZKSh/rekM+n3CeS952MLRAdFwIKqeY8b62p8ais2e9E=
github.com/prometheus/client_model v0.6.1/go.mod h1:OrxVMOVHjw3lKMa8+x6HeMGkHMQyHDk9E3jmP2AmGiY=
-github.com/prometheus/common v0.57.0 h1:Ro/rKjwdq9mZn1K5QPctzh+MA4Lp0BuYk5ZZEVhoNcY=
-github.com/prometheus/common v0.57.0/go.mod h1:7uRPFSUTbfZWsJ7MHY56sqt7hLQu3bxXHDnNhl8E9qI=
+github.com/prometheus/common v0.59.1 h1:LXb1quJHWm1P6wq/U824uxYi4Sg0oGvNeUm1z5dJoX0=
+github.com/prometheus/common v0.59.1/go.mod h1:GpWM7dewqmVYcd7SmRaiWVe9SSqjf0UrwnYnpEZNuT0=
github.com/prometheus/procfs v0.15.1 h1:YagwOFzUgYfKKHX6Dr+sHT7km/hxC76UB0learggepc=
github.com/prometheus/procfs v0.15.1/go.mod h1:fB45yRUv8NstnjriLhBQLuOUt+WW4BsoGhij/e3PBqk=
github.com/rogpeppe/go-internal v1.12.0 h1:exVL4IDcn6na9z1rAb56Vxr+CgyK3nn3O+epU5NdKM8=
@@ -254,8 +254,8 @@ golang.org/x/net v0.0.0-20200520004742-59133d7f0dd7/go.mod h1:qpuaurCH72eLCgpAm/
golang.org/x/net v0.0.0-20201021035429-f5854403a974/go.mod h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU=
golang.org/x/net v0.28.0 h1:a9JDOJc5GMUJ0+UDqmLT86WiEy7iWyIhz8gz8E4e5hE=
golang.org/x/net v0.28.0/go.mod h1:yqtgsTWOOnlGLG9GFRrK3++bGOUEkNBoHZc8MEDWPNg=
-golang.org/x/oauth2 v0.21.0 h1:tsimM75w1tF/uws5rbeHzIWxEqElMehnc+iW793zsZs=
-golang.org/x/oauth2 v0.21.0/go.mod h1:XYTD2NtWslqkgxebSiOHnXEap4TF09sJSc7H1sXbhtI=
+golang.org/x/oauth2 v0.22.0 h1:BzDx2FehcG7jJwgWLELCdmLuxk2i+x9UDpSiss2u0ZA=
+golang.org/x/oauth2 v0.22.0/go.mod h1:XYTD2NtWslqkgxebSiOHnXEap4TF09sJSc7H1sXbhtI=
golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sync v0.0.0-20190911185100-cd5d95a43a6e/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
From 0111961e7d79b386c7717fa392d727e8fdadfc2a Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Fri, 13 Sep 2024 16:41:46 +0100
Subject: [PATCH 233/283] Go: Bump to v1.22.7. (#11943)
---
GOLANG_VERSION | 2 +-
go.mod | 2 +-
go.work | 2 +-
images/custom-error-pages/rootfs/go.mod | 2 +-
images/ext-auth-example-authsvc/rootfs/go.mod | 2 +-
images/kube-webhook-certgen/rootfs/go.mod | 2 +-
images/opentelemetry/rootfs/Dockerfile | 2 +-
images/opentelemetry/rootfs/go.mod | 2 +-
magefiles/go.mod | 2 +-
9 files changed, 9 insertions(+), 9 deletions(-)
diff --git a/GOLANG_VERSION b/GOLANG_VERSION
index 013173af5..87b26e8b1 100644
--- a/GOLANG_VERSION
+++ b/GOLANG_VERSION
@@ -1 +1 @@
-1.22.6
+1.22.7
diff --git a/go.mod b/go.mod
index 2055ad7c6..1dc95fd5c 100644
--- a/go.mod
+++ b/go.mod
@@ -1,6 +1,6 @@
module k8s.io/ingress-nginx
-go 1.22.6
+go 1.22.7
require (
dario.cat/mergo v1.0.1
diff --git a/go.work b/go.work
index ac741bb5a..f0095c758 100644
--- a/go.work
+++ b/go.work
@@ -1,4 +1,4 @@
-go 1.22.6
+go 1.22.7
use (
.
diff --git a/images/custom-error-pages/rootfs/go.mod b/images/custom-error-pages/rootfs/go.mod
index 264ebf427..34363c50a 100644
--- a/images/custom-error-pages/rootfs/go.mod
+++ b/images/custom-error-pages/rootfs/go.mod
@@ -1,6 +1,6 @@
module k8s.io/ingress-nginx/custom-error-pages
-go 1.22.6
+go 1.22.7
require github.com/prometheus/client_golang v1.11.1
diff --git a/images/ext-auth-example-authsvc/rootfs/go.mod b/images/ext-auth-example-authsvc/rootfs/go.mod
index a3396b358..366e19639 100644
--- a/images/ext-auth-example-authsvc/rootfs/go.mod
+++ b/images/ext-auth-example-authsvc/rootfs/go.mod
@@ -1,6 +1,6 @@
module example.com/authsvc
-go 1.22.6
+go 1.22.7
require k8s.io/apimachinery v0.23.1
diff --git a/images/kube-webhook-certgen/rootfs/go.mod b/images/kube-webhook-certgen/rootfs/go.mod
index 0270c0d87..9bbb5b391 100644
--- a/images/kube-webhook-certgen/rootfs/go.mod
+++ b/images/kube-webhook-certgen/rootfs/go.mod
@@ -1,6 +1,6 @@
module github.com/jet/kube-webhook-certgen
-go 1.22.6
+go 1.22.7
require (
github.com/onrik/logrus v0.11.0
diff --git a/images/opentelemetry/rootfs/Dockerfile b/images/opentelemetry/rootfs/Dockerfile
index 9f3cb2eae..4b64b96a6 100644
--- a/images/opentelemetry/rootfs/Dockerfile
+++ b/images/opentelemetry/rootfs/Dockerfile
@@ -31,7 +31,7 @@ FROM base AS nginx
ARG NGINX_VERSION=1.25.3
RUN bash /opt/third_party/build.sh -n ${NGINX_VERSION}
-FROM golang:1.22.6-bullseye AS build-init
+FROM golang:1.22.7-bullseye AS build-init
WORKDIR /go/src/app
COPY . .
diff --git a/images/opentelemetry/rootfs/go.mod b/images/opentelemetry/rootfs/go.mod
index 115ef686a..207d1d914 100644
--- a/images/opentelemetry/rootfs/go.mod
+++ b/images/opentelemetry/rootfs/go.mod
@@ -1,3 +1,3 @@
module init-otel
-go 1.22.6
+go 1.22.7
diff --git a/magefiles/go.mod b/magefiles/go.mod
index 8e146d70e..913522823 100644
--- a/magefiles/go.mod
+++ b/magefiles/go.mod
@@ -1,6 +1,6 @@
module k8s.io/ingress-nginx/magefiles
-go 1.22.6
+go 1.22.7
require (
github.com/blang/semver/v4 v4.0.0
From 61f56cb490d6cdc9c8e89ef3040e7eb609e88c2a Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Sun, 15 Sep 2024 16:49:14 +0200
Subject: [PATCH 234/283] Chart: Improve default backend service account.
(#11972)
---
charts/ingress-nginx/templates/_helpers.tpl | 2 +-
.../ingress-nginx/templates/default-backend-deployment.yaml | 2 +-
.../templates/default-backend-serviceaccount.yaml | 4 ++--
3 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/charts/ingress-nginx/templates/_helpers.tpl b/charts/ingress-nginx/templates/_helpers.tpl
index 51bacbe38..aa206084d 100644
--- a/charts/ingress-nginx/templates/_helpers.tpl
+++ b/charts/ingress-nginx/templates/_helpers.tpl
@@ -204,7 +204,7 @@ We truncate at 63 chars because some Kubernetes name fields are limited to this
{{- end -}}
{{/*
-Create the name of the backend service account to use - only used when podsecuritypolicy is also enabled
+Create the name of the default backend service account to use
*/}}
{{- define "ingress-nginx.defaultBackend.serviceAccountName" -}}
{{- if .Values.defaultBackend.serviceAccount.create -}}
diff --git a/charts/ingress-nginx/templates/default-backend-deployment.yaml b/charts/ingress-nginx/templates/default-backend-deployment.yaml
index c6ccdd5c9..6755e2378 100644
--- a/charts/ingress-nginx/templates/default-backend-deployment.yaml
+++ b/charts/ingress-nginx/templates/default-backend-deployment.yaml
@@ -102,7 +102,7 @@ spec:
{{- if .Values.defaultBackend.nodeSelector }}
nodeSelector: {{ toYaml .Values.defaultBackend.nodeSelector | nindent 8 }}
{{- end }}
- serviceAccountName: {{ template "ingress-nginx.defaultBackend.serviceAccountName" . }}
+ serviceAccountName: {{ include "ingress-nginx.defaultBackend.serviceAccountName" . }}
{{- if .Values.defaultBackend.tolerations }}
tolerations: {{ toYaml .Values.defaultBackend.tolerations | nindent 8 }}
{{- end }}
diff --git a/charts/ingress-nginx/templates/default-backend-serviceaccount.yaml b/charts/ingress-nginx/templates/default-backend-serviceaccount.yaml
index 2afaf0c04..6fd2d6234 100644
--- a/charts/ingress-nginx/templates/default-backend-serviceaccount.yaml
+++ b/charts/ingress-nginx/templates/default-backend-serviceaccount.yaml
@@ -1,4 +1,4 @@
-{{- if and .Values.defaultBackend.enabled .Values.defaultBackend.serviceAccount.create -}}
+{{- if and .Values.defaultBackend.enabled .Values.defaultBackend.serviceAccount.create -}}
apiVersion: v1
kind: ServiceAccount
metadata:
@@ -8,7 +8,7 @@ metadata:
{{- with .Values.defaultBackend.labels }}
{{- toYaml . | nindent 4 }}
{{- end }}
- name: {{ template "ingress-nginx.defaultBackend.serviceAccountName" . }}
+ name: {{ include "ingress-nginx.defaultBackend.serviceAccountName" . }}
namespace: {{ include "ingress-nginx.namespace" . }}
automountServiceAccountToken: {{ .Values.defaultBackend.serviceAccount.automountServiceAccountToken }}
{{- end }}
From 027603927b46f086c1b77dc1ab76f0667343718b Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Sun, 15 Sep 2024 17:03:24 +0200
Subject: [PATCH 235/283] Chart: Remove Pod Security Policy. (#11971)
---
charts/ingress-nginx/README.md | 4 -
.../ci/deamonset-psp-values.yaml | 13 ---
.../ci/deamonset-webhook-and-psp-values.yaml | 13 ---
.../ci/deployment-psp-values.yaml | 10 --
.../ci/deployment-webhook-and-psp-values.yaml | 12 ---
charts/ingress-nginx/templates/_helpers.tpl | 11 --
.../job-patch/clusterrole.yaml | 10 --
.../admission-webhooks/job-patch/psp.yaml | 52 ---------
.../templates/controller-psp.yaml | 100 ------------------
.../templates/controller-role.yaml | 10 --
.../templates/default-backend-psp.yaml | 50 ---------
.../templates/default-backend-role.yaml | 22 ----
.../default-backend-rolebinding.yaml | 21 ----
charts/ingress-nginx/values.yaml | 10 --
docs/examples/psp/README.md | 17 ---
docs/examples/psp/psp.yaml | 75 -------------
docs/troubleshooting.md | 2 +-
magefiles/utils/helm.go | 6 --
mkdocs.yml | 1 -
19 files changed, 1 insertion(+), 438 deletions(-)
delete mode 100644 charts/ingress-nginx/ci/deamonset-psp-values.yaml
delete mode 100644 charts/ingress-nginx/ci/deamonset-webhook-and-psp-values.yaml
delete mode 100644 charts/ingress-nginx/ci/deployment-psp-values.yaml
delete mode 100644 charts/ingress-nginx/ci/deployment-webhook-and-psp-values.yaml
delete mode 100644 charts/ingress-nginx/templates/admission-webhooks/job-patch/psp.yaml
delete mode 100644 charts/ingress-nginx/templates/controller-psp.yaml
delete mode 100644 charts/ingress-nginx/templates/default-backend-psp.yaml
delete mode 100644 charts/ingress-nginx/templates/default-backend-role.yaml
delete mode 100644 charts/ingress-nginx/templates/default-backend-rolebinding.yaml
delete mode 100644 docs/examples/psp/README.md
delete mode 100644 docs/examples/psp/psp.yaml
diff --git a/charts/ingress-nginx/README.md b/charts/ingress-nginx/README.md
index 99551e6d4..8c06cdce2 100644
--- a/charts/ingress-nginx/README.md
+++ b/charts/ingress-nginx/README.md
@@ -244,7 +244,6 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
| controller.admissionWebhooks.createSecretJob.resources | object | `{}` | |
| controller.admissionWebhooks.createSecretJob.securityContext | object | `{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]},"readOnlyRootFilesystem":true,"runAsGroup":65532,"runAsNonRoot":true,"runAsUser":65532,"seccompProfile":{"type":"RuntimeDefault"}}` | Security context for secret creation containers |
| controller.admissionWebhooks.enabled | bool | `true` | |
-| controller.admissionWebhooks.existingPsp | string | `""` | Use an existing PSP instead of creating one |
| controller.admissionWebhooks.extraEnvs | list | `[]` | Additional environment variables to set |
| controller.admissionWebhooks.failurePolicy | string | `"Fail"` | Admission Webhook failure policy to use |
| controller.admissionWebhooks.key | string | `"/usr/local/certificates/key"` | |
@@ -307,7 +306,6 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
| controller.enableAnnotationValidations | bool | `true` | |
| controller.enableMimalloc | bool | `true` | Enable mimalloc as a drop-in replacement for malloc. # ref: https://github.com/microsoft/mimalloc # |
| controller.enableTopologyAwareRouting | bool | `false` | This configuration enables Topology Aware Routing feature, used together with service annotation service.kubernetes.io/topology-mode="auto" Defaults to false |
-| controller.existingPsp | string | `""` | Use an existing PSP instead of creating one |
| controller.extraArgs | object | `{}` | Additional command line arguments to pass to Ingress-Nginx Controller E.g. to specify the default SSL certificate you can use |
| controller.extraContainers | list | `[]` | Additional containers to be added to the controller pod. See https://github.com/lemonldap-ng-controller/lemonldap-ng-controller as example. |
| controller.extraEnvs | list | `[]` | Additional environment variables to set |
@@ -497,7 +495,6 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
| defaultBackend.autoscaling.targetMemoryUtilizationPercentage | int | `50` | |
| defaultBackend.containerSecurityContext | object | `{}` | Security context for default backend containers |
| defaultBackend.enabled | bool | `false` | |
-| defaultBackend.existingPsp | string | `""` | Use an existing PSP instead of creating one |
| defaultBackend.extraArgs | object | `{}` | |
| defaultBackend.extraConfigMaps | list | `[]` | |
| defaultBackend.extraEnvs | list | `[]` | Additional environment variables to set for defaultBackend pods |
@@ -550,7 +547,6 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
| dhParam | string | `""` | A base64-encoded Diffie-Hellman parameter. This can be generated with: `openssl dhparam 4096 2> /dev/null | base64` # Ref: https://github.com/kubernetes/ingress-nginx/tree/main/docs/examples/customization/ssl-dh-param |
| imagePullSecrets | list | `[]` | Optional array of imagePullSecrets containing private registry credentials # Ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ |
| namespaceOverride | string | `""` | Override the deployment namespace; defaults to .Release.Namespace |
-| podSecurityPolicy.enabled | bool | `false` | |
| portNamePrefix | string | `""` | Prefix for TCP and UDP ports names in ingress controller service # Some cloud providers, like Yandex Cloud may have a requirements for a port name regex to support cloud load balancer integration |
| rbac.create | bool | `true` | |
| rbac.scope | bool | `false` | |
diff --git a/charts/ingress-nginx/ci/deamonset-psp-values.yaml b/charts/ingress-nginx/ci/deamonset-psp-values.yaml
deleted file mode 100644
index 8026a6356..000000000
--- a/charts/ingress-nginx/ci/deamonset-psp-values.yaml
+++ /dev/null
@@ -1,13 +0,0 @@
-controller:
- kind: DaemonSet
- image:
- repository: ingress-controller/controller
- tag: 1.0.0-dev
- digest: null
- admissionWebhooks:
- enabled: false
- service:
- type: ClusterIP
-
-podSecurityPolicy:
- enabled: true
diff --git a/charts/ingress-nginx/ci/deamonset-webhook-and-psp-values.yaml b/charts/ingress-nginx/ci/deamonset-webhook-and-psp-values.yaml
deleted file mode 100644
index fccdb134c..000000000
--- a/charts/ingress-nginx/ci/deamonset-webhook-and-psp-values.yaml
+++ /dev/null
@@ -1,13 +0,0 @@
-controller:
- kind: DaemonSet
- image:
- repository: ingress-controller/controller
- tag: 1.0.0-dev
- digest: null
- admissionWebhooks:
- enabled: true
- service:
- type: ClusterIP
-
-podSecurityPolicy:
- enabled: true
diff --git a/charts/ingress-nginx/ci/deployment-psp-values.yaml b/charts/ingress-nginx/ci/deployment-psp-values.yaml
deleted file mode 100644
index 2f332a7b2..000000000
--- a/charts/ingress-nginx/ci/deployment-psp-values.yaml
+++ /dev/null
@@ -1,10 +0,0 @@
-controller:
- image:
- repository: ingress-controller/controller
- tag: 1.0.0-dev
- digest: null
- service:
- type: ClusterIP
-
-podSecurityPolicy:
- enabled: true
diff --git a/charts/ingress-nginx/ci/deployment-webhook-and-psp-values.yaml b/charts/ingress-nginx/ci/deployment-webhook-and-psp-values.yaml
deleted file mode 100644
index 6195bb339..000000000
--- a/charts/ingress-nginx/ci/deployment-webhook-and-psp-values.yaml
+++ /dev/null
@@ -1,12 +0,0 @@
-controller:
- image:
- repository: ingress-controller/controller
- tag: 1.0.0-dev
- digest: null
- admissionWebhooks:
- enabled: true
- service:
- type: ClusterIP
-
-podSecurityPolicy:
- enabled: true
diff --git a/charts/ingress-nginx/templates/_helpers.tpl b/charts/ingress-nginx/templates/_helpers.tpl
index aa206084d..6cbda2d4d 100644
--- a/charts/ingress-nginx/templates/_helpers.tpl
+++ b/charts/ingress-nginx/templates/_helpers.tpl
@@ -235,17 +235,6 @@ readOnlyRootFilesystem: {{ .Values.defaultBackend.image.readOnlyRootFilesystem }
{{- end -}}
{{- end -}}
-{{/*
-Return the appropriate apiGroup for PodSecurityPolicy.
-*/}}
-{{- define "podSecurityPolicy.apiGroup" -}}
-{{- if semverCompare ">=1.14-0" .Capabilities.KubeVersion.GitVersion -}}
-{{- print "policy" -}}
-{{- else -}}
-{{- print "extensions" -}}
-{{- end -}}
-{{- end -}}
-
{{/*
Extra modules.
*/}}
diff --git a/charts/ingress-nginx/templates/admission-webhooks/job-patch/clusterrole.yaml b/charts/ingress-nginx/templates/admission-webhooks/job-patch/clusterrole.yaml
index a21848201..54af7abb6 100644
--- a/charts/ingress-nginx/templates/admission-webhooks/job-patch/clusterrole.yaml
+++ b/charts/ingress-nginx/templates/admission-webhooks/job-patch/clusterrole.yaml
@@ -20,14 +20,4 @@ rules:
verbs:
- get
- update
-{{- if .Values.podSecurityPolicy.enabled }}
- - apiGroups: [{{ template "podSecurityPolicy.apiGroup" . }}]
- resources: ['podsecuritypolicies']
- verbs: ['use']
- {{- with .Values.controller.admissionWebhooks.existingPsp }}
- resourceNames: [{{ . }}]
- {{- else }}
- resourceNames: [{{ include "ingress-nginx.admissionWebhooks.fullname" . }}]
- {{- end }}
-{{- end }}
{{- end }}
diff --git a/charts/ingress-nginx/templates/admission-webhooks/job-patch/psp.yaml b/charts/ingress-nginx/templates/admission-webhooks/job-patch/psp.yaml
deleted file mode 100644
index 8e5dc72ac..000000000
--- a/charts/ingress-nginx/templates/admission-webhooks/job-patch/psp.yaml
+++ /dev/null
@@ -1,52 +0,0 @@
-{{- if (semverCompare "<1.25.0-0" .Capabilities.KubeVersion.Version) }}
-{{- if and .Values.podSecurityPolicy.enabled .Values.controller.admissionWebhooks.enabled .Values.controller.admissionWebhooks.patch.enabled (empty .Values.controller.admissionWebhooks.existingPsp) -}}
-apiVersion: policy/v1beta1
-kind: PodSecurityPolicy
-metadata:
- name: {{ include "ingress-nginx.admissionWebhooks.fullname" . }}
- annotations:
- "helm.sh/hook": pre-install,pre-upgrade,post-install,post-upgrade
- "helm.sh/hook-delete-policy": before-hook-creation,hook-succeeded
- seccomp.security.alpha.kubernetes.io/allowedProfileNames: "*"
- labels:
- {{- include "ingress-nginx.labels" . | nindent 4 }}
- app.kubernetes.io/component: admission-webhook
- {{- with .Values.controller.admissionWebhooks.patch.labels }}
- {{- toYaml . | nindent 4 }}
- {{- end }}
-spec:
- privileged: false
- hostPID: false
- hostIPC: false
- hostNetwork: false
- volumes:
- - configMap
- - downwardAPI
- - emptyDir
- - secret
- - projected
- fsGroup:
- rule: MustRunAs
- ranges:
- - min: 1
- max: 65535
- readOnlyRootFilesystem: true
- runAsUser:
- rule: MustRunAsNonRoot
- runAsGroup:
- rule: MustRunAs
- ranges:
- - min: 1
- max: 65535
- supplementalGroups:
- rule: MustRunAs
- ranges:
- - min: 1
- max: 65535
- allowPrivilegeEscalation: false
- requiredDropCapabilities:
- - ALL
- seLinux:
- rule: RunAsAny
-{{- end }}
-{{- end }}
diff --git a/charts/ingress-nginx/templates/controller-psp.yaml b/charts/ingress-nginx/templates/controller-psp.yaml
deleted file mode 100644
index aad1d2736..000000000
--- a/charts/ingress-nginx/templates/controller-psp.yaml
+++ /dev/null
@@ -1,100 +0,0 @@
-{{- if (semverCompare "<1.25.0-0" .Capabilities.KubeVersion.Version) }}
-{{- if and .Values.podSecurityPolicy.enabled (empty .Values.controller.existingPsp) -}}
-apiVersion: policy/v1beta1
-kind: PodSecurityPolicy
-metadata:
- name: {{ include "ingress-nginx.fullname" . }}
- annotations:
- seccomp.security.alpha.kubernetes.io/allowedProfileNames: "*"
- labels:
- {{- include "ingress-nginx.labels" . | nindent 4 }}
- app.kubernetes.io/component: controller
- {{- with .Values.controller.labels }}
- {{- toYaml . | nindent 4 }}
- {{- end }}
-spec:
- privileged: false
- hostPID: false
- hostIPC: false
- hostNetwork: {{ .Values.controller.hostNetwork }}
-{{- if or .Values.controller.hostNetwork .Values.controller.hostPort.enabled }}
- hostPorts:
- {{- if .Values.controller.hostNetwork }}
- {{- range $key, $value := .Values.controller.containerPort }}
- # controller.containerPort.{{ $key }}
- - min: {{ $value }}
- max: {{ $value }}
- {{- end }}
- {{- else if .Values.controller.hostPort.enabled }}
- {{- range $key, $value := .Values.controller.hostPort.ports }}
- # controller.hostPort.ports.{{ $key }}
- - min: {{ $value }}
- max: {{ $value }}
- {{- end }}
- {{- end }}
- {{- if .Values.controller.metrics.enabled }}
- # controller.metrics.port
- - min: {{ .Values.controller.metrics.port }}
- max: {{ .Values.controller.metrics.port }}
- {{- end }}
- {{- if .Values.controller.admissionWebhooks.enabled }}
- # controller.admissionWebhooks.port
- - min: {{ .Values.controller.admissionWebhooks.port }}
- max: {{ .Values.controller.admissionWebhooks.port }}
- {{- end }}
- {{- range $key, $value := .Values.tcp }}
- # tcp.{{ $key }}
- - min: {{ $key }}
- max: {{ $key }}
- {{- end }}
- {{- range $key, $value := .Values.udp }}
- # udp.{{ $key }}
- - min: {{ $key }}
- max: {{ $key }}
- {{- end }}
-{{- end }}
- volumes:
- - configMap
- - downwardAPI
- - emptyDir
- - secret
- - projected
- fsGroup:
- rule: MustRunAs
- ranges:
- - min: 1
- max: 65535
- readOnlyRootFilesystem: false
- runAsUser:
- rule: MustRunAsNonRoot
- runAsGroup:
- rule: MustRunAs
- ranges:
- - min: 1
- max: 65535
- supplementalGroups:
- rule: MustRunAs
- ranges:
- - min: 1
- max: 65535
- allowPrivilegeEscalation: {{ or .Values.controller.image.allowPrivilegeEscalation .Values.controller.image.chroot }}
- requiredDropCapabilities:
- - ALL
- allowedCapabilities:
- - NET_BIND_SERVICE
- {{- if .Values.controller.image.chroot }}
- {{- if .Values.controller.image.seccompProfile }}
- - SYS_ADMIN
- {{- end }}
- - SYS_CHROOT
- {{- end }}
- seLinux:
- rule: RunAsAny
-{{- if .Values.controller.sysctls }}
- allowedUnsafeSysctls:
- {{- range $sysctl, $value := .Values.controller.sysctls }}
- - {{ $sysctl }}
- {{- end }}
-{{- end }}
-{{- end }}
-{{- end }}
diff --git a/charts/ingress-nginx/templates/controller-role.yaml b/charts/ingress-nginx/templates/controller-role.yaml
index a94b39978..127b368c4 100644
--- a/charts/ingress-nginx/templates/controller-role.yaml
+++ b/charts/ingress-nginx/templates/controller-role.yaml
@@ -91,14 +91,4 @@ rules:
- list
- watch
- get
-{{- if .Values.podSecurityPolicy.enabled }}
- - apiGroups: [{{ template "podSecurityPolicy.apiGroup" . }}]
- resources: ['podsecuritypolicies']
- verbs: ['use']
- {{- with .Values.controller.existingPsp }}
- resourceNames: [{{ . }}]
- {{- else }}
- resourceNames: [{{ include "ingress-nginx.fullname" . }}]
- {{- end }}
-{{- end }}
{{- end }}
diff --git a/charts/ingress-nginx/templates/default-backend-psp.yaml b/charts/ingress-nginx/templates/default-backend-psp.yaml
deleted file mode 100644
index 424109109..000000000
--- a/charts/ingress-nginx/templates/default-backend-psp.yaml
+++ /dev/null
@@ -1,50 +0,0 @@
-{{- if (semverCompare "<1.25.0-0" .Capabilities.KubeVersion.Version) }}
-{{- if and .Values.podSecurityPolicy.enabled .Values.defaultBackend.enabled (empty .Values.defaultBackend.existingPsp) -}}
-apiVersion: policy/v1beta1
-kind: PodSecurityPolicy
-metadata:
- name: {{ include "ingress-nginx.fullname" . }}-backend
- annotations:
- seccomp.security.alpha.kubernetes.io/allowedProfileNames: "*"
- labels:
- {{- include "ingress-nginx.labels" . | nindent 4 }}
- app.kubernetes.io/component: default-backend
- {{- with .Values.defaultBackend.labels }}
- {{- toYaml . | nindent 4 }}
- {{- end }}
-spec:
- privileged: false
- hostPID: false
- hostIPC: false
- hostNetwork: false
- volumes:
- - configMap
- - downwardAPI
- - emptyDir
- - secret
- - projected
- fsGroup:
- rule: MustRunAs
- ranges:
- - min: 1
- max: 65535
- readOnlyRootFilesystem: true
- runAsUser:
- rule: MustRunAsNonRoot
- runAsGroup:
- rule: MustRunAs
- ranges:
- - min: 1
- max: 65535
- supplementalGroups:
- rule: MustRunAs
- ranges:
- - min: 1
- max: 65535
- allowPrivilegeEscalation: false
- requiredDropCapabilities:
- - ALL
- seLinux:
- rule: RunAsAny
-{{- end }}
-{{- end }}
diff --git a/charts/ingress-nginx/templates/default-backend-role.yaml b/charts/ingress-nginx/templates/default-backend-role.yaml
deleted file mode 100644
index dd7868aa0..000000000
--- a/charts/ingress-nginx/templates/default-backend-role.yaml
+++ /dev/null
@@ -1,22 +0,0 @@
-{{- if and .Values.rbac.create .Values.podSecurityPolicy.enabled .Values.defaultBackend.enabled -}}
-apiVersion: rbac.authorization.k8s.io/v1
-kind: Role
-metadata:
- labels:
- {{- include "ingress-nginx.labels" . | nindent 4 }}
- app.kubernetes.io/component: default-backend
- {{- with .Values.defaultBackend.labels }}
- {{- toYaml . | nindent 4 }}
- {{- end }}
- name: {{ include "ingress-nginx.fullname" . }}-backend
- namespace: {{ include "ingress-nginx.namespace" . }}
-rules:
- - apiGroups: [{{ template "podSecurityPolicy.apiGroup" . }}]
- resources: ['podsecuritypolicies']
- verbs: ['use']
- {{- with .Values.defaultBackend.existingPsp }}
- resourceNames: [{{ . }}]
- {{- else }}
- resourceNames: [{{ include "ingress-nginx.fullname" . }}-backend]
- {{- end }}
-{{- end }}
diff --git a/charts/ingress-nginx/templates/default-backend-rolebinding.yaml b/charts/ingress-nginx/templates/default-backend-rolebinding.yaml
deleted file mode 100644
index 3203b6f57..000000000
--- a/charts/ingress-nginx/templates/default-backend-rolebinding.yaml
+++ /dev/null
@@ -1,21 +0,0 @@
-{{- if and .Values.rbac.create .Values.podSecurityPolicy.enabled .Values.defaultBackend.enabled -}}
-apiVersion: rbac.authorization.k8s.io/v1
-kind: RoleBinding
-metadata:
- labels:
- {{- include "ingress-nginx.labels" . | nindent 4 }}
- app.kubernetes.io/component: default-backend
- {{- with .Values.defaultBackend.labels }}
- {{- toYaml . | nindent 4 }}
- {{- end }}
- name: {{ include "ingress-nginx.fullname" . }}-backend
- namespace: {{ include "ingress-nginx.namespace" . }}
-roleRef:
- apiGroup: rbac.authorization.k8s.io
- kind: Role
- name: {{ include "ingress-nginx.fullname" . }}-backend
-subjects:
- - kind: ServiceAccount
- name: {{ template "ingress-nginx.defaultBackend.serviceAccountName" . }}
- namespace: {{ include "ingress-nginx.namespace" . }}
-{{- end }}
diff --git a/charts/ingress-nginx/values.yaml b/charts/ingress-nginx/values.yaml
index 46cfa089b..bd8955500 100644
--- a/charts/ingress-nginx/values.yaml
+++ b/charts/ingress-nginx/values.yaml
@@ -41,8 +41,6 @@ controller:
seccompProfile:
type: RuntimeDefault
readOnlyRootFilesystem: false
- # -- Use an existing PSP instead of creating one
- existingPsp: ""
# -- Configures the controller container name
containerName: controller
# -- Configures the ports that the nginx-controller listens on
@@ -758,8 +756,6 @@ controller:
objectSelector: {}
# -- Labels to be added to admission webhooks
labels: {}
- # -- Use an existing PSP instead of creating one
- existingPsp: ""
service:
annotations: {}
# clusterIP: ""
@@ -979,8 +975,6 @@ defaultBackend:
seccompProfile:
type: RuntimeDefault
readOnlyRootFilesystem: true
- # -- Use an existing PSP instead of creating one
- existingPsp: ""
extraArgs: {}
serviceAccount:
create: true
@@ -1166,10 +1160,6 @@ defaultBackend:
rbac:
create: true
scope: false
-## If true, create & use Pod Security Policy resources
-## https://kubernetes.io/docs/concepts/policy/pod-security-policy/
-podSecurityPolicy:
- enabled: false
serviceAccount:
create: true
name: ""
diff --git a/docs/examples/psp/README.md b/docs/examples/psp/README.md
deleted file mode 100644
index f8426baf2..000000000
--- a/docs/examples/psp/README.md
+++ /dev/null
@@ -1,17 +0,0 @@
-# Pod Security Policy (PSP)
-
-In most clusters today, by default, all resources (e.g. `Deployments` and `ReplicatSets`)
-have permissions to create pods.
-Kubernetes however provides a more fine-grained authorization policy called
-[Pod Security Policy (PSP)](https://kubernetes.io/docs/concepts/policy/pod-security-policy/).
-
-PSP allows the cluster owner to define the permission of each object, for example creating a pod.
-If you have PSP enabled on the cluster, and you deploy ingress-nginx,
-you will need to provide the `Deployment` with the permissions to create pods.
-
-Before applying any objects, first apply the PSP permissions by running:
-```console
-kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/main/docs/examples/psp/psp.yaml
-```
-
-Note: PSP permissions must be granted before the creation of the `Deployment` and the `ReplicaSet`.
diff --git a/docs/examples/psp/psp.yaml b/docs/examples/psp/psp.yaml
deleted file mode 100644
index 0f859dece..000000000
--- a/docs/examples/psp/psp.yaml
+++ /dev/null
@@ -1,75 +0,0 @@
-apiVersion: v1
-kind: Namespace
-metadata:
- name: ingress-nginx
-
----
-
-apiVersion: policy/v1beta1
-kind: PodSecurityPolicy
-metadata:
- name: ingress-nginx
- namespace: ingress-nginx
-spec:
- allowedCapabilities:
- - NET_BIND_SERVICE
- privileged: false
- allowPrivilegeEscalation: true
- # Allow core volume types.
- volumes:
- - configMap
- - secret
- hostIPC: false
- hostPID: false
- runAsUser:
- # Require the container to run without root privileges.
- rule: MustRunAsNonRoot
- supplementalGroups:
- rule: MustRunAs
- ranges:
- # Forbid adding the root group.
- - min: 1
- max: 65535
- fsGroup:
- rule: MustRunAs
- ranges:
- # Forbid adding the root group.
- - min: 1
- max: 65535
- readOnlyRootFilesystem: false
- seLinux:
- rule: RunAsAny
-
----
-
-apiVersion: rbac.authorization.k8s.io/v1
-kind: Role
-metadata:
- name: ingress-nginx-psp
- namespace: ingress-nginx
-rules:
-- apiGroups: [policy]
- resources: [podsecuritypolicies]
- verbs: [use]
- resourceNames: [ingress-nginx]
-
----
-
-apiVersion: rbac.authorization.k8s.io/v1
-kind: RoleBinding
-metadata:
- name: ingress-nginx-psp
- namespace: ingress-nginx
-roleRef:
- apiGroup: rbac.authorization.k8s.io
- kind: Role
- name: ingress-nginx-psp
-subjects:
-- kind: ServiceAccount
- name: default
-- kind: ServiceAccount
- name: ingress-nginx
- namespace: ingress-nginx
-- kind: ServiceAccount
- name: ingress-nginx-admission
- namespace: ingress-nginx
diff --git a/docs/troubleshooting.md b/docs/troubleshooting.md
index e1fd6956e..ffd8f839f 100644
--- a/docs/troubleshooting.md
+++ b/docs/troubleshooting.md
@@ -443,7 +443,7 @@ $ capsh --decode=0000000000000400
```
## Create a test pod as root
-(Note, this may be restricted by PodSecurityPolicy, PodSecurityAdmission/Standards, OPA Gatekeeper, etc. in which case you will need to do the appropriate workaround for testing, e.g. deploy in a new namespace without the restrictions.)
+(Note, this may be restricted by PodSecurityAdmission/Standards, OPA Gatekeeper, etc. in which case you will need to do the appropriate workaround for testing, e.g. deploy in a new namespace without the restrictions.)
To test further you may want to install additional utilities, etc. Modify the pod yaml by:
* changing runAsUser from 101 to 0
* removing the "drop..ALL" section from the capabilities.
diff --git a/magefiles/utils/helm.go b/magefiles/utils/helm.go
index dea68caab..677e322f5 100644
--- a/magefiles/utils/helm.go
+++ b/magefiles/utils/helm.go
@@ -31,7 +31,6 @@ type IngressChartValue struct {
RunAsUser int `yaml:"runAsUser"`
AllowPrivilegeEscalation bool `yaml:"allowPrivilegeEscalation"`
} `yaml:"image"`
- ExistingPsp string `yaml:"existingPsp"`
ContainerName string `yaml:"containerName"`
ContainerPort struct {
HTTP int `yaml:"http"`
@@ -226,7 +225,6 @@ type IngressChartValue struct {
NamespaceSelector struct{} `yaml:"namespaceSelector"`
ObjectSelector struct{} `yaml:"objectSelector"`
Labels struct{} `yaml:"labels"`
- ExistingPsp string `yaml:"existingPsp"`
NetworkPolicyEnabled bool `yaml:"networkPolicyEnabled"`
Service struct {
Annotations struct{} `yaml:"annotations"`
@@ -329,7 +327,6 @@ type IngressChartValue struct {
ReadOnlyRootFilesystem bool `yaml:"readOnlyRootFilesystem"`
AllowPrivilegeEscalation bool `yaml:"allowPrivilegeEscalation"`
} `yaml:"image"`
- ExistingPsp string `yaml:"existingPsp"`
ExtraArgs struct{} `yaml:"extraArgs"`
ServiceAccount struct {
Create bool `yaml:"create"`
@@ -388,9 +385,6 @@ type IngressChartValue struct {
Create bool `yaml:"create"`
Scope bool `yaml:"scope"`
} `yaml:"rbac"`
- PodSecurityPolicy struct {
- Enabled bool `yaml:"enabled"`
- } `yaml:"podSecurityPolicy"`
ServiceAccount struct {
Create bool `yaml:"create"`
Name string `yaml:"name"`
diff --git a/mkdocs.yml b/mkdocs.yml
index 4b010c5ff..b9cf7917a 100644
--- a/mkdocs.yml
+++ b/mkdocs.yml
@@ -124,7 +124,6 @@ nav:
- Rewrite: "examples/rewrite/README.md"
- Static IPs: "examples/static-ip/README.md"
- TLS termination: "examples/tls-termination/README.md"
- - Pod Security Policy (PSP): "examples/psp/README.md"
- Open Policy Agent rules: "examples/openpolicyagent/README.md"
- Canary Deployments: "examples/canary/README.md"
- Developer Guide:
From 8bf0624c51680143be7ba0c34c681e1bcc6acb2b Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 16 Sep 2024 13:38:46 +0200
Subject: [PATCH 236/283] Bump github/codeql-action from 3.26.6 to 3.26.7 in
the all group (#11976)
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
.github/workflows/scorecards.yml | 2 +-
.github/workflows/vulnerability-scans.yaml | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/.github/workflows/scorecards.yml b/.github/workflows/scorecards.yml
index a1e9c4ecc..4affccb2d 100644
--- a/.github/workflows/scorecards.yml
+++ b/.github/workflows/scorecards.yml
@@ -59,6 +59,6 @@ jobs:
# Upload the results to GitHub's code scanning dashboard.
- name: "Upload to code-scanning"
- uses: github/codeql-action/upload-sarif@4dd16135b69a43b6c8efb853346f8437d92d3c93 # v3.26.6
+ uses: github/codeql-action/upload-sarif@8214744c546c1e5c8f03dde8fab3a7353211988d # v3.26.7
with:
sarif_file: results.sarif
diff --git a/.github/workflows/vulnerability-scans.yaml b/.github/workflows/vulnerability-scans.yaml
index d4a53a352..bed49e46f 100644
--- a/.github/workflows/vulnerability-scans.yaml
+++ b/.github/workflows/vulnerability-scans.yaml
@@ -75,7 +75,7 @@ jobs:
# This step checks out a copy of your repository.
- name: Upload SARIF file
- uses: github/codeql-action/upload-sarif@4dd16135b69a43b6c8efb853346f8437d92d3c93 # v3.26.6
+ uses: github/codeql-action/upload-sarif@8214744c546c1e5c8f03dde8fab3a7353211988d # v3.26.7
with:
token: ${{ github.token }}
# Path to SARIF file relative to the root of the repository
From 2cbe9b06101d3d021c9c66592492e0e97d1b8cc5 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 16 Sep 2024 13:38:59 +0200
Subject: [PATCH 237/283] Bump the all group with 2 updates (#11977)
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 10 +++++-----
go.sum | 20 ++++++++++----------
2 files changed, 15 insertions(+), 15 deletions(-)
diff --git a/go.mod b/go.mod
index 1dc95fd5c..0d57591b2 100644
--- a/go.mod
+++ b/go.mod
@@ -27,18 +27,18 @@ require (
github.com/zakjan/cert-chain-resolver v0.0.0-20221221105603-fcedb00c5b30
golang.org/x/crypto v0.27.0
golang.org/x/exp v0.0.0-20240719175910-8a7402abbf56
- google.golang.org/grpc v1.66.0
+ google.golang.org/grpc v1.66.2
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab
gopkg.in/go-playground/pool.v3 v3.1.1
gopkg.in/mcuadros/go-syslog.v2 v2.3.0
- k8s.io/api v0.31.0
+ k8s.io/api v0.31.1
k8s.io/apiextensions-apiserver v0.31.0
- k8s.io/apimachinery v0.31.0
+ k8s.io/apimachinery v0.31.1
k8s.io/apiserver v0.31.0
k8s.io/cli-runtime v0.30.0
- k8s.io/client-go v0.31.0
+ k8s.io/client-go v0.31.1
k8s.io/code-generator v0.31.0
- k8s.io/component-base v0.31.0
+ k8s.io/component-base v0.31.1
k8s.io/klog/v2 v2.130.1
pault.ag/go/sniff v0.0.0-20200207005214-cf7e4d167732
sigs.k8s.io/controller-runtime v0.19.0
diff --git a/go.sum b/go.sum
index 5e87f616c..50f389342 100644
--- a/go.sum
+++ b/go.sum
@@ -301,8 +301,8 @@ gomodules.xyz/jsonpatch/v2 v2.4.0 h1:Ci3iUJyx9UeRx7CeFN8ARgGbkESwJK+KB9lLcWxY/Zw
gomodules.xyz/jsonpatch/v2 v2.4.0/go.mod h1:AH3dM2RI6uoBZxn3LVrfvJ3E0/9dG4cSrbuBJT4moAY=
google.golang.org/genproto/googleapis/rpc v0.0.0-20240701130421-f6361c86f094 h1:BwIjyKYGsK9dMCBOorzRri8MQwmi7mT9rGHsCEinZkA=
google.golang.org/genproto/googleapis/rpc v0.0.0-20240701130421-f6361c86f094/go.mod h1:Ue6ibwXGpU+dqIcODieyLOcgj7z8+IcskoNIgZxtrFY=
-google.golang.org/grpc v1.66.0 h1:DibZuoBznOxbDQxRINckZcUvnCEvrW9pcWIE2yF9r1c=
-google.golang.org/grpc v1.66.0/go.mod h1:s3/l6xSSCURdVfAnL+TqCNMyTDAGN6+lZeVxnZR128Y=
+google.golang.org/grpc v1.66.2 h1:3QdXkuq3Bkh7w+ywLdLvM56cmGvQHUMZpiCzt6Rqaoo=
+google.golang.org/grpc v1.66.2/go.mod h1:s3/l6xSSCURdVfAnL+TqCNMyTDAGN6+lZeVxnZR128Y=
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab h1:tg8hvIl5RmFBuXlcJMuL0h4Psh1gx5Q5xEMwzBZIzWA=
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab/go.mod h1:liVNnGuZDITxuksuZ+BBvdy7FcJfeNk+efF9qgqNUmc=
google.golang.org/protobuf v0.0.0-20200109180630-ec00e32a8dfd/go.mod h1:DFci5gLYBciE7Vtevhsrf46CRTquxDuWsQurQQe4oz8=
@@ -341,22 +341,22 @@ gopkg.in/yaml.v2 v2.4.0/go.mod h1:RDklbk79AGWmwhnvt/jBztapEOGDOx6ZbXqjP6csGnQ=
gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA=
gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
-k8s.io/api v0.31.0 h1:b9LiSjR2ym/SzTOlfMHm1tr7/21aD7fSkqgD/CVJBCo=
-k8s.io/api v0.31.0/go.mod h1:0YiFF+JfFxMM6+1hQei8FY8M7s1Mth+z/q7eF1aJkTE=
+k8s.io/api v0.31.1 h1:Xe1hX/fPW3PXYYv8BlozYqw63ytA92snr96zMW9gWTU=
+k8s.io/api v0.31.1/go.mod h1:sbN1g6eY6XVLeqNsZGLnI5FwVseTrZX7Fv3O26rhAaI=
k8s.io/apiextensions-apiserver v0.31.0 h1:fZgCVhGwsclj3qCw1buVXCV6khjRzKC5eCFt24kyLSk=
k8s.io/apiextensions-apiserver v0.31.0/go.mod h1:b9aMDEYaEe5sdK+1T0KU78ApR/5ZVp4i56VacZYEHxk=
-k8s.io/apimachinery v0.31.0 h1:m9jOiSr3FoSSL5WO9bjm1n6B9KROYYgNZOb4tyZ1lBc=
-k8s.io/apimachinery v0.31.0/go.mod h1:rsPdaZJfTfLsNJSQzNHQvYoTmxhoOEofxtOsF3rtsMo=
+k8s.io/apimachinery v0.31.1 h1:mhcUBbj7KUjaVhyXILglcVjuS4nYXiwC+KKFBgIVy7U=
+k8s.io/apimachinery v0.31.1/go.mod h1:rsPdaZJfTfLsNJSQzNHQvYoTmxhoOEofxtOsF3rtsMo=
k8s.io/apiserver v0.31.0 h1:p+2dgJjy+bk+B1Csz+mc2wl5gHwvNkC9QJV+w55LVrY=
k8s.io/apiserver v0.31.0/go.mod h1:KI9ox5Yu902iBnnyMmy7ajonhKnkeZYJhTZ/YI+WEMk=
k8s.io/cli-runtime v0.30.0 h1:0vn6/XhOvn1RJ2KJOC6IRR2CGqrpT6QQF4+8pYpWQ48=
k8s.io/cli-runtime v0.30.0/go.mod h1:vATpDMATVTMA79sZ0YUCzlMelf6rUjoBzlp+RnoM+cg=
-k8s.io/client-go v0.31.0 h1:QqEJzNjbN2Yv1H79SsS+SWnXkBgVu4Pj3CJQgbx0gI8=
-k8s.io/client-go v0.31.0/go.mod h1:Y9wvC76g4fLjmU0BA+rV+h2cncoadjvjjkkIGoTLcGU=
+k8s.io/client-go v0.31.1 h1:f0ugtWSbWpxHR7sjVpQwuvw9a3ZKLXX0u0itkFXufb0=
+k8s.io/client-go v0.31.1/go.mod h1:sKI8871MJN2OyeqRlmA4W4KM9KBdBUpDLu/43eGemCg=
k8s.io/code-generator v0.31.0 h1:w607nrMi1KeDKB3/F/J4lIoOgAwc+gV9ZKew4XRfMp8=
k8s.io/code-generator v0.31.0/go.mod h1:84y4w3es8rOJOUUP1rLsIiGlO1JuEaPFXQPA9e/K6U0=
-k8s.io/component-base v0.31.0 h1:/KIzGM5EvPNQcYgwq5NwoQBaOlVFrghoVGr8lG6vNRs=
-k8s.io/component-base v0.31.0/go.mod h1:TYVuzI1QmN4L5ItVdMSXKvH7/DtvIuas5/mm8YT3rTo=
+k8s.io/component-base v0.31.1 h1:UpOepcrX3rQ3ab5NB6g5iP0tvsgJWzxTyAo20sgYSy8=
+k8s.io/component-base v0.31.1/go.mod h1:WGeaw7t/kTsqpVTaCoVEtillbqAhF2/JgvO0LDOMa0w=
k8s.io/gengo/v2 v2.0.0-20240404160639-a0386bf69313 h1:bKcdZJOPICVmIIuaM9+MXmapE94dn5AYv5ODs1jA43o=
k8s.io/gengo/v2 v2.0.0-20240404160639-a0386bf69313/go.mod h1:VH3AT8AaQOqiGjMF9p0/IM1Dj+82ZwjfxUP1IxaHE+8=
k8s.io/klog/v2 v2.130.1 h1:n9Xl7H1Xvksem4KFG4PYbdQCQxqc/tTUyrgXaOhHSzk=
From 9e6c40664fe81c210a6e07e35bee0592842b9f05 Mon Sep 17 00:00:00 2001
From: alexey-gavrilov-flant
<53515419+alexey-gavrilov-flant@users.noreply.github.com>
Date: Tue, 17 Sep 2024 22:12:43 +0300
Subject: [PATCH 238/283] Metrics: Fix namespace in
`nginx_ingress_controller_ssl_expire_time_seconds`. (#10274)
---
internal/ingress/metric/collectors/controller.go | 1 +
internal/ingress/metric/collectors/controller_test.go | 4 +++-
2 files changed, 4 insertions(+), 1 deletion(-)
diff --git a/internal/ingress/metric/collectors/controller.go b/internal/ingress/metric/collectors/controller.go
index 697b57ca8..0df04c1d0 100644
--- a/internal/ingress/metric/collectors/controller.go
+++ b/internal/ingress/metric/collectors/controller.go
@@ -305,6 +305,7 @@ func (cm *Controller) SetSSLExpireTime(servers []*ingress.Server) {
}
labels["host"] = s.Hostname
labels["secret_name"] = s.SSLCert.Name
+ labels["namespace"] = s.SSLCert.Namespace
labels["identifier"] = s.SSLCert.Identifier()
cm.sslExpireTime.With(labels).Set(float64(s.SSLCert.ExpireTime.Unix()))
diff --git a/internal/ingress/metric/collectors/controller_test.go b/internal/ingress/metric/collectors/controller_test.go
index 7c7ea8a67..a77293c20 100644
--- a/internal/ingress/metric/collectors/controller_test.go
+++ b/internal/ingress/metric/collectors/controller_test.go
@@ -88,6 +88,8 @@ func TestControllerCounters(t *testing.T) {
Hostname: "demo",
SSLCert: &ingress.SSLCert{
ExpireTime: t1,
+ Name: "secret-name",
+ Namespace: "secret-namespace",
Certificate: &x509.Certificate{
PublicKeyAlgorithm: x509.ECDSA,
Issuer: pkix.Name{
@@ -111,7 +113,7 @@ func TestControllerCounters(t *testing.T) {
want: `
# HELP nginx_ingress_controller_ssl_expire_time_seconds Number of seconds since 1970 to the SSL Certificate expire.\n An example to check if this certificate will expire in 10 days is: "nginx_ingress_controller_ssl_expire_time_seconds < (time() + (10 * 24 * 3600))"
# TYPE nginx_ingress_controller_ssl_expire_time_seconds gauge
- nginx_ingress_controller_ssl_expire_time_seconds{class="nginx",host="demo",identifier="abcd1234-100",namespace="default",secret_name=""} 1.351807721e+09
+ nginx_ingress_controller_ssl_expire_time_seconds{class="nginx",host="demo",identifier="abcd1234-100",namespace="secret-namespace",secret_name="secret-name"} 1.351807721e+09
`,
metrics: []string{"nginx_ingress_controller_ssl_expire_time_seconds"},
},
From 435d5365b4c37ba0f9e11273573e18fdbe6f93cb Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Fri, 20 Sep 2024 14:04:48 +0200
Subject: [PATCH 239/283] Chart: Align default backend `PodDisruptionBudget`.
(#11993)
---
charts/ingress-nginx/README.md | 2 +-
.../default-backend-poddisruptionbudget.yaml | 6 ++-
...ault-backend-poddisruptionbudget_test.yaml | 48 +++++++++++++++++++
charts/ingress-nginx/values.yaml | 1 +
4 files changed, 55 insertions(+), 2 deletions(-)
create mode 100644 charts/ingress-nginx/tests/default-backend-poddisruptionbudget_test.yaml
diff --git a/charts/ingress-nginx/README.md b/charts/ingress-nginx/README.md
index 8c06cdce2..b450fe058 100644
--- a/charts/ingress-nginx/README.md
+++ b/charts/ingress-nginx/README.md
@@ -516,7 +516,7 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
| defaultBackend.livenessProbe.periodSeconds | int | `10` | |
| defaultBackend.livenessProbe.successThreshold | int | `1` | |
| defaultBackend.livenessProbe.timeoutSeconds | int | `5` | |
-| defaultBackend.minAvailable | int | `1` | |
+| defaultBackend.minAvailable | int | `1` | Minimum available pods set in PodDisruptionBudget. |
| defaultBackend.minReadySeconds | int | `0` | `minReadySeconds` to avoid killing pods before we are ready # |
| defaultBackend.name | string | `"defaultbackend"` | |
| defaultBackend.networkPolicy.enabled | bool | `false` | Enable 'networkPolicy' or not |
diff --git a/charts/ingress-nginx/templates/default-backend-poddisruptionbudget.yaml b/charts/ingress-nginx/templates/default-backend-poddisruptionbudget.yaml
index f869e4530..c8363fd4b 100644
--- a/charts/ingress-nginx/templates/default-backend-poddisruptionbudget.yaml
+++ b/charts/ingress-nginx/templates/default-backend-poddisruptionbudget.yaml
@@ -1,5 +1,9 @@
{{- if .Values.defaultBackend.enabled -}}
-{{- if or (gt (.Values.defaultBackend.replicaCount | int) 1) (gt (.Values.defaultBackend.autoscaling.minReplicas | int) 1) }}
+{{- $replicas := .Values.defaultBackend.replicaCount }}
+{{- if .Values.defaultBackend.autoscaling.enabled }}
+{{- $replicas = .Values.defaultBackend.autoscaling.minReplicas }}
+{{- end }}
+{{- if gt ($replicas | int) 1 }}
apiVersion: {{ ternary "policy/v1" "policy/v1beta1" (semverCompare ">=1.21.0-0" .Capabilities.KubeVersion.Version) }}
kind: PodDisruptionBudget
metadata:
diff --git a/charts/ingress-nginx/tests/default-backend-poddisruptionbudget_test.yaml b/charts/ingress-nginx/tests/default-backend-poddisruptionbudget_test.yaml
new file mode 100644
index 000000000..095801862
--- /dev/null
+++ b/charts/ingress-nginx/tests/default-backend-poddisruptionbudget_test.yaml
@@ -0,0 +1,48 @@
+suite: Default Backend > PodDisruptionBudget
+templates:
+ - default-backend-poddisruptionbudget.yaml
+
+tests:
+ - it: should create a PodDisruptionBudget if `defaultBackend.replicaCount` is greater than 1
+ set:
+ defaultBackend.enabled: true
+ defaultBackend.replicaCount: 2
+ asserts:
+ - hasDocuments:
+ count: 1
+ - isKind:
+ of: PodDisruptionBudget
+ - equal:
+ path: metadata.name
+ value: RELEASE-NAME-ingress-nginx-defaultbackend
+
+ - it: should not create a PodDisruptionBudget if `defaultBackend.replicaCount` is less than or equal 1
+ set:
+ defaultBackend.enabled: true
+ defaultBackend.replicaCount: 1
+ asserts:
+ - hasDocuments:
+ count: 0
+
+ - it: should create a PodDisruptionBudget if `defaultBackend.autoscaling.enabled` is true and `defaultBackend.autoscaling.minReplicas` is greater than 1
+ set:
+ defaultBackend.enabled: true
+ defaultBackend.autoscaling.enabled: true
+ defaultBackend.autoscaling.minReplicas: 2
+ asserts:
+ - hasDocuments:
+ count: 1
+ - isKind:
+ of: PodDisruptionBudget
+ - equal:
+ path: metadata.name
+ value: RELEASE-NAME-ingress-nginx-defaultbackend
+
+ - it: should not create a PodDisruptionBudget if `defaultBackend.autoscaling.enabled` is true and `defaultBackend.autoscaling.minReplicas` is less than or equal 1
+ set:
+ defaultBackend.enabled: true
+ defaultBackend.autoscaling.enabled: true
+ defaultBackend.autoscaling.minReplicas: 1
+ asserts:
+ - hasDocuments:
+ count: 0
diff --git a/charts/ingress-nginx/values.yaml b/charts/ingress-nginx/values.yaml
index bd8955500..51bb180a3 100644
--- a/charts/ingress-nginx/values.yaml
+++ b/charts/ingress-nginx/values.yaml
@@ -1096,6 +1096,7 @@ defaultBackend:
##
podAnnotations: {}
replicaCount: 1
+ # -- Minimum available pods set in PodDisruptionBudget.
minAvailable: 1
resources: {}
# limits:
From b2bc9618d3aaae3234fe30d36a937b2f7488357a Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Fri, 20 Sep 2024 14:19:54 +0200
Subject: [PATCH 240/283] Chart: Test `controller.minAvailable` &
`controller.maxUnavailable`. (#12000)
---
.../controller-poddisruptionbudget_test.yaml | 16 ++++++++++++++++
1 file changed, 16 insertions(+)
diff --git a/charts/ingress-nginx/tests/controller-poddisruptionbudget_test.yaml b/charts/ingress-nginx/tests/controller-poddisruptionbudget_test.yaml
index 48b4fafcc..f215f3520 100644
--- a/charts/ingress-nginx/tests/controller-poddisruptionbudget_test.yaml
+++ b/charts/ingress-nginx/tests/controller-poddisruptionbudget_test.yaml
@@ -71,3 +71,19 @@ tests:
asserts:
- hasDocuments:
count: 0
+
+ - it: should create a PodDisruptionBudget without `minAvailable` and with `maxUnavailable` if `controller.minAvailable` and `controller.maxUnavailable` are set
+ set:
+ controller.replicaCount: 2
+ controller.minAvailable: 1
+ controller.maxUnavailable: 1
+ asserts:
+ - hasDocuments:
+ count: 1
+ - isKind:
+ of: PodDisruptionBudget
+ - notExists:
+ path: spec.minAvailable
+ - equal:
+ path: spec.maxUnavailable
+ value: 1
From 43a7d8d5fe90ecbccadb956f6592928691eb0881 Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Fri, 20 Sep 2024 14:25:03 +0200
Subject: [PATCH 241/283] Chart: Add `defaultBackend.maxUnavailable`. (#11995)
---
charts/ingress-nginx/README.md | 2 +-
.../default-backend-poddisruptionbudget.yaml | 4 ++++
...efault-backend-poddisruptionbudget_test.yaml | 17 +++++++++++++++++
charts/ingress-nginx/values.yaml | 4 ++++
4 files changed, 26 insertions(+), 1 deletion(-)
diff --git a/charts/ingress-nginx/README.md b/charts/ingress-nginx/README.md
index b450fe058..4b62feb99 100644
--- a/charts/ingress-nginx/README.md
+++ b/charts/ingress-nginx/README.md
@@ -516,7 +516,7 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
| defaultBackend.livenessProbe.periodSeconds | int | `10` | |
| defaultBackend.livenessProbe.successThreshold | int | `1` | |
| defaultBackend.livenessProbe.timeoutSeconds | int | `5` | |
-| defaultBackend.minAvailable | int | `1` | Minimum available pods set in PodDisruptionBudget. |
+| defaultBackend.minAvailable | int | `1` | Minimum available pods set in PodDisruptionBudget. Define either 'minAvailable' or 'maxUnavailable', never both. |
| defaultBackend.minReadySeconds | int | `0` | `minReadySeconds` to avoid killing pods before we are ready # |
| defaultBackend.name | string | `"defaultbackend"` | |
| defaultBackend.networkPolicy.enabled | bool | `false` | Enable 'networkPolicy' or not |
diff --git a/charts/ingress-nginx/templates/default-backend-poddisruptionbudget.yaml b/charts/ingress-nginx/templates/default-backend-poddisruptionbudget.yaml
index c8363fd4b..42055f819 100644
--- a/charts/ingress-nginx/templates/default-backend-poddisruptionbudget.yaml
+++ b/charts/ingress-nginx/templates/default-backend-poddisruptionbudget.yaml
@@ -20,6 +20,10 @@ spec:
matchLabels:
{{- include "ingress-nginx.selectorLabels" . | nindent 6 }}
app.kubernetes.io/component: default-backend
+ {{- if and .Values.defaultBackend.minAvailable (not (hasKey .Values.defaultBackend "maxUnavailable")) }}
minAvailable: {{ .Values.defaultBackend.minAvailable }}
+ {{- else if .Values.defaultBackend.maxUnavailable }}
+ maxUnavailable: {{ .Values.defaultBackend.maxUnavailable }}
+ {{- end }}
{{- end }}
{{- end }}
diff --git a/charts/ingress-nginx/tests/default-backend-poddisruptionbudget_test.yaml b/charts/ingress-nginx/tests/default-backend-poddisruptionbudget_test.yaml
index 095801862..9ca837dca 100644
--- a/charts/ingress-nginx/tests/default-backend-poddisruptionbudget_test.yaml
+++ b/charts/ingress-nginx/tests/default-backend-poddisruptionbudget_test.yaml
@@ -46,3 +46,20 @@ tests:
asserts:
- hasDocuments:
count: 0
+
+ - it: should create a PodDisruptionBudget without `minAvailable` and with `maxUnavailable` if `defaultBackend.minAvailable` and `defaultBackend.maxUnavailable` are set
+ set:
+ defaultBackend.enabled: true
+ defaultBackend.replicaCount: 2
+ defaultBackend.minAvailable: 1
+ defaultBackend.maxUnavailable: 1
+ asserts:
+ - hasDocuments:
+ count: 1
+ - isKind:
+ of: PodDisruptionBudget
+ - notExists:
+ path: spec.minAvailable
+ - equal:
+ path: spec.maxUnavailable
+ value: 1
diff --git a/charts/ingress-nginx/values.yaml b/charts/ingress-nginx/values.yaml
index 51bb180a3..ffb8a4ae3 100644
--- a/charts/ingress-nginx/values.yaml
+++ b/charts/ingress-nginx/values.yaml
@@ -1097,7 +1097,11 @@ defaultBackend:
podAnnotations: {}
replicaCount: 1
# -- Minimum available pods set in PodDisruptionBudget.
+ # Define either 'minAvailable' or 'maxUnavailable', never both.
minAvailable: 1
+ # -- Maximum unavailable pods set in PodDisruptionBudget. If set, 'minAvailable' is ignored.
+ # maxUnavailable: 1
+
resources: {}
# limits:
# cpu: 10m
From 17209eb3a93bf2d3c08c639125f050070e53acd2 Mon Sep 17 00:00:00 2001
From: chengjoey <30427474+chengjoey@users.noreply.github.com>
Date: Fri, 20 Sep 2024 20:34:38 +0800
Subject: [PATCH 242/283] Chart: Implement `unhealthyPodEvictionPolicy`.
(#11992)
---
charts/ingress-nginx/README.md | 2 ++
.../templates/controller-poddisruptionbudget.yaml | 3 +++
.../default-backend-poddisruptionbudget.yaml | 3 +++
.../tests/controller-poddisruptionbudget_test.yaml | 13 +++++++++++++
.../default-backend-poddisruptionbudget_test.yaml | 14 ++++++++++++++
charts/ingress-nginx/values.yaml | 6 ++++++
6 files changed, 41 insertions(+)
diff --git a/charts/ingress-nginx/README.md b/charts/ingress-nginx/README.md
index 4b62feb99..1cc269afe 100644
--- a/charts/ingress-nginx/README.md
+++ b/charts/ingress-nginx/README.md
@@ -484,6 +484,7 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
| controller.topologySpreadConstraints | list | `[]` | Topology spread constraints rely on node labels to identify the topology domain(s) that each Node is in. # Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/ # |
| controller.udp.annotations | object | `{}` | Annotations to be added to the udp config configmap |
| controller.udp.configMapNamespace | string | `""` | Allows customization of the udp-services-configmap; defaults to $(POD_NAMESPACE) |
+| controller.unhealthyPodEvictionPolicy | string | `""` | Eviction policy for unhealthy pods guarded by PodDisruptionBudget. Ref: https://kubernetes.io/blog/2023/01/06/unhealthy-pod-eviction-policy-for-pdbs/ |
| controller.updateStrategy | object | `{}` | The update strategy to apply to the Deployment or DaemonSet # |
| controller.watchIngressWithoutClass | bool | `false` | Process Ingress objects without ingressClass annotation/ingressClassName field Overrides value for --watch-ingress-without-class flag of the controller binary Defaults to false |
| defaultBackend.affinity | object | `{}` | Affinity and anti-affinity rules for server scheduling to nodes # Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity |
@@ -543,6 +544,7 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
| defaultBackend.serviceAccount.name | string | `""` | |
| defaultBackend.tolerations | list | `[]` | Node tolerations for server scheduling to nodes with taints # Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/ # |
| defaultBackend.topologySpreadConstraints | list | `[]` | Topology spread constraints rely on node labels to identify the topology domain(s) that each Node is in. Ref.: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/ |
+| defaultBackend.unhealthyPodEvictionPolicy | string | `""` | Eviction policy for unhealthy pods guarded by PodDisruptionBudget. Ref: https://kubernetes.io/blog/2023/01/06/unhealthy-pod-eviction-policy-for-pdbs/ |
| defaultBackend.updateStrategy | object | `{}` | The update strategy to apply to the Deployment or DaemonSet # |
| dhParam | string | `""` | A base64-encoded Diffie-Hellman parameter. This can be generated with: `openssl dhparam 4096 2> /dev/null | base64` # Ref: https://github.com/kubernetes/ingress-nginx/tree/main/docs/examples/customization/ssl-dh-param |
| imagePullSecrets | list | `[]` | Optional array of imagePullSecrets containing private registry credentials # Ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ |
diff --git a/charts/ingress-nginx/templates/controller-poddisruptionbudget.yaml b/charts/ingress-nginx/templates/controller-poddisruptionbudget.yaml
index 8e0181f9f..a1f5fbba2 100644
--- a/charts/ingress-nginx/templates/controller-poddisruptionbudget.yaml
+++ b/charts/ingress-nginx/templates/controller-poddisruptionbudget.yaml
@@ -32,5 +32,8 @@ spec:
{{- else if .Values.controller.maxUnavailable }}
maxUnavailable: {{ .Values.controller.maxUnavailable }}
{{- end }}
+ {{- if .Values.controller.unhealthyPodEvictionPolicy }}
+ unhealthyPodEvictionPolicy: {{ .Values.controller.unhealthyPodEvictionPolicy }}
+ {{- end }}
{{- end }}
{{- end }}
diff --git a/charts/ingress-nginx/templates/default-backend-poddisruptionbudget.yaml b/charts/ingress-nginx/templates/default-backend-poddisruptionbudget.yaml
index 42055f819..e399ea8a4 100644
--- a/charts/ingress-nginx/templates/default-backend-poddisruptionbudget.yaml
+++ b/charts/ingress-nginx/templates/default-backend-poddisruptionbudget.yaml
@@ -25,5 +25,8 @@ spec:
{{- else if .Values.defaultBackend.maxUnavailable }}
maxUnavailable: {{ .Values.defaultBackend.maxUnavailable }}
{{- end }}
+ {{- if .Values.defaultBackend.unhealthyPodEvictionPolicy }}
+ unhealthyPodEvictionPolicy: {{ .Values.defaultBackend.unhealthyPodEvictionPolicy }}
+ {{- end }}
{{- end }}
{{- end }}
diff --git a/charts/ingress-nginx/tests/controller-poddisruptionbudget_test.yaml b/charts/ingress-nginx/tests/controller-poddisruptionbudget_test.yaml
index f215f3520..5ac986fc7 100644
--- a/charts/ingress-nginx/tests/controller-poddisruptionbudget_test.yaml
+++ b/charts/ingress-nginx/tests/controller-poddisruptionbudget_test.yaml
@@ -87,3 +87,16 @@ tests:
- equal:
path: spec.maxUnavailable
value: 1
+
+ - it: should create a PodDisruptionBudget with `unhealthyPodEvictionPolicy` if `controller.unhealthyPodEvictionPolicy` is set
+ set:
+ controller.replicaCount: 2
+ controller.unhealthyPodEvictionPolicy: IfHealthyBudget
+ asserts:
+ - hasDocuments:
+ count: 1
+ - isKind:
+ of: PodDisruptionBudget
+ - equal:
+ path: spec.unhealthyPodEvictionPolicy
+ value: IfHealthyBudget
diff --git a/charts/ingress-nginx/tests/default-backend-poddisruptionbudget_test.yaml b/charts/ingress-nginx/tests/default-backend-poddisruptionbudget_test.yaml
index 9ca837dca..bfe98e883 100644
--- a/charts/ingress-nginx/tests/default-backend-poddisruptionbudget_test.yaml
+++ b/charts/ingress-nginx/tests/default-backend-poddisruptionbudget_test.yaml
@@ -63,3 +63,17 @@ tests:
- equal:
path: spec.maxUnavailable
value: 1
+
+ - it: should create a PodDisruptionBudget with `unhealthyPodEvictionPolicy` if `defaultBackend.unhealthyPodEvictionPolicy` is set
+ set:
+ defaultBackend.enabled: true
+ defaultBackend.replicaCount: 2
+ defaultBackend.unhealthyPodEvictionPolicy: IfHealthyBudget
+ asserts:
+ - hasDocuments:
+ count: 1
+ - isKind:
+ of: PodDisruptionBudget
+ - equal:
+ path: spec.unhealthyPodEvictionPolicy
+ value: IfHealthyBudget
diff --git a/charts/ingress-nginx/values.yaml b/charts/ingress-nginx/values.yaml
index ffb8a4ae3..c7be2bcc2 100644
--- a/charts/ingress-nginx/values.yaml
+++ b/charts/ingress-nginx/values.yaml
@@ -374,6 +374,9 @@ controller:
minAvailable: 1
# -- Maximum unavailable pods set in PodDisruptionBudget. If set, 'minAvailable' is ignored.
# maxUnavailable: 1
+ # -- Eviction policy for unhealthy pods guarded by PodDisruptionBudget.
+ # Ref: https://kubernetes.io/blog/2023/01/06/unhealthy-pod-eviction-policy-for-pdbs/
+ unhealthyPodEvictionPolicy: ""
## Define requests resources to avoid probe issues due to CPU utilization in busy nodes
## ref: https://github.com/kubernetes/ingress-nginx/issues/4735#issuecomment-551204903
@@ -1101,6 +1104,9 @@ defaultBackend:
minAvailable: 1
# -- Maximum unavailable pods set in PodDisruptionBudget. If set, 'minAvailable' is ignored.
# maxUnavailable: 1
+ # -- Eviction policy for unhealthy pods guarded by PodDisruptionBudget.
+ # Ref: https://kubernetes.io/blog/2023/01/06/unhealthy-pod-eviction-policy-for-pdbs/
+ unhealthyPodEvictionPolicy: ""
resources: {}
# limits:
From 883c09fb57e41a4f31409088d5418ad801f59413 Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Sun, 22 Sep 2024 09:33:58 +0200
Subject: [PATCH 243/283] Docs: Convert `opentelemetry.md` from CRLF to LF.
(#12005)
---
.../third-party-addons/opentelemetry.md | 628 +++++++++---------
1 file changed, 314 insertions(+), 314 deletions(-)
diff --git a/docs/user-guide/third-party-addons/opentelemetry.md b/docs/user-guide/third-party-addons/opentelemetry.md
index d2cf56bf5..af7fd2b14 100644
--- a/docs/user-guide/third-party-addons/opentelemetry.md
+++ b/docs/user-guide/third-party-addons/opentelemetry.md
@@ -1,314 +1,314 @@
-# OpenTelemetry
-
-Enables requests served by NGINX for distributed telemetry via The OpenTelemetry Project.
-
-Using the third party module [opentelemetry-cpp-contrib/nginx](https://github.com/open-telemetry/opentelemetry-cpp-contrib/tree/main/instrumentation/nginx) the Ingress-Nginx Controller can configure NGINX to enable [OpenTelemetry](http://opentelemetry.io) instrumentation.
-By default this feature is disabled.
-
-Check out this demo showcasing OpenTelemetry in Ingress NGINX. The video provides an overview and
-practical demonstration of how OpenTelemetry can be utilized in Ingress NGINX for observability
-and monitoring purposes.
-
-
-
-
-
-
-
-Demo: OpenTelemetry in Ingress NGINX.
-
-## Usage
-
-To enable the instrumentation we must enable OpenTelemetry in the configuration ConfigMap:
-```yaml
-data:
- enable-opentelemetry: "true"
-```
-
-To enable or disable instrumentation for a single Ingress, use
-the `enable-opentelemetry` annotation:
-```yaml
-kind: Ingress
-metadata:
- annotations:
- nginx.ingress.kubernetes.io/enable-opentelemetry: "true"
-```
-
-We must also set the host to use when uploading traces:
-
-```yaml
-otlp-collector-host: "otel-coll-collector.otel.svc"
-```
-NOTE: While the option is called `otlp-collector-host`, you will need to point this to any backend that receives otlp-grpc.
-
-Next you will need to deploy a distributed telemetry system which uses OpenTelemetry.
-[opentelemetry-collector](https://github.com/open-telemetry/opentelemetry-collector), [Jaeger](https://www.jaegertracing.io/)
-[Tempo](https://github.com/grafana/tempo), and [zipkin](https://zipkin.io/)
-have been tested.
-
-Other optional configuration options:
-```yaml
-# specifies the name to use for the server span
-opentelemetry-operation-name
-
-# sets whether or not to trust incoming telemetry spans
-opentelemetry-trust-incoming-span
-
-# specifies the port to use when uploading traces, Default: 4317
-otlp-collector-port
-
-# specifies the service name to use for any traces created, Default: nginx
-otel-service-name
-
-# The maximum queue size. After the size is reached data are dropped.
-otel-max-queuesize
-
-# The delay interval in milliseconds between two consecutive exports.
-otel-schedule-delay-millis
-
-# How long the export can run before it is cancelled.
-otel-schedule-delay-millis
-
-# The maximum batch size of every export. It must be smaller or equal to maxQueueSize.
-otel-max-export-batch-size
-
-# specifies sample rate for any traces created, Default: 0.01
-otel-sampler-ratio
-
-# specifies the sampler to be used when sampling traces.
-# The available samplers are: AlwaysOn, AlwaysOff, TraceIdRatioBased, Default: AlwaysOff
-otel-sampler
-
-# Uses sampler implementation which by default will take a sample if parent Activity is sampled, Default: false
-otel-sampler-parent-based
-```
-
-Note that you can also set whether to trust incoming spans (global default is true) per-location using annotations like the following:
-```yaml
-kind: Ingress
-metadata:
- annotations:
- nginx.ingress.kubernetes.io/opentelemetry-trust-incoming-span: "true"
-```
-
-## Examples
-
-The following examples show how to deploy and test different distributed telemetry systems. These example can be performed using Docker Desktop.
-
-In the [esigo/nginx-example](https://github.com/esigo/nginx-example)
-GitHub repository is an example of a simple hello service:
-
-```mermaid
-graph TB
- subgraph Browser
- start["http://esigo.dev/hello/nginx"]
- end
-
- subgraph app
- sa[service-a]
- sb[service-b]
- sa --> |name: nginx| sb
- sb --> |hello nginx!| sa
- end
-
- subgraph otel
- otc["Otel Collector"]
- end
-
- subgraph observability
- tempo["Tempo"]
- grafana["Grafana"]
- backend["Jaeger"]
- zipkin["Zipkin"]
- end
-
- subgraph ingress-nginx
- ngx[nginx]
- end
-
- subgraph ngx[nginx]
- ng[nginx]
- om[OpenTelemetry module]
- end
-
- subgraph Node
- app
- otel
- observability
- ingress-nginx
- om --> |otlp-gRPC| otc --> |jaeger| backend
- otc --> |zipkin| zipkin
- otc --> |otlp-gRPC| tempo --> grafana
- sa --> |otlp-gRPC| otc
- sb --> |otlp-gRPC| otc
- start --> ng --> sa
- end
-```
-
-To install the example and collectors run:
-
-1. Enable Ingress addon with:
-
- ```yaml
- opentelemetry:
- enabled: true
- image: registry.k8s.io/ingress-nginx/opentelemetry-1.25.3:v20240813-b933310d@sha256:f7604ac0547ed64d79b98d92133234e66c2c8aade3c1f4809fed5eec1fb7f922
- containerSecurityContext:
- allowPrivilegeEscalation: false
- ```
-
-2. Enable OpenTelemetry and set the otlp-collector-host:
-
- ```yaml
- $ echo '
- apiVersion: v1
- kind: ConfigMap
- data:
- enable-opentelemetry: "true"
- opentelemetry-config: "/etc/nginx/opentelemetry.toml"
- opentelemetry-operation-name: "HTTP $request_method $service_name $uri"
- opentelemetry-trust-incoming-span: "true"
- otlp-collector-host: "otel-coll-collector.otel.svc"
- otlp-collector-port: "4317"
- otel-max-queuesize: "2048"
- otel-schedule-delay-millis: "5000"
- otel-max-export-batch-size: "512"
- otel-service-name: "nginx-proxy" # Opentelemetry resource name
- otel-sampler: "AlwaysOn" # Also: AlwaysOff, TraceIdRatioBased
- otel-sampler-ratio: "1.0"
- otel-sampler-parent-based: "false"
- metadata:
- name: ingress-nginx-controller
- namespace: ingress-nginx
- ' | kubectl replace -f -
- ```
-
-4. Deploy otel-collector, grafana and Jaeger backend:
-
- ```bash
- # add helm charts needed for grafana and OpenTelemetry collector
- helm repo add open-telemetry https://open-telemetry.github.io/opentelemetry-helm-charts
- helm repo add grafana https://grafana.github.io/helm-charts
- helm repo update
- # deploy cert-manager needed for OpenTelemetry collector operator
- kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.9.1/cert-manager.yaml
- # create observability namespace
- kubectl apply -f https://raw.githubusercontent.com/esigo/nginx-example/main/observability/namespace.yaml
- # install OpenTelemetry collector operator
- helm upgrade --install otel-collector-operator -n otel --create-namespace open-telemetry/opentelemetry-operator
- # deploy OpenTelemetry collector
- kubectl apply -f https://raw.githubusercontent.com/esigo/nginx-example/main/observability/collector.yaml
- # deploy Jaeger all-in-one
- kubectl apply -f https://github.com/jaegertracing/jaeger-operator/releases/download/v1.37.0/jaeger-operator.yaml -n observability
- kubectl apply -f https://raw.githubusercontent.com/esigo/nginx-example/main/observability/jaeger.yaml -n observability
- # deploy zipkin
- kubectl apply -f https://raw.githubusercontent.com/esigo/nginx-example/main/observability/zipkin.yaml -n observability
- # deploy tempo and grafana
- helm upgrade --install tempo grafana/tempo --create-namespace -n observability
- helm upgrade -f https://raw.githubusercontent.com/esigo/nginx-example/main/observability/grafana/grafana-values.yaml --install grafana grafana/grafana --create-namespace -n observability
- ```
-
-3. Build and deploy demo app:
-
- ```bash
- # build images
- make images
-
- # deploy demo app:
- make deploy-app
- ```
-
-5. Make a few requests to the Service:
-
- ```bash
- kubectl port-forward --namespace=ingress-nginx service/ingress-nginx-controller 8090:80
- curl http://esigo.dev:8090/hello/nginx
-
-
- StatusCode : 200
- StatusDescription : OK
- Content : {"v":"hello nginx!"}
-
- RawContent : HTTP/1.1 200 OK
- Connection: keep-alive
- Content-Length: 21
- Content-Type: text/plain; charset=utf-8
- Date: Mon, 10 Oct 2022 17:43:33 GMT
-
- {"v":"hello nginx!"}
-
- Forms : {}
- Headers : {[Connection, keep-alive], [Content-Length, 21], [Content-Type, text/plain; charset=utf-8], [Date,
- Mon, 10 Oct 2022 17:43:33 GMT]}
- Images : {}
- InputFields : {}
- Links : {}
- ParsedHtml : System.__ComObject
- RawContentLength : 21
- ```
-
-6. View the Grafana UI:
-
- ```bash
- kubectl port-forward --namespace=observability service/grafana 3000:80
- ```
- In the Grafana interface we can see the details:
- 
-
-7. View the Jaeger UI:
-
- ```bash
- kubectl port-forward --namespace=observability service/jaeger-all-in-one-query 16686:16686
- ```
- In the Jaeger interface we can see the details:
- 
-
-8. View the Zipkin UI:
-
- ```bash
- kubectl port-forward --namespace=observability service/zipkin 9411:9411
- ```
- In the Zipkin interface we can see the details:
- 
-
-## Migration from OpenTracing, Jaeger, Zipkin and Datadog
-
-If you are migrating from OpenTracing, Jaeger, Zipkin, or Datadog to OpenTelemetry,
-you may need to update various annotations and configurations. Here are the mappings
-for common annotations and configurations:
-
-### Annotations
-
-| Legacy | OpenTelemetry |
-|---------------------------------------------------------------|-----------------------------------------------------------------|
-| `nginx.ingress.kubernetes.io/enable-opentracing` | `nginx.ingress.kubernetes.io/enable-opentelemetry` |
-| `nginx.ingress.kubernetes.io/opentracing-trust-incoming-span` | `nginx.ingress.kubernetes.io/opentelemetry-trust-incoming-span` |
-
-### Configs
-
-| Legacy | OpenTelemetry |
-|---------------------------------------|----------------------------------------------|
-| `opentracing-operation-name` | `opentelemetry-operation-name` |
-| `opentracing-location-operation-name` | `opentelemetry-operation-name` |
-| `opentracing-trust-incoming-span` | `opentelemetry-trust-incoming-span` |
-| `zipkin-collector-port` | `otlp-collector-port` |
-| `zipkin-service-name` | `otel-service-name` |
-| `zipkin-sample-rate` | `otel-sampler-ratio` |
-| `jaeger-collector-port` | `otlp-collector-port` |
-| `jaeger-endpoint` | `otlp-collector-port`, `otlp-collector-host` |
-| `jaeger-service-name` | `otel-service-name` |
-| `jaeger-propagation-format` | `N/A` |
-| `jaeger-sampler-type` | `otel-sampler` |
-| `jaeger-sampler-param` | `otel-sampler` |
-| `jaeger-sampler-host` | `N/A` |
-| `jaeger-sampler-port` | `N/A` |
-| `jaeger-trace-context-header-name` | `N/A` |
-| `jaeger-debug-header` | `N/A` |
-| `jaeger-baggage-header` | `N/A` |
-| `jaeger-tracer-baggage-header-prefix` | `N/A` |
-| `datadog-collector-port` | `otlp-collector-port` |
-| `datadog-service-name` | `otel-service-name` |
-| `datadog-environment` | `N/A` |
-| `datadog-operation-name-override` | `N/A` |
-| `datadog-priority-sampling` | `otel-sampler` |
-| `datadog-sample-rate` | `otel-sampler-ratio` |
+# OpenTelemetry
+
+Enables requests served by NGINX for distributed telemetry via The OpenTelemetry Project.
+
+Using the third party module [opentelemetry-cpp-contrib/nginx](https://github.com/open-telemetry/opentelemetry-cpp-contrib/tree/main/instrumentation/nginx) the Ingress-Nginx Controller can configure NGINX to enable [OpenTelemetry](http://opentelemetry.io) instrumentation.
+By default this feature is disabled.
+
+Check out this demo showcasing OpenTelemetry in Ingress NGINX. The video provides an overview and
+practical demonstration of how OpenTelemetry can be utilized in Ingress NGINX for observability
+and monitoring purposes.
+
+
+
+
+
+
+
+Demo: OpenTelemetry in Ingress NGINX.
+
+## Usage
+
+To enable the instrumentation we must enable OpenTelemetry in the configuration ConfigMap:
+```yaml
+data:
+ enable-opentelemetry: "true"
+```
+
+To enable or disable instrumentation for a single Ingress, use
+the `enable-opentelemetry` annotation:
+```yaml
+kind: Ingress
+metadata:
+ annotations:
+ nginx.ingress.kubernetes.io/enable-opentelemetry: "true"
+```
+
+We must also set the host to use when uploading traces:
+
+```yaml
+otlp-collector-host: "otel-coll-collector.otel.svc"
+```
+NOTE: While the option is called `otlp-collector-host`, you will need to point this to any backend that receives otlp-grpc.
+
+Next you will need to deploy a distributed telemetry system which uses OpenTelemetry.
+[opentelemetry-collector](https://github.com/open-telemetry/opentelemetry-collector), [Jaeger](https://www.jaegertracing.io/)
+[Tempo](https://github.com/grafana/tempo), and [zipkin](https://zipkin.io/)
+have been tested.
+
+Other optional configuration options:
+```yaml
+# specifies the name to use for the server span
+opentelemetry-operation-name
+
+# sets whether or not to trust incoming telemetry spans
+opentelemetry-trust-incoming-span
+
+# specifies the port to use when uploading traces, Default: 4317
+otlp-collector-port
+
+# specifies the service name to use for any traces created, Default: nginx
+otel-service-name
+
+# The maximum queue size. After the size is reached data are dropped.
+otel-max-queuesize
+
+# The delay interval in milliseconds between two consecutive exports.
+otel-schedule-delay-millis
+
+# How long the export can run before it is cancelled.
+otel-schedule-delay-millis
+
+# The maximum batch size of every export. It must be smaller or equal to maxQueueSize.
+otel-max-export-batch-size
+
+# specifies sample rate for any traces created, Default: 0.01
+otel-sampler-ratio
+
+# specifies the sampler to be used when sampling traces.
+# The available samplers are: AlwaysOn, AlwaysOff, TraceIdRatioBased, Default: AlwaysOff
+otel-sampler
+
+# Uses sampler implementation which by default will take a sample if parent Activity is sampled, Default: false
+otel-sampler-parent-based
+```
+
+Note that you can also set whether to trust incoming spans (global default is true) per-location using annotations like the following:
+```yaml
+kind: Ingress
+metadata:
+ annotations:
+ nginx.ingress.kubernetes.io/opentelemetry-trust-incoming-span: "true"
+```
+
+## Examples
+
+The following examples show how to deploy and test different distributed telemetry systems. These example can be performed using Docker Desktop.
+
+In the [esigo/nginx-example](https://github.com/esigo/nginx-example)
+GitHub repository is an example of a simple hello service:
+
+```mermaid
+graph TB
+ subgraph Browser
+ start["http://esigo.dev/hello/nginx"]
+ end
+
+ subgraph app
+ sa[service-a]
+ sb[service-b]
+ sa --> |name: nginx| sb
+ sb --> |hello nginx!| sa
+ end
+
+ subgraph otel
+ otc["Otel Collector"]
+ end
+
+ subgraph observability
+ tempo["Tempo"]
+ grafana["Grafana"]
+ backend["Jaeger"]
+ zipkin["Zipkin"]
+ end
+
+ subgraph ingress-nginx
+ ngx[nginx]
+ end
+
+ subgraph ngx[nginx]
+ ng[nginx]
+ om[OpenTelemetry module]
+ end
+
+ subgraph Node
+ app
+ otel
+ observability
+ ingress-nginx
+ om --> |otlp-gRPC| otc --> |jaeger| backend
+ otc --> |zipkin| zipkin
+ otc --> |otlp-gRPC| tempo --> grafana
+ sa --> |otlp-gRPC| otc
+ sb --> |otlp-gRPC| otc
+ start --> ng --> sa
+ end
+```
+
+To install the example and collectors run:
+
+1. Enable Ingress addon with:
+
+ ```yaml
+ opentelemetry:
+ enabled: true
+ image: registry.k8s.io/ingress-nginx/opentelemetry-1.25.3:v20240813-b933310d@sha256:f7604ac0547ed64d79b98d92133234e66c2c8aade3c1f4809fed5eec1fb7f922
+ containerSecurityContext:
+ allowPrivilegeEscalation: false
+ ```
+
+2. Enable OpenTelemetry and set the otlp-collector-host:
+
+ ```yaml
+ $ echo '
+ apiVersion: v1
+ kind: ConfigMap
+ data:
+ enable-opentelemetry: "true"
+ opentelemetry-config: "/etc/nginx/opentelemetry.toml"
+ opentelemetry-operation-name: "HTTP $request_method $service_name $uri"
+ opentelemetry-trust-incoming-span: "true"
+ otlp-collector-host: "otel-coll-collector.otel.svc"
+ otlp-collector-port: "4317"
+ otel-max-queuesize: "2048"
+ otel-schedule-delay-millis: "5000"
+ otel-max-export-batch-size: "512"
+ otel-service-name: "nginx-proxy" # Opentelemetry resource name
+ otel-sampler: "AlwaysOn" # Also: AlwaysOff, TraceIdRatioBased
+ otel-sampler-ratio: "1.0"
+ otel-sampler-parent-based: "false"
+ metadata:
+ name: ingress-nginx-controller
+ namespace: ingress-nginx
+ ' | kubectl replace -f -
+ ```
+
+4. Deploy otel-collector, grafana and Jaeger backend:
+
+ ```bash
+ # add helm charts needed for grafana and OpenTelemetry collector
+ helm repo add open-telemetry https://open-telemetry.github.io/opentelemetry-helm-charts
+ helm repo add grafana https://grafana.github.io/helm-charts
+ helm repo update
+ # deploy cert-manager needed for OpenTelemetry collector operator
+ kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.9.1/cert-manager.yaml
+ # create observability namespace
+ kubectl apply -f https://raw.githubusercontent.com/esigo/nginx-example/main/observability/namespace.yaml
+ # install OpenTelemetry collector operator
+ helm upgrade --install otel-collector-operator -n otel --create-namespace open-telemetry/opentelemetry-operator
+ # deploy OpenTelemetry collector
+ kubectl apply -f https://raw.githubusercontent.com/esigo/nginx-example/main/observability/collector.yaml
+ # deploy Jaeger all-in-one
+ kubectl apply -f https://github.com/jaegertracing/jaeger-operator/releases/download/v1.37.0/jaeger-operator.yaml -n observability
+ kubectl apply -f https://raw.githubusercontent.com/esigo/nginx-example/main/observability/jaeger.yaml -n observability
+ # deploy zipkin
+ kubectl apply -f https://raw.githubusercontent.com/esigo/nginx-example/main/observability/zipkin.yaml -n observability
+ # deploy tempo and grafana
+ helm upgrade --install tempo grafana/tempo --create-namespace -n observability
+ helm upgrade -f https://raw.githubusercontent.com/esigo/nginx-example/main/observability/grafana/grafana-values.yaml --install grafana grafana/grafana --create-namespace -n observability
+ ```
+
+3. Build and deploy demo app:
+
+ ```bash
+ # build images
+ make images
+
+ # deploy demo app:
+ make deploy-app
+ ```
+
+5. Make a few requests to the Service:
+
+ ```bash
+ kubectl port-forward --namespace=ingress-nginx service/ingress-nginx-controller 8090:80
+ curl http://esigo.dev:8090/hello/nginx
+
+
+ StatusCode : 200
+ StatusDescription : OK
+ Content : {"v":"hello nginx!"}
+
+ RawContent : HTTP/1.1 200 OK
+ Connection: keep-alive
+ Content-Length: 21
+ Content-Type: text/plain; charset=utf-8
+ Date: Mon, 10 Oct 2022 17:43:33 GMT
+
+ {"v":"hello nginx!"}
+
+ Forms : {}
+ Headers : {[Connection, keep-alive], [Content-Length, 21], [Content-Type, text/plain; charset=utf-8], [Date,
+ Mon, 10 Oct 2022 17:43:33 GMT]}
+ Images : {}
+ InputFields : {}
+ Links : {}
+ ParsedHtml : System.__ComObject
+ RawContentLength : 21
+ ```
+
+6. View the Grafana UI:
+
+ ```bash
+ kubectl port-forward --namespace=observability service/grafana 3000:80
+ ```
+ In the Grafana interface we can see the details:
+ 
+
+7. View the Jaeger UI:
+
+ ```bash
+ kubectl port-forward --namespace=observability service/jaeger-all-in-one-query 16686:16686
+ ```
+ In the Jaeger interface we can see the details:
+ 
+
+8. View the Zipkin UI:
+
+ ```bash
+ kubectl port-forward --namespace=observability service/zipkin 9411:9411
+ ```
+ In the Zipkin interface we can see the details:
+ 
+
+## Migration from OpenTracing, Jaeger, Zipkin and Datadog
+
+If you are migrating from OpenTracing, Jaeger, Zipkin, or Datadog to OpenTelemetry,
+you may need to update various annotations and configurations. Here are the mappings
+for common annotations and configurations:
+
+### Annotations
+
+| Legacy | OpenTelemetry |
+|---------------------------------------------------------------|-----------------------------------------------------------------|
+| `nginx.ingress.kubernetes.io/enable-opentracing` | `nginx.ingress.kubernetes.io/enable-opentelemetry` |
+| `nginx.ingress.kubernetes.io/opentracing-trust-incoming-span` | `nginx.ingress.kubernetes.io/opentelemetry-trust-incoming-span` |
+
+### Configs
+
+| Legacy | OpenTelemetry |
+|---------------------------------------|----------------------------------------------|
+| `opentracing-operation-name` | `opentelemetry-operation-name` |
+| `opentracing-location-operation-name` | `opentelemetry-operation-name` |
+| `opentracing-trust-incoming-span` | `opentelemetry-trust-incoming-span` |
+| `zipkin-collector-port` | `otlp-collector-port` |
+| `zipkin-service-name` | `otel-service-name` |
+| `zipkin-sample-rate` | `otel-sampler-ratio` |
+| `jaeger-collector-port` | `otlp-collector-port` |
+| `jaeger-endpoint` | `otlp-collector-port`, `otlp-collector-host` |
+| `jaeger-service-name` | `otel-service-name` |
+| `jaeger-propagation-format` | `N/A` |
+| `jaeger-sampler-type` | `otel-sampler` |
+| `jaeger-sampler-param` | `otel-sampler` |
+| `jaeger-sampler-host` | `N/A` |
+| `jaeger-sampler-port` | `N/A` |
+| `jaeger-trace-context-header-name` | `N/A` |
+| `jaeger-debug-header` | `N/A` |
+| `jaeger-baggage-header` | `N/A` |
+| `jaeger-tracer-baggage-header-prefix` | `N/A` |
+| `datadog-collector-port` | `otlp-collector-port` |
+| `datadog-service-name` | `otel-service-name` |
+| `datadog-environment` | `N/A` |
+| `datadog-operation-name-override` | `N/A` |
+| `datadog-priority-sampling` | `otel-sampler` |
+| `datadog-sample-rate` | `otel-sampler-ratio` |
From 2b9acd9501c669d2d8de81c8407d998fc11c0bc4 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 23 Sep 2024 13:10:00 +0100
Subject: [PATCH 244/283] Bump github.com/prometheus/client_golang from 1.20.3
to 1.20.4 in the all group (#12008)
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 2 +-
go.sum | 4 ++--
2 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/go.mod b/go.mod
index 0d57591b2..63b501f32 100644
--- a/go.mod
+++ b/go.mod
@@ -17,7 +17,7 @@ require (
github.com/onsi/ginkgo/v2 v2.20.2
github.com/opencontainers/runc v1.1.14
github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2
- github.com/prometheus/client_golang v1.20.3
+ github.com/prometheus/client_golang v1.20.4
github.com/prometheus/client_model v0.6.1
github.com/prometheus/common v0.59.1
github.com/spf13/cobra v1.8.1
diff --git a/go.sum b/go.sum
index 50f389342..bdad300d8 100644
--- a/go.sum
+++ b/go.sum
@@ -182,8 +182,8 @@ github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINE
github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 h1:Jamvg5psRIccs7FGNTlIRMkT8wgtp5eCXdBlqhYGL6U=
github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
-github.com/prometheus/client_golang v1.20.3 h1:oPksm4K8B+Vt35tUhw6GbSNSgVlVSBH0qELP/7u83l4=
-github.com/prometheus/client_golang v1.20.3/go.mod h1:PIEt8X02hGcP8JWbeHyeZ53Y/jReSnHgO035n//V5WE=
+github.com/prometheus/client_golang v1.20.4 h1:Tgh3Yr67PaOv/uTqloMsCEdeuFTatm5zIq5+qNN23vI=
+github.com/prometheus/client_golang v1.20.4/go.mod h1:PIEt8X02hGcP8JWbeHyeZ53Y/jReSnHgO035n//V5WE=
github.com/prometheus/client_model v0.6.1 h1:ZKSh/rekM+n3CeS952MLRAdFwIKqeY8b62p8ais2e9E=
github.com/prometheus/client_model v0.6.1/go.mod h1:OrxVMOVHjw3lKMa8+x6HeMGkHMQyHDk9E3jmP2AmGiY=
github.com/prometheus/common v0.59.1 h1:LXb1quJHWm1P6wq/U824uxYi4Sg0oGvNeUm1z5dJoX0=
From 9219e3a9c7dbb138cc85d9d0da4079ba034d7242 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 23 Sep 2024 13:12:01 +0100
Subject: [PATCH 245/283] Bump google.golang.org/grpc from 1.66.2 to 1.67.0
(#12009)
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 4 ++--
go.sum | 8 ++++----
2 files changed, 6 insertions(+), 6 deletions(-)
diff --git a/go.mod b/go.mod
index 63b501f32..b9f9f10f6 100644
--- a/go.mod
+++ b/go.mod
@@ -27,7 +27,7 @@ require (
github.com/zakjan/cert-chain-resolver v0.0.0-20221221105603-fcedb00c5b30
golang.org/x/crypto v0.27.0
golang.org/x/exp v0.0.0-20240719175910-8a7402abbf56
- google.golang.org/grpc v1.66.2
+ google.golang.org/grpc v1.67.0
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab
gopkg.in/go-playground/pool.v3 v3.1.1
gopkg.in/mcuadros/go-syslog.v2 v2.3.0
@@ -122,7 +122,7 @@ require (
golang.org/x/text v0.18.0 // indirect
golang.org/x/time v0.5.0 // indirect
golang.org/x/tools v0.24.0 // indirect
- google.golang.org/genproto/googleapis/rpc v0.0.0-20240701130421-f6361c86f094 // indirect
+ google.golang.org/genproto/googleapis/rpc v0.0.0-20240814211410-ddb44dafa142 // indirect
google.golang.org/protobuf v1.34.2 // indirect
gopkg.in/evanphx/json-patch.v5 v5.9.0 // indirect
gopkg.in/go-playground/assert.v1 v1.2.1 // indirect
diff --git a/go.sum b/go.sum
index bdad300d8..20134af1e 100644
--- a/go.sum
+++ b/go.sum
@@ -299,10 +299,10 @@ golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8T
golang.org/x/xerrors v0.0.0-20200804184101-5ec99f83aff1/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
gomodules.xyz/jsonpatch/v2 v2.4.0 h1:Ci3iUJyx9UeRx7CeFN8ARgGbkESwJK+KB9lLcWxY/Zw=
gomodules.xyz/jsonpatch/v2 v2.4.0/go.mod h1:AH3dM2RI6uoBZxn3LVrfvJ3E0/9dG4cSrbuBJT4moAY=
-google.golang.org/genproto/googleapis/rpc v0.0.0-20240701130421-f6361c86f094 h1:BwIjyKYGsK9dMCBOorzRri8MQwmi7mT9rGHsCEinZkA=
-google.golang.org/genproto/googleapis/rpc v0.0.0-20240701130421-f6361c86f094/go.mod h1:Ue6ibwXGpU+dqIcODieyLOcgj7z8+IcskoNIgZxtrFY=
-google.golang.org/grpc v1.66.2 h1:3QdXkuq3Bkh7w+ywLdLvM56cmGvQHUMZpiCzt6Rqaoo=
-google.golang.org/grpc v1.66.2/go.mod h1:s3/l6xSSCURdVfAnL+TqCNMyTDAGN6+lZeVxnZR128Y=
+google.golang.org/genproto/googleapis/rpc v0.0.0-20240814211410-ddb44dafa142 h1:e7S5W7MGGLaSu8j3YjdezkZ+m1/Nm0uRVRMEMGk26Xs=
+google.golang.org/genproto/googleapis/rpc v0.0.0-20240814211410-ddb44dafa142/go.mod h1:UqMtugtsSgubUsoxbuAoiCXvqvErP7Gf0so0mK9tHxU=
+google.golang.org/grpc v1.67.0 h1:IdH9y6PF5MPSdAntIcpjQ+tXO41pcQsfZV2RxtQgVcw=
+google.golang.org/grpc v1.67.0/go.mod h1:1gLDyUQU7CTLJI90u3nXZ9ekeghjeM7pTDZlqFNg2AA=
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab h1:tg8hvIl5RmFBuXlcJMuL0h4Psh1gx5Q5xEMwzBZIzWA=
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab/go.mod h1:liVNnGuZDITxuksuZ+BBvdy7FcJfeNk+efF9qgqNUmc=
google.golang.org/protobuf v0.0.0-20200109180630-ec00e32a8dfd/go.mod h1:DFci5gLYBciE7Vtevhsrf46CRTquxDuWsQurQQe4oz8=
From a9c9a9d51e48f50edd5e8e3084a5c485366ba6c4 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 23 Sep 2024 13:14:00 +0100
Subject: [PATCH 246/283] Bump github/codeql-action from 3.26.7 to 3.26.8 in
the all group (#12010)
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
.github/workflows/scorecards.yml | 2 +-
.github/workflows/vulnerability-scans.yaml | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/.github/workflows/scorecards.yml b/.github/workflows/scorecards.yml
index 4affccb2d..ad0317845 100644
--- a/.github/workflows/scorecards.yml
+++ b/.github/workflows/scorecards.yml
@@ -59,6 +59,6 @@ jobs:
# Upload the results to GitHub's code scanning dashboard.
- name: "Upload to code-scanning"
- uses: github/codeql-action/upload-sarif@8214744c546c1e5c8f03dde8fab3a7353211988d # v3.26.7
+ uses: github/codeql-action/upload-sarif@294a9d92911152fe08befb9ec03e240add280cb3 # v3.26.8
with:
sarif_file: results.sarif
diff --git a/.github/workflows/vulnerability-scans.yaml b/.github/workflows/vulnerability-scans.yaml
index bed49e46f..e35ee0a65 100644
--- a/.github/workflows/vulnerability-scans.yaml
+++ b/.github/workflows/vulnerability-scans.yaml
@@ -75,7 +75,7 @@ jobs:
# This step checks out a copy of your repository.
- name: Upload SARIF file
- uses: github/codeql-action/upload-sarif@8214744c546c1e5c8f03dde8fab3a7353211988d # v3.26.7
+ uses: github/codeql-action/upload-sarif@294a9d92911152fe08befb9ec03e240add280cb3 # v3.26.8
with:
token: ${{ github.token }}
# Path to SARIF file relative to the root of the repository
From 8d6435b8a0a73e01b198c1f7fd0dd10e76e32482 Mon Sep 17 00:00:00 2001
From: Long Wu Yuan
Date: Thu, 26 Sep 2024 11:02:01 +0000
Subject: [PATCH 247/283] Docs: Add health check annotations for AWS. (#12018)
---
docs/deploy/index.md | 9 +++++++--
1 file changed, 7 insertions(+), 2 deletions(-)
diff --git a/docs/deploy/index.md b/docs/deploy/index.md
index ae5458eea..2ce632573 100644
--- a/docs/deploy/index.md
+++ b/docs/deploy/index.md
@@ -68,13 +68,18 @@ helm show values ingress-nginx --repo https://kubernetes.github.io/ingress-nginx
!!! attention "Helm install on AWS/GCP/Azure/Other providers"
The *ingress-nginx-controller helm-chart is a generic install out of the box*. The default set of helm values is **not** configured for installation on any infra provider. The annotations that are applicable to the cloud provider must be customized by the users.
See [AWS LB Controller](https://kubernetes-sigs.github.io/aws-load-balancer-controller/v2.2/guide/service/annotations/).
- Examples of some annotations needed for the service resource of `--type LoadBalancer` on AWS are below:
+ Examples of some annotations recommended (healthecheck ones are required for target-type IP) for the service resource of `--type LoadBalancer` on AWS are below:
```yaml
annotations:
+ service.beta.kubernetes.io/aws-load-balancer-target-group-attributes: deregistration_delay.timeout_seconds=270
+ service.beta.kubernetes.io/aws-load-balancer-nlb-target-type: ip
+ service.beta.kubernetes.io/aws-load-balancer-healthcheck-path: /healthz
+ service.beta.kubernetes.io/aws-load-balancer-healthcheck-port: "10254"
+ service.beta.kubernetes.io/aws-load-balancer-healthcheck-protocol: http
+ service.beta.kubernetes.io/aws-load-balancer-healthcheck-success-codes: 200-299
service.beta.kubernetes.io/aws-load-balancer-scheme: "internet-facing"
service.beta.kubernetes.io/aws-load-balancer-backend-protocol: tcp
service.beta.kubernetes.io/aws-load-balancer-cross-zone-load-balancing-enabled: "true"
- service.beta.kubernetes.io/aws-load-balancer-nlb-target-type: "ip"
service.beta.kubernetes.io/aws-load-balancer-type: nlb
service.beta.kubernetes.io/aws-load-balancer-manage-backend-security-group-rules: "true"
service.beta.kubernetes.io/aws-load-balancer-access-log-enabled: "true"
From 7b8d293d9bb7d1e78908c9a762460dbf64c01157 Mon Sep 17 00:00:00 2001
From: Trond <42568175+TrondT@users.noreply.github.com>
Date: Fri, 27 Sep 2024 12:14:01 +0200
Subject: [PATCH 248/283] Chart: Add `controller.progressDeadlineSeconds`.
(#12017)
---
charts/ingress-nginx/README.md | 1 +
charts/ingress-nginx/templates/controller-deployment.yaml | 3 +++
.../ingress-nginx/tests/controller-deployment_test.yaml | 8 ++++++++
charts/ingress-nginx/values.yaml | 4 ++++
4 files changed, 16 insertions(+)
diff --git a/charts/ingress-nginx/README.md b/charts/ingress-nginx/README.md
index 1cc269afe..5cf5bb179 100644
--- a/charts/ingress-nginx/README.md
+++ b/charts/ingress-nginx/README.md
@@ -412,6 +412,7 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
| controller.podLabels | object | `{}` | Labels to add to the pod container metadata |
| controller.podSecurityContext | object | `{}` | Security context for controller pods |
| controller.priorityClassName | string | `""` | |
+| controller.progressDeadlineSeconds | int | `0` | Specifies the number of seconds you want to wait for the controller deployment to progress before the system reports back that it has failed. Ref.: https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#progress-deadline-seconds |
| controller.proxySetHeaders | object | `{}` | Will add custom headers before sending traffic to backends according to https://github.com/kubernetes/ingress-nginx/tree/main/docs/examples/customization/custom-headers |
| controller.publishService | object | `{"enabled":true,"pathOverride":""}` | Allows customization of the source of the IP address or FQDN to report in the ingress status field. By default, it reads the information provided by the service. If disable, the status field reports the IP address of the node or nodes where an ingress controller pod is running. |
| controller.publishService.enabled | bool | `true` | Enable 'publishService' or not |
diff --git a/charts/ingress-nginx/templates/controller-deployment.yaml b/charts/ingress-nginx/templates/controller-deployment.yaml
index 5211acd0b..c046311b0 100644
--- a/charts/ingress-nginx/templates/controller-deployment.yaml
+++ b/charts/ingress-nginx/templates/controller-deployment.yaml
@@ -22,6 +22,9 @@ spec:
replicas: {{ .Values.controller.replicaCount }}
{{- end }}
revisionHistoryLimit: {{ .Values.revisionHistoryLimit }}
+ {{- if .Values.controller.progressDeadlineSeconds }}
+ progressDeadlineSeconds: {{ .Values.controller.progressDeadlineSeconds }}
+ {{- end }}
{{- if .Values.controller.updateStrategy }}
strategy: {{ toYaml .Values.controller.updateStrategy | nindent 4 }}
{{- end }}
diff --git a/charts/ingress-nginx/tests/controller-deployment_test.yaml b/charts/ingress-nginx/tests/controller-deployment_test.yaml
index f481d498a..6e6f8b207 100644
--- a/charts/ingress-nginx/tests/controller-deployment_test.yaml
+++ b/charts/ingress-nginx/tests/controller-deployment_test.yaml
@@ -177,3 +177,11 @@ tests:
- equal:
path: spec.template.spec.containers[0].image
value: registry.k8s.io/ingress-nginx/controller:my-little-custom-tag@sha256:faa2d18687f734994b6bd9e309e7a73852a81c30e1b8f63165fcd4f0a087e3cd
+
+ - it: should create a Deployment with `progressDeadlineSeconds` if `controller.progressDeadlineSeconds` is set
+ set:
+ controller.progressDeadlineSeconds: 111
+ asserts:
+ - equal:
+ path: spec.progressDeadlineSeconds
+ value: 111
diff --git a/charts/ingress-nginx/values.yaml b/charts/ingress-nginx/values.yaml
index c7be2bcc2..c2a0a1541 100644
--- a/charts/ingress-nginx/values.yaml
+++ b/charts/ingress-nginx/values.yaml
@@ -236,6 +236,10 @@ controller:
# maxUnavailable: 1
# type: RollingUpdate
+ # -- Specifies the number of seconds you want to wait for the controller deployment to progress before the system reports back that it has failed.
+ # Ref.: https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#progress-deadline-seconds
+ progressDeadlineSeconds: 0
+
# -- `minReadySeconds` to avoid killing pods before we are ready
##
minReadySeconds: 0
From 24a9f972ff3fe3a9a1c05736a4b97641327302bb Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Sat, 28 Sep 2024 13:03:35 +0200
Subject: [PATCH 249/283] Chart: Extend image tests. (#12025)
---
.../tests/controller-daemonset_test.yaml | 28 ++++++++++++++--
.../tests/controller-deployment_test.yaml | 26 +++++++++++++--
.../default-backend-deployment_test.yaml | 32 +++++++++++++++++++
3 files changed, 80 insertions(+), 6 deletions(-)
diff --git a/charts/ingress-nginx/tests/controller-daemonset_test.yaml b/charts/ingress-nginx/tests/controller-daemonset_test.yaml
index 72cba88c4..0e7b79e95 100644
--- a/charts/ingress-nginx/tests/controller-daemonset_test.yaml
+++ b/charts/ingress-nginx/tests/controller-daemonset_test.yaml
@@ -148,12 +148,34 @@ tests:
path: spec.template.spec.containers[0].securityContext.runAsGroup
value: 1000
- - it: should create a DaemonSet with a custom tag if `controller.image.tag` is set
+ - it: should create a DaemonSet with a custom registry if `controller.image.registry` is set
set:
controller.kind: DaemonSet
- controller.image.tag: my-little-custom-tag
+ controller.image.registry: custom.registry.io
+ controller.image.tag: v1.0.0-dev
controller.image.digest: sha256:faa2d18687f734994b6bd9e309e7a73852a81c30e1b8f63165fcd4f0a087e3cd
asserts:
- equal:
path: spec.template.spec.containers[0].image
- value: registry.k8s.io/ingress-nginx/controller:my-little-custom-tag@sha256:faa2d18687f734994b6bd9e309e7a73852a81c30e1b8f63165fcd4f0a087e3cd
+ value: custom.registry.io/ingress-nginx/controller:v1.0.0-dev@sha256:faa2d18687f734994b6bd9e309e7a73852a81c30e1b8f63165fcd4f0a087e3cd
+
+ - it: should create a DaemonSet with a custom image if `controller.image.image` is set
+ set:
+ controller.kind: DaemonSet
+ controller.image.image: custom-repo/custom-image
+ controller.image.tag: v1.0.0-dev
+ controller.image.digest: sha256:faa2d18687f734994b6bd9e309e7a73852a81c30e1b8f63165fcd4f0a087e3cd
+ asserts:
+ - equal:
+ path: spec.template.spec.containers[0].image
+ value: registry.k8s.io/custom-repo/custom-image:v1.0.0-dev@sha256:faa2d18687f734994b6bd9e309e7a73852a81c30e1b8f63165fcd4f0a087e3cd
+
+ - it: should create a DaemonSet with a custom tag if `controller.image.tag` is set
+ set:
+ controller.kind: DaemonSet
+ controller.image.tag: custom-tag
+ controller.image.digest: sha256:faa2d18687f734994b6bd9e309e7a73852a81c30e1b8f63165fcd4f0a087e3cd
+ asserts:
+ - equal:
+ path: spec.template.spec.containers[0].image
+ value: registry.k8s.io/ingress-nginx/controller:custom-tag@sha256:faa2d18687f734994b6bd9e309e7a73852a81c30e1b8f63165fcd4f0a087e3cd
diff --git a/charts/ingress-nginx/tests/controller-deployment_test.yaml b/charts/ingress-nginx/tests/controller-deployment_test.yaml
index 6e6f8b207..1954b7ec9 100644
--- a/charts/ingress-nginx/tests/controller-deployment_test.yaml
+++ b/charts/ingress-nginx/tests/controller-deployment_test.yaml
@@ -169,14 +169,34 @@ tests:
path: spec.template.spec.containers[0].securityContext.runAsGroup
value: 1000
- - it: should create a Deployment with a custom tag if `controller.image.tag` is set
+ - it: should create a Deployment with a custom registry if `controller.image.registry` is set
set:
- controller.image.tag: my-little-custom-tag
+ controller.image.registry: custom.registry.io
+ controller.image.tag: v1.0.0-dev
controller.image.digest: sha256:faa2d18687f734994b6bd9e309e7a73852a81c30e1b8f63165fcd4f0a087e3cd
asserts:
- equal:
path: spec.template.spec.containers[0].image
- value: registry.k8s.io/ingress-nginx/controller:my-little-custom-tag@sha256:faa2d18687f734994b6bd9e309e7a73852a81c30e1b8f63165fcd4f0a087e3cd
+ value: custom.registry.io/ingress-nginx/controller:v1.0.0-dev@sha256:faa2d18687f734994b6bd9e309e7a73852a81c30e1b8f63165fcd4f0a087e3cd
+
+ - it: should create a Deployment with a custom image if `controller.image.image` is set
+ set:
+ controller.image.image: custom-repo/custom-image
+ controller.image.tag: v1.0.0-dev
+ controller.image.digest: sha256:faa2d18687f734994b6bd9e309e7a73852a81c30e1b8f63165fcd4f0a087e3cd
+ asserts:
+ - equal:
+ path: spec.template.spec.containers[0].image
+ value: registry.k8s.io/custom-repo/custom-image:v1.0.0-dev@sha256:faa2d18687f734994b6bd9e309e7a73852a81c30e1b8f63165fcd4f0a087e3cd
+
+ - it: should create a Deployment with a custom tag if `controller.image.tag` is set
+ set:
+ controller.image.tag: custom-tag
+ controller.image.digest: sha256:faa2d18687f734994b6bd9e309e7a73852a81c30e1b8f63165fcd4f0a087e3cd
+ asserts:
+ - equal:
+ path: spec.template.spec.containers[0].image
+ value: registry.k8s.io/ingress-nginx/controller:custom-tag@sha256:faa2d18687f734994b6bd9e309e7a73852a81c30e1b8f63165fcd4f0a087e3cd
- it: should create a Deployment with `progressDeadlineSeconds` if `controller.progressDeadlineSeconds` is set
set:
diff --git a/charts/ingress-nginx/tests/default-backend-deployment_test.yaml b/charts/ingress-nginx/tests/default-backend-deployment_test.yaml
index 4321075e9..e90e6f944 100644
--- a/charts/ingress-nginx/tests/default-backend-deployment_test.yaml
+++ b/charts/ingress-nginx/tests/default-backend-deployment_test.yaml
@@ -144,3 +144,35 @@ tests:
- equal:
path: spec.template.spec.containers[0].securityContext.runAsGroup
value: 1000
+
+ - it: should create a Deployment with a custom registry if `defaultBackend.image.registry` is set
+ set:
+ defaultBackend.enabled: true
+ defaultBackend.image.registry: custom.registry.io
+ defaultBackend.image.tag: v1.0.0-dev
+ defaultBackend.image.digest: sha256:faa2d18687f734994b6bd9e309e7a73852a81c30e1b8f63165fcd4f0a087e3cd
+ asserts:
+ - equal:
+ path: spec.template.spec.containers[0].image
+ value: custom.registry.io/defaultbackend-amd64:v1.0.0-dev@sha256:faa2d18687f734994b6bd9e309e7a73852a81c30e1b8f63165fcd4f0a087e3cd
+
+ - it: should create a Deployment with a custom image if `defaultBackend.image.image` is set
+ set:
+ defaultBackend.enabled: true
+ defaultBackend.image.image: custom-repo/custom-image
+ defaultBackend.image.tag: v1.0.0-dev
+ defaultBackend.image.digest: sha256:faa2d18687f734994b6bd9e309e7a73852a81c30e1b8f63165fcd4f0a087e3cd
+ asserts:
+ - equal:
+ path: spec.template.spec.containers[0].image
+ value: registry.k8s.io/custom-repo/custom-image:v1.0.0-dev@sha256:faa2d18687f734994b6bd9e309e7a73852a81c30e1b8f63165fcd4f0a087e3cd
+
+ - it: should create a Deployment with a custom tag if `defaultBackend.image.tag` is set
+ set:
+ defaultBackend.enabled: true
+ defaultBackend.image.tag: custom-tag
+ defaultBackend.image.digest: sha256:faa2d18687f734994b6bd9e309e7a73852a81c30e1b8f63165fcd4f0a087e3cd
+ asserts:
+ - equal:
+ path: spec.template.spec.containers[0].image
+ value: registry.k8s.io/defaultbackend-amd64:custom-tag@sha256:faa2d18687f734994b6bd9e309e7a73852a81c30e1b8f63165fcd4f0a087e3cd
From f369ffb0734cc63fdf85959c4e41be0606ca8f1e Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Sat, 28 Sep 2024 15:40:02 +0200
Subject: [PATCH 250/283] Chart: Improve CI. (#12003)
---
.github/workflows/chart.yaml | 64 ++++++++++
.github/workflows/ci.yaml | 110 +++++++-----------
.github/workflows/helm.yaml | 88 --------------
.gitignore | 1 -
MANUAL_RELEASE.md | 11 +-
...mission-webhooks-cert-manager-values.yaml} | 8 +-
...ler-admission-tls-cert-manager-values.yaml | 6 -
...ontroller-configmap-addheaders-values.yaml | 11 ++
...troller-configmap-proxyheaders-values.yaml | 11 ++
....yaml => controller-configmap-values.yaml} | 9 +-
.../controller-custom-ingressclass-flags.yaml | 7 --
...roller-daemonset-extra-modules-values.yaml | 30 +++++
... controller-daemonset-metrics-values.yaml} | 9 +-
...oller-daemonset-opentelemetry-values.yaml} | 4 +
...ller-daemonset-podannotations-values.yaml} | 13 +--
....yaml => controller-daemonset-values.yaml} | 4 +-
...oller-deployment-extra-modules-values.yaml | 30 +++++
...controller-deployment-metrics-values.yaml} | 8 +-
...ller-deployment-opentelemetry-values.yaml} | 10 +-
...ler-deployment-podannotations-values.yaml} | 12 +-
.../ci/controller-deployment-values.yaml | 10 ++
...values.yaml => controller-hpa-values.yaml} | 12 +-
.../ci/controller-ingressclass-values.yaml | 15 +++
...> controller-service-internal-values.yaml} | 5 +-
...es.yaml => controller-service-values.yaml} | 10 +-
.../ci/daemonset-customconfig-values.yaml | 14 ---
.../ci/daemonset-customnodeport-values.yaml | 22 ----
.../ci/daemonset-extra-modules.yaml | 13 ---
.../ci/daemonset-headers-values.yaml | 14 ---
.../ci/daemonset-nodeport-values.yaml | 10 --
...set-tcp-udp-configMapNamespace-values.yaml | 20 ----
...emonset-tcp-udp-portNamePrefix-values.yaml | 18 ---
.../ci/daemonset-tcp-udp-values.yaml | 16 ---
.../ci/daemonset-tcp-values.yaml | 14 ---
.../ci/deamonset-metrics-values.yaml | 12 --
.../ci/deployment-autoscaling-values.yaml | 11 --
...modules-default-container-sec-context.yaml | 15 ---
...odules-specific-container-sec-context.yaml | 15 ---
.../ci/deployment-extra-modules.yaml | 13 ---
.../ci/deployment-headers-values.yaml | 13 ---
.../ci/deployment-internal-lb-values.yaml | 19 ---
.../ci/deployment-nodeport-values.yaml | 9 --
...ent-tcp-udp-configMapNamespace-values.yaml | 19 ---
...loyment-tcp-udp-portNamePrefix-values.yaml | 17 ---
.../ci/deployment-tcp-udp-values.yaml | 15 ---
.../ci/deployment-tcp-values.yaml | 11 --
.../deployment-webhook-extraEnvs-values.yaml | 12 --
.../deployment-webhook-resources-values.yaml | 23 ----
.../third-party-addons/opentelemetry.md | 2 +-
magefiles/steps/helm.go | 4 +-
test/e2e/run-chart-test.sh | 41 ++++---
51 files changed, 306 insertions(+), 584 deletions(-)
create mode 100644 .github/workflows/chart.yaml
delete mode 100644 .github/workflows/helm.yaml
rename charts/ingress-nginx/ci/{deamonset-default-values.yaml => admission-webhooks-cert-manager-values.yaml} (79%)
delete mode 100644 charts/ingress-nginx/ci/controller-admission-tls-cert-manager-values.yaml
create mode 100644 charts/ingress-nginx/ci/controller-configmap-addheaders-values.yaml
create mode 100644 charts/ingress-nginx/ci/controller-configmap-proxyheaders-values.yaml
rename charts/ingress-nginx/ci/{deployment-customconfig-values.yaml => controller-configmap-values.yaml} (70%)
delete mode 100644 charts/ingress-nginx/ci/controller-custom-ingressclass-flags.yaml
create mode 100644 charts/ingress-nginx/ci/controller-daemonset-extra-modules-values.yaml
rename charts/ingress-nginx/ci/{deamonset-webhook-values.yaml => controller-daemonset-metrics-values.yaml} (89%)
rename charts/ingress-nginx/ci/{deployment-opentelemetry-customregistry-values.yaml => controller-daemonset-opentelemetry-values.yaml} (88%)
rename charts/ingress-nginx/ci/{daemonset-podannotations-values.yaml => controller-daemonset-podannotations-values.yaml} (81%)
rename charts/ingress-nginx/ci/{deployment-default-values.yaml => controller-daemonset-values.yaml} (78%)
create mode 100644 charts/ingress-nginx/ci/controller-deployment-extra-modules-values.yaml
rename charts/ingress-nginx/ci/{deployment-webhook-values.yaml => controller-deployment-metrics-values.yaml} (82%)
rename charts/ingress-nginx/ci/{deployment-metrics-values.yaml => controller-deployment-opentelemetry-values.yaml} (74%)
rename charts/ingress-nginx/ci/{deployment-podannotations-values.yaml => controller-deployment-podannotations-values.yaml} (80%)
create mode 100644 charts/ingress-nginx/ci/controller-deployment-values.yaml
rename charts/ingress-nginx/ci/{deployment-autoscaling-behavior-values.yaml => controller-hpa-values.yaml} (71%)
create mode 100644 charts/ingress-nginx/ci/controller-ingressclass-values.yaml
rename charts/ingress-nginx/ci/{daemonset-internal-lb-values.yaml => controller-service-internal-values.yaml} (81%)
rename charts/ingress-nginx/ci/{deployment-customnodeport-values.yaml => controller-service-values.yaml} (69%)
delete mode 100644 charts/ingress-nginx/ci/daemonset-customconfig-values.yaml
delete mode 100644 charts/ingress-nginx/ci/daemonset-customnodeport-values.yaml
delete mode 100644 charts/ingress-nginx/ci/daemonset-extra-modules.yaml
delete mode 100644 charts/ingress-nginx/ci/daemonset-headers-values.yaml
delete mode 100644 charts/ingress-nginx/ci/daemonset-nodeport-values.yaml
delete mode 100644 charts/ingress-nginx/ci/daemonset-tcp-udp-configMapNamespace-values.yaml
delete mode 100644 charts/ingress-nginx/ci/daemonset-tcp-udp-portNamePrefix-values.yaml
delete mode 100644 charts/ingress-nginx/ci/daemonset-tcp-udp-values.yaml
delete mode 100644 charts/ingress-nginx/ci/daemonset-tcp-values.yaml
delete mode 100644 charts/ingress-nginx/ci/deamonset-metrics-values.yaml
delete mode 100644 charts/ingress-nginx/ci/deployment-autoscaling-values.yaml
delete mode 100644 charts/ingress-nginx/ci/deployment-extra-modules-default-container-sec-context.yaml
delete mode 100644 charts/ingress-nginx/ci/deployment-extra-modules-specific-container-sec-context.yaml
delete mode 100644 charts/ingress-nginx/ci/deployment-extra-modules.yaml
delete mode 100644 charts/ingress-nginx/ci/deployment-headers-values.yaml
delete mode 100644 charts/ingress-nginx/ci/deployment-internal-lb-values.yaml
delete mode 100644 charts/ingress-nginx/ci/deployment-nodeport-values.yaml
delete mode 100644 charts/ingress-nginx/ci/deployment-tcp-udp-configMapNamespace-values.yaml
delete mode 100644 charts/ingress-nginx/ci/deployment-tcp-udp-portNamePrefix-values.yaml
delete mode 100644 charts/ingress-nginx/ci/deployment-tcp-udp-values.yaml
delete mode 100644 charts/ingress-nginx/ci/deployment-tcp-values.yaml
delete mode 100644 charts/ingress-nginx/ci/deployment-webhook-extraEnvs-values.yaml
delete mode 100644 charts/ingress-nginx/ci/deployment-webhook-resources-values.yaml
diff --git a/.github/workflows/chart.yaml b/.github/workflows/chart.yaml
new file mode 100644
index 000000000..b99374a90
--- /dev/null
+++ b/.github/workflows/chart.yaml
@@ -0,0 +1,64 @@
+name: Chart
+
+on:
+ push:
+ branches:
+ - main
+ - release-*
+ paths:
+ - charts/ingress-nginx/Chart.yaml
+
+ workflow_dispatch:
+
+permissions:
+ contents: read
+
+jobs:
+ release:
+ name: Release
+ runs-on: ubuntu-latest
+
+ permissions:
+ contents: write
+
+ steps:
+ - name: Set up Python
+ uses: actions/setup-python@f677139bbe7f9c59b41e40162b753c062f5d49a3 # v5.2.0
+ with:
+ python-version: 3.x
+
+ - name: Set up Helm
+ uses: azure/setup-helm@fe7b79cd5ee1e45176fcad797de68ecaf3ca4814 # v4.2.0
+
+ - name: Set up Helm Chart Testing
+ uses: helm/chart-testing-action@e6669bcd63d7cb57cb4380c33043eebe5d111992 # v2.6.1
+
+ - name: Set up Artifact Hub
+ run: |
+ curl --fail --location https://github.com/artifacthub/hub/releases/download/v1.19.0/ah_1.19.0_linux_amd64.tar.gz --output /tmp/ah.tar.gz
+ echo "0e430493521ce387ca04d79b26646a86f92886dbcceb44985bb71082a9530ca5 /tmp/ah.tar.gz" | shasum --check
+ sudo tar --extract --file /tmp/ah.tar.gz --directory /usr/local/bin ah
+
+ - name: Set up Git
+ run: |
+ git config --global user.name "${GITHUB_ACTOR}"
+ git config --global user.email "${GITHUB_ACTOR}@users.noreply.github.com"
+
+ - name: Checkout code
+ uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
+ with:
+ fetch-depth: 0
+
+ - name: Lint chart
+ run: |
+ ct lint --config .ct.yaml
+ ah lint --path charts/ingress-nginx
+
+ - name: Release chart
+ uses: helm/chart-releaser-action@a917fd15b20e8b64b94d9158ad54cd6345335584 # v1.6.0
+ env:
+ CR_TOKEN: ${{ secrets.GITHUB_TOKEN }}
+ CR_RELEASE_NAME_TEMPLATE: helm-chart-{{ .Version }}
+ CR_SKIP_EXISTING: true
+ with:
+ charts_dir: charts
diff --git a/.github/workflows/ci.yaml b/.github/workflows/ci.yaml
index 77a03fe7b..3b937594a 100644
--- a/.github/workflows/ci.yaml
+++ b/.github/workflows/ci.yaml
@@ -208,112 +208,88 @@ jobs:
path: docker.tar.gz
retention-days: 5
- helm-lint:
- name: Helm chart lint
+ chart-lint:
+ name: Chart / Lint
runs-on: ubuntu-latest
needs:
- changes
- if: |
- (needs.changes.outputs.charts == 'true') || (needs.changes.outputs.baseimage == 'true') || ${{ github.event.workflow_dispatch.run_e2e == 'true' }}
+
+ if: fromJSON(needs.changes.outputs.charts) || fromJSON(needs.changes.outputs.baseimage) || fromJSON(github.event.workflow_dispatch.run_e2e)
steps:
- - name: Checkout
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
+ - name: Set up Python
+ uses: actions/setup-python@f677139bbe7f9c59b41e40162b753c062f5d49a3 # v5.2.0
with:
- fetch-depth: 0
+ python-version: 3.x
- name: Set up Helm
uses: azure/setup-helm@fe7b79cd5ee1e45176fcad797de68ecaf3ca4814 # v4.2.0
- - uses: actions/setup-python@f677139bbe7f9c59b41e40162b753c062f5d49a3 # v5.2.0
- with:
- python-version: '3.x'
-
- - name: Set up chart-testing
+ - name: Set up Helm Chart Testing
uses: helm/chart-testing-action@e6669bcd63d7cb57cb4380c33043eebe5d111992 # v2.6.1
- - name: Install Helm Unit Test Plugin
+ - name: Set up Artifact Hub
run: |
- helm plugin install https://github.com/helm-unittest/helm-unittest
+ curl --fail --location https://github.com/artifacthub/hub/releases/download/v1.19.0/ah_1.19.0_linux_amd64.tar.gz --output /tmp/ah.tar.gz
+ echo "0e430493521ce387ca04d79b26646a86f92886dbcceb44985bb71082a9530ca5 /tmp/ah.tar.gz" | shasum --check
+ sudo tar --extract --file /tmp/ah.tar.gz --directory /usr/local/bin ah
- - name: Run Helm Unit Tests
+ - name: Set up Helm Docs
+ uses: gabe565/setup-helm-docs-action@d5c35bdc9133cfbea3b671acadf50a29029e87c2 # v1.0.4
+
+ - name: Set up Helm Unit Test
+ run: helm plugin install https://github.com/helm-unittest/helm-unittest
+
+ - name: Checkout code
+ uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
+ with:
+ fetch-depth: 0
+
+ - name: Lint chart
run: |
- helm unittest charts/ingress-nginx -d
+ ct lint --config .ct.yaml
+ ah lint --path charts/ingress-nginx
- - name: Run chart-testing (lint)
- run: ct lint --config ./.ct.yaml
-
- - name: Run helm-docs
+ - name: Check docs
run: |
- GOBIN=$PWD GO111MODULE=on go install github.com/norwoodj/helm-docs/cmd/helm-docs@v1.11.0
- ./helm-docs --chart-search-root=${GITHUB_WORKSPACE}/charts
- DIFF=$(git diff ${GITHUB_WORKSPACE}/charts/ingress-nginx/README.md)
- if [ ! -z "$DIFF" ]; then
- echo "Please use helm-docs in your clone, of your fork, of the project, and commit a updated README.md for the chart. https://github.com/kubernetes/ingress-nginx/blob/main/RELEASE.md#d-edit-the-valuesyaml-and-run-helm-docs"
- fi
- git diff --exit-code
- rm -f ./helm-docs
+ helm-docs --chart-search-root charts
+ git diff --exit-code charts/ingress-nginx/README.md
- - name: Run Artifact Hub lint
- run: |
- wget https://github.com/artifacthub/hub/releases/download/v1.5.0/ah_1.5.0_linux_amd64.tar.gz
- echo 'ad0e44c6ea058ab6b85dbf582e88bad9fdbc64ded0d1dd4edbac65133e5c87da *ah_1.5.0_linux_amd64.tar.gz' | shasum -c
- tar -xzvf ah_1.5.0_linux_amd64.tar.gz ah
- ./ah lint -p charts/ingress-nginx || exit 1
- rm -f ./ah ./ah_1.5.0_linux_amd64.tar.gz
+ - name: Run tests
+ run: helm unittest charts/ingress-nginx
- helm-test:
- name: Helm chart testing
+ chart-test:
+ name: Chart / Test
runs-on: ubuntu-latest
needs:
- changes
- build
- - helm-lint
- if: |
- (needs.changes.outputs.charts == 'true') || (needs.changes.outputs.baseimage == 'true') || ${{ github.event.workflow_dispatch.run_e2e == 'true' }}
+ - chart-lint
+
+ if: fromJSON(needs.changes.outputs.charts) || fromJSON(needs.changes.outputs.baseimage) || fromJSON(github.event.workflow_dispatch.run_e2e)
strategy:
matrix:
k8s: [v1.28.13, v1.29.8, v1.30.4, v1.31.0]
steps:
- - name: Checkout
+ - name: Checkout code
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- - name: Setup Go
- uses: actions/setup-go@0a12ed9d6a96ab950c8f026ed9f722fe0da7ef32 # v5.0.2
- with:
- go-version: ${{ needs.build.outputs.golangversion }}
- check-latest: true
-
- - name: cache
+ - name: Download cache
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
with:
name: docker.tar.gz
- - name: fix permissions
- run: |
- sudo mkdir -p $HOME/.kube
- sudo chmod -R 777 $HOME/.kube
+ - name: Load cache
+ run: gzip --decompress --stdout docker.tar.gz | docker load
- - name: Create Kubernetes ${{ matrix.k8s }} cluster
- id: kind
- run: |
- kind create cluster --image=kindest/node:${{ matrix.k8s }}
-
- - name: Load images from cache
- run: |
- echo "loading docker images..."
- gzip -dc docker.tar.gz | docker load
-
- - name: Test
+ - name: Run tests
env:
- KIND_CLUSTER_NAME: kind
- SKIP_CLUSTER_CREATION: true
+ K8S_VERSION: ${{ matrix.k8s }}
SKIP_IMAGE_CREATION: true
- SKIP_INGRESS_IMAGE_CREATION: true
run: |
- kind get kubeconfig > $HOME/.kube/kind-config-kind
+ sudo mkdir -pm 777 "${HOME}/.kube"
make kind-e2e-chart-tests
kubernetes:
diff --git a/.github/workflows/helm.yaml b/.github/workflows/helm.yaml
deleted file mode 100644
index f7a68af1a..000000000
--- a/.github/workflows/helm.yaml
+++ /dev/null
@@ -1,88 +0,0 @@
-name: Helm
-
-on:
- push:
- branches:
- - main
- - release-*
-
- workflow_dispatch:
-
-permissions:
- contents: read
-
-jobs:
-
- changes:
- runs-on: ubuntu-latest
-
- permissions:
- contents: read # for dorny/paths-filter to fetch a list of changed files
-
- if: github.repository == 'kubernetes/ingress-nginx'
-
- outputs:
- docs: ${{ steps.filter.outputs.docs }}
- charts: ${{ steps.filter.outputs.charts }}
-
- steps:
- - name: Checkout
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
-
- - name: Run Artifact Hub lint
- run: |
- wget https://github.com/artifacthub/hub/releases/download/v1.5.0/ah_1.5.0_linux_amd64.tar.gz
- echo 'ad0e44c6ea058ab6b85dbf582e88bad9fdbc64ded0d1dd4edbac65133e5c87da *ah_1.5.0_linux_amd64.tar.gz' | shasum -c
- tar -xzvf ah_1.5.0_linux_amd64.tar.gz ah
- ./ah lint -p charts/ingress-nginx || exit 1
- rm -f ./ah ./ah_1.5.0_linux_amd64.tar.gz
-
- - name: Set up chart-testing
- uses: helm/chart-testing-action@e6669bcd63d7cb57cb4380c33043eebe5d111992 # v2.6.1
-
- - name: Run chart-testing (lint)
- run: ct lint --target-branch ${{ github.ref_name }} --config ./.ct.yaml
-
- - uses: dorny/paths-filter@de90cc6fb38fc0963ad72b210f1f284cd68cea36 # v3.0.2
- id: filter
- with:
- token: ${{ secrets.GITHUB_TOKEN }}
- filters: |
- charts:
- - 'charts/ingress-nginx/Chart.yaml'
- - 'charts/ingress-nginx/values.yaml'
-
- chart:
- name: Release Chart
- runs-on: ubuntu-latest
-
- permissions:
- contents: write # needed to write releases
-
- needs:
- - changes
-
- if: ${{ needs.changes.outputs.charts == 'true' }}
-
- steps:
- - name: Checkout master
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- with:
- # Fetch entire history. Required for chart-releaser; see https://github.com/helm/chart-releaser-action/issues/13#issuecomment-602063896
- fetch-depth: 0
- ref: ${{ github.ref_name }}
-
- - name: Setup
- shell: bash
- run: |
- git config --global user.name "$GITHUB_ACTOR"
- git config --global user.email "$GITHUB_ACTOR@users.noreply.github.com"
-
- - name: Helm Chart Releaser
- uses: helm/chart-releaser-action@a917fd15b20e8b64b94d9158ad54cd6345335584 # v1.6.0
- env:
- CR_SKIP_EXISTING: true
- CR_TOKEN: "${{ secrets.GITHUB_TOKEN }}"
- CR_RELEASE_NAME_TEMPLATE: "helm-chart-{{ .Version }}"
- with:
- charts_dir: charts
diff --git a/.gitignore b/.gitignore
index 73108f627..5eac1a800 100644
--- a/.gitignore
+++ b/.gitignore
@@ -1,4 +1,3 @@
-helm-docs
# OSX
._*
.DS_Store
diff --git a/MANUAL_RELEASE.md b/MANUAL_RELEASE.md
index b1c1fd068..8a6b10bc1 100644
--- a/MANUAL_RELEASE.md
+++ b/MANUAL_RELEASE.md
@@ -226,19 +226,18 @@ Promoting the images basically means that images, that were pushed to staging co
```
### d. Edit the values.yaml and run helm-docs
+
- [Fields to edit in values.yaml](https://github.com/kubernetes/ingress-nginx/blob/main/charts/ingress-nginx/values.yaml)
- tag
- digest
- - [helm-docs](https://github.com/norwoodj/helm-docs) is a tool that generates the README.md for a helm-chart automatically. In the CI pipeline workflow of github actions (/.github/workflows/ci.yaml), you can see how helm-docs is used. But the CI pipeline is not designed to make commits back into the project. So we need to run helm-docs manually, and check in the resulting autogenerated README.md at the path /charts/ingress-nginx/README.md
+ - [helm-docs](https://github.com/norwoodj/helm-docs) is a tool that generates the README.md for a Helm chart automatically. In the CI pipeline workflow of GitHub actions (.github/workflows/ci.yaml), you can see how helm-docs is used. The CI pipeline is not designed to make commits back into the project, so we need to run helm-docs manually and commit the resulting generated README.md. You can obtain a recent version of the helm-docs binary here: https://github.com/norwoodj/helm-docs/releases.
```
- GOBIN=$PWD GO111MODULE=on go install github.com/norwoodj/helm-docs/cmd/helm-docs@v1.11.0
- ./helm-docs --chart-search-root=${GITHUB_WORKSPACE}/charts
- git diff --exit-code
- rm -f ./helm-docs
+ helm-docs --chart-search-root charts
+ git diff charts/ingress-nginx/README.md
```
- Watchout for mistakes like leaving the helm-docs executable in your clone workspace or not checking the new README.md manually etc.
+ Take care of not leaving the helm-docs executable in your clone workspace or not committing the new README.md.
### e. Edit the static manifests
diff --git a/charts/ingress-nginx/ci/deamonset-default-values.yaml b/charts/ingress-nginx/ci/admission-webhooks-cert-manager-values.yaml
similarity index 79%
rename from charts/ingress-nginx/ci/deamonset-default-values.yaml
rename to charts/ingress-nginx/ci/admission-webhooks-cert-manager-values.yaml
index 82fa23e85..7eafd0c5b 100644
--- a/charts/ingress-nginx/ci/deamonset-default-values.yaml
+++ b/charts/ingress-nginx/ci/admission-webhooks-cert-manager-values.yaml
@@ -1,10 +1,12 @@
controller:
- kind: DaemonSet
image:
repository: ingress-controller/controller
tag: 1.0.0-dev
digest: null
- admissionWebhooks:
- enabled: false
+
service:
type: ClusterIP
+
+ admissionWebhooks:
+ certManager:
+ enabled: true
diff --git a/charts/ingress-nginx/ci/controller-admission-tls-cert-manager-values.yaml b/charts/ingress-nginx/ci/controller-admission-tls-cert-manager-values.yaml
deleted file mode 100644
index a13241cd4..000000000
--- a/charts/ingress-nginx/ci/controller-admission-tls-cert-manager-values.yaml
+++ /dev/null
@@ -1,6 +0,0 @@
-controller:
- admissionWebhooks:
- certManager:
- enabled: true
- service:
- type: ClusterIP
diff --git a/charts/ingress-nginx/ci/controller-configmap-addheaders-values.yaml b/charts/ingress-nginx/ci/controller-configmap-addheaders-values.yaml
new file mode 100644
index 000000000..460a610ba
--- /dev/null
+++ b/charts/ingress-nginx/ci/controller-configmap-addheaders-values.yaml
@@ -0,0 +1,11 @@
+controller:
+ image:
+ repository: ingress-controller/controller
+ tag: 1.0.0-dev
+ digest: null
+
+ service:
+ type: ClusterIP
+
+ addHeaders:
+ X-Frame-Options: deny
diff --git a/charts/ingress-nginx/ci/controller-configmap-proxyheaders-values.yaml b/charts/ingress-nginx/ci/controller-configmap-proxyheaders-values.yaml
new file mode 100644
index 000000000..e23a13c0c
--- /dev/null
+++ b/charts/ingress-nginx/ci/controller-configmap-proxyheaders-values.yaml
@@ -0,0 +1,11 @@
+controller:
+ image:
+ repository: ingress-controller/controller
+ tag: 1.0.0-dev
+ digest: null
+
+ service:
+ type: ClusterIP
+
+ proxySetHeaders:
+ X-Forwarded-Proto: https
diff --git a/charts/ingress-nginx/ci/deployment-customconfig-values.yaml b/charts/ingress-nginx/ci/controller-configmap-values.yaml
similarity index 70%
rename from charts/ingress-nginx/ci/deployment-customconfig-values.yaml
rename to charts/ingress-nginx/ci/controller-configmap-values.yaml
index 174941848..a7029895c 100644
--- a/charts/ingress-nginx/ci/deployment-customconfig-values.yaml
+++ b/charts/ingress-nginx/ci/controller-configmap-values.yaml
@@ -3,10 +3,9 @@ controller:
repository: ingress-controller/controller
tag: 1.0.0-dev
digest: null
- config:
- use-proxy-protocol: "true"
- allowSnippetAnnotations: false
- admissionWebhooks:
- enabled: false
+
service:
type: ClusterIP
+
+ config:
+ use-proxy-protocol: "true"
diff --git a/charts/ingress-nginx/ci/controller-custom-ingressclass-flags.yaml b/charts/ingress-nginx/ci/controller-custom-ingressclass-flags.yaml
deleted file mode 100644
index b28a2326e..000000000
--- a/charts/ingress-nginx/ci/controller-custom-ingressclass-flags.yaml
+++ /dev/null
@@ -1,7 +0,0 @@
-controller:
- watchIngressWithoutClass: true
- ingressClassResource:
- name: custom-nginx
- enabled: true
- default: true
- controllerValue: "k8s.io/custom-nginx"
diff --git a/charts/ingress-nginx/ci/controller-daemonset-extra-modules-values.yaml b/charts/ingress-nginx/ci/controller-daemonset-extra-modules-values.yaml
new file mode 100644
index 000000000..edf12e77e
--- /dev/null
+++ b/charts/ingress-nginx/ci/controller-daemonset-extra-modules-values.yaml
@@ -0,0 +1,30 @@
+controller:
+ image:
+ repository: ingress-controller/controller
+ tag: 1.0.0-dev
+ digest: null
+
+ service:
+ type: ClusterIP
+
+ kind: DaemonSet
+
+ extraModules:
+ - name: opentelemetry
+ image:
+ registry: registry.k8s.io
+ image: ingress-nginx/opentelemetry-1.25.3
+ tag: v20240813-b933310d
+ digest: sha256:f7604ac0547ed64d79b98d92133234e66c2c8aade3c1f4809fed5eec1fb7f922
+ distroless: true
+ containerSecurityContext:
+ runAsNonRoot: true
+ runAsUser: 65532
+ runAsGroup: 65532
+ allowPrivilegeEscalation: false
+ seccompProfile:
+ type: RuntimeDefault
+ capabilities:
+ drop:
+ - ALL
+ readOnlyRootFilesystem: true
diff --git a/charts/ingress-nginx/ci/deamonset-webhook-values.yaml b/charts/ingress-nginx/ci/controller-daemonset-metrics-values.yaml
similarity index 89%
rename from charts/ingress-nginx/ci/deamonset-webhook-values.yaml
rename to charts/ingress-nginx/ci/controller-daemonset-metrics-values.yaml
index 54d364df1..7a98580cd 100644
--- a/charts/ingress-nginx/ci/deamonset-webhook-values.yaml
+++ b/charts/ingress-nginx/ci/controller-daemonset-metrics-values.yaml
@@ -1,10 +1,13 @@
controller:
- kind: DaemonSet
image:
repository: ingress-controller/controller
tag: 1.0.0-dev
digest: null
- admissionWebhooks:
- enabled: true
+
service:
type: ClusterIP
+
+ kind: DaemonSet
+
+ metrics:
+ enabled: true
diff --git a/charts/ingress-nginx/ci/deployment-opentelemetry-customregistry-values.yaml b/charts/ingress-nginx/ci/controller-daemonset-opentelemetry-values.yaml
similarity index 88%
rename from charts/ingress-nginx/ci/deployment-opentelemetry-customregistry-values.yaml
rename to charts/ingress-nginx/ci/controller-daemonset-opentelemetry-values.yaml
index fb3ef4446..179ab2a85 100644
--- a/charts/ingress-nginx/ci/deployment-opentelemetry-customregistry-values.yaml
+++ b/charts/ingress-nginx/ci/controller-daemonset-opentelemetry-values.yaml
@@ -3,7 +3,11 @@ controller:
repository: ingress-controller/controller
tag: 1.0.0-dev
digest: null
+
service:
type: ClusterIP
+
+ kind: DaemonSet
+
opentelemetry:
enabled: true
diff --git a/charts/ingress-nginx/ci/daemonset-podannotations-values.yaml b/charts/ingress-nginx/ci/controller-daemonset-podannotations-values.yaml
similarity index 81%
rename from charts/ingress-nginx/ci/daemonset-podannotations-values.yaml
rename to charts/ingress-nginx/ci/controller-daemonset-podannotations-values.yaml
index 0b55306a1..405992ef3 100644
--- a/charts/ingress-nginx/ci/daemonset-podannotations-values.yaml
+++ b/charts/ingress-nginx/ci/controller-daemonset-podannotations-values.yaml
@@ -1,17 +1,16 @@
controller:
- kind: DaemonSet
image:
repository: ingress-controller/controller
tag: 1.0.0-dev
digest: null
- admissionWebhooks:
- enabled: false
- metrics:
- enabled: true
+
service:
type: ClusterIP
+
+ kind: DaemonSet
+
podAnnotations:
- prometheus.io/path: /metrics
+ prometheus.io/scrape: "true"
prometheus.io/port: "10254"
prometheus.io/scheme: http
- prometheus.io/scrape: "true"
+ prometheus.io/path: /metrics
diff --git a/charts/ingress-nginx/ci/deployment-default-values.yaml b/charts/ingress-nginx/ci/controller-daemonset-values.yaml
similarity index 78%
rename from charts/ingress-nginx/ci/deployment-default-values.yaml
rename to charts/ingress-nginx/ci/controller-daemonset-values.yaml
index 9f46b4e7e..d34025c80 100644
--- a/charts/ingress-nginx/ci/deployment-default-values.yaml
+++ b/charts/ingress-nginx/ci/controller-daemonset-values.yaml
@@ -1,8 +1,10 @@
-# Left blank to test default values
controller:
image:
repository: ingress-controller/controller
tag: 1.0.0-dev
digest: null
+
service:
type: ClusterIP
+
+ kind: DaemonSet
diff --git a/charts/ingress-nginx/ci/controller-deployment-extra-modules-values.yaml b/charts/ingress-nginx/ci/controller-deployment-extra-modules-values.yaml
new file mode 100644
index 000000000..d4083cc37
--- /dev/null
+++ b/charts/ingress-nginx/ci/controller-deployment-extra-modules-values.yaml
@@ -0,0 +1,30 @@
+controller:
+ image:
+ repository: ingress-controller/controller
+ tag: 1.0.0-dev
+ digest: null
+
+ service:
+ type: ClusterIP
+
+ kind: Deployment
+
+ extraModules:
+ - name: opentelemetry
+ image:
+ registry: registry.k8s.io
+ image: ingress-nginx/opentelemetry-1.25.3
+ tag: v20240813-b933310d
+ digest: sha256:f7604ac0547ed64d79b98d92133234e66c2c8aade3c1f4809fed5eec1fb7f922
+ distroless: true
+ containerSecurityContext:
+ runAsNonRoot: true
+ runAsUser: 65532
+ runAsGroup: 65532
+ allowPrivilegeEscalation: false
+ seccompProfile:
+ type: RuntimeDefault
+ capabilities:
+ drop:
+ - ALL
+ readOnlyRootFilesystem: true
diff --git a/charts/ingress-nginx/ci/deployment-webhook-values.yaml b/charts/ingress-nginx/ci/controller-deployment-metrics-values.yaml
similarity index 82%
rename from charts/ingress-nginx/ci/deployment-webhook-values.yaml
rename to charts/ingress-nginx/ci/controller-deployment-metrics-values.yaml
index 76669a530..9c95d347c 100644
--- a/charts/ingress-nginx/ci/deployment-webhook-values.yaml
+++ b/charts/ingress-nginx/ci/controller-deployment-metrics-values.yaml
@@ -3,7 +3,11 @@ controller:
repository: ingress-controller/controller
tag: 1.0.0-dev
digest: null
- admissionWebhooks:
- enabled: true
+
service:
type: ClusterIP
+
+ kind: Deployment
+
+ metrics:
+ enabled: true
diff --git a/charts/ingress-nginx/ci/deployment-metrics-values.yaml b/charts/ingress-nginx/ci/controller-deployment-opentelemetry-values.yaml
similarity index 74%
rename from charts/ingress-nginx/ci/deployment-metrics-values.yaml
rename to charts/ingress-nginx/ci/controller-deployment-opentelemetry-values.yaml
index 9209ad5a6..9443ddefc 100644
--- a/charts/ingress-nginx/ci/deployment-metrics-values.yaml
+++ b/charts/ingress-nginx/ci/controller-deployment-opentelemetry-values.yaml
@@ -3,9 +3,11 @@ controller:
repository: ingress-controller/controller
tag: 1.0.0-dev
digest: null
- admissionWebhooks:
- enabled: false
- metrics:
- enabled: true
+
service:
type: ClusterIP
+
+ kind: Deployment
+
+ opentelemetry:
+ enabled: true
diff --git a/charts/ingress-nginx/ci/deployment-podannotations-values.yaml b/charts/ingress-nginx/ci/controller-deployment-podannotations-values.yaml
similarity index 80%
rename from charts/ingress-nginx/ci/deployment-podannotations-values.yaml
rename to charts/ingress-nginx/ci/controller-deployment-podannotations-values.yaml
index b48d93c46..cf1f2611e 100644
--- a/charts/ingress-nginx/ci/deployment-podannotations-values.yaml
+++ b/charts/ingress-nginx/ci/controller-deployment-podannotations-values.yaml
@@ -3,14 +3,14 @@ controller:
repository: ingress-controller/controller
tag: 1.0.0-dev
digest: null
- admissionWebhooks:
- enabled: false
- metrics:
- enabled: true
+
service:
type: ClusterIP
+
+ kind: Deployment
+
podAnnotations:
- prometheus.io/path: /metrics
+ prometheus.io/scrape: "true"
prometheus.io/port: "10254"
prometheus.io/scheme: http
- prometheus.io/scrape: "true"
+ prometheus.io/path: /metrics
diff --git a/charts/ingress-nginx/ci/controller-deployment-values.yaml b/charts/ingress-nginx/ci/controller-deployment-values.yaml
new file mode 100644
index 000000000..1b092dc0c
--- /dev/null
+++ b/charts/ingress-nginx/ci/controller-deployment-values.yaml
@@ -0,0 +1,10 @@
+controller:
+ image:
+ repository: ingress-controller/controller
+ tag: 1.0.0-dev
+ digest: null
+
+ service:
+ type: ClusterIP
+
+ kind: Deployment
diff --git a/charts/ingress-nginx/ci/deployment-autoscaling-behavior-values.yaml b/charts/ingress-nginx/ci/controller-hpa-values.yaml
similarity index 71%
rename from charts/ingress-nginx/ci/deployment-autoscaling-behavior-values.yaml
rename to charts/ingress-nginx/ci/controller-hpa-values.yaml
index dca3f35f8..54a0d2f75 100644
--- a/charts/ingress-nginx/ci/deployment-autoscaling-behavior-values.yaml
+++ b/charts/ingress-nginx/ci/controller-hpa-values.yaml
@@ -1,4 +1,12 @@
controller:
+ image:
+ repository: ingress-controller/controller
+ tag: 1.0.0-dev
+ digest: null
+
+ service:
+ type: ClusterIP
+
autoscaling:
enabled: true
behavior:
@@ -8,7 +16,3 @@ controller:
- type: Pods
value: 1
periodSeconds: 180
- admissionWebhooks:
- enabled: false
- service:
- type: ClusterIP
diff --git a/charts/ingress-nginx/ci/controller-ingressclass-values.yaml b/charts/ingress-nginx/ci/controller-ingressclass-values.yaml
new file mode 100644
index 000000000..c06429f97
--- /dev/null
+++ b/charts/ingress-nginx/ci/controller-ingressclass-values.yaml
@@ -0,0 +1,15 @@
+controller:
+ image:
+ repository: ingress-controller/controller
+ tag: 1.0.0-dev
+ digest: null
+
+ service:
+ type: ClusterIP
+
+ ingressClassResource:
+ name: custom-nginx
+ default: true
+ controllerValue: k8s.io/custom-nginx
+
+ watchIngressWithoutClass: true
diff --git a/charts/ingress-nginx/ci/daemonset-internal-lb-values.yaml b/charts/ingress-nginx/ci/controller-service-internal-values.yaml
similarity index 81%
rename from charts/ingress-nginx/ci/daemonset-internal-lb-values.yaml
rename to charts/ingress-nginx/ci/controller-service-internal-values.yaml
index 0a200a746..11108fbce 100644
--- a/charts/ingress-nginx/ci/daemonset-internal-lb-values.yaml
+++ b/charts/ingress-nginx/ci/controller-service-internal-values.yaml
@@ -1,13 +1,12 @@
controller:
- kind: DaemonSet
image:
repository: ingress-controller/controller
tag: 1.0.0-dev
digest: null
- admissionWebhooks:
- enabled: false
+
service:
type: ClusterIP
+
internal:
enabled: true
annotations:
diff --git a/charts/ingress-nginx/ci/deployment-customnodeport-values.yaml b/charts/ingress-nginx/ci/controller-service-values.yaml
similarity index 69%
rename from charts/ingress-nginx/ci/deployment-customnodeport-values.yaml
rename to charts/ingress-nginx/ci/controller-service-values.yaml
index a564eaf93..9039368c2 100644
--- a/charts/ingress-nginx/ci/deployment-customnodeport-values.yaml
+++ b/charts/ingress-nginx/ci/controller-service-values.yaml
@@ -3,18 +3,20 @@ controller:
repository: ingress-controller/controller
tag: 1.0.0-dev
digest: null
- admissionWebhooks:
- enabled: false
+
service:
type: NodePort
+
nodePorts:
tcp:
9000: 30090
udp:
9001: 30091
+portNamePrefix: port
+
tcp:
- 9000: "default/test:8080"
+ 9000: default/test:8080
udp:
- 9001: "default/test:8080"
+ 9001: default/test:8080
diff --git a/charts/ingress-nginx/ci/daemonset-customconfig-values.yaml b/charts/ingress-nginx/ci/daemonset-customconfig-values.yaml
deleted file mode 100644
index 4393a5bc0..000000000
--- a/charts/ingress-nginx/ci/daemonset-customconfig-values.yaml
+++ /dev/null
@@ -1,14 +0,0 @@
-controller:
- image:
- repository: ingress-controller/controller
- tag: 1.0.0-dev
- digest: null
- kind: DaemonSet
- allowSnippetAnnotations: false
- admissionWebhooks:
- enabled: false
- service:
- type: ClusterIP
-
- config:
- use-proxy-protocol: "true"
diff --git a/charts/ingress-nginx/ci/daemonset-customnodeport-values.yaml b/charts/ingress-nginx/ci/daemonset-customnodeport-values.yaml
deleted file mode 100644
index 1d94be219..000000000
--- a/charts/ingress-nginx/ci/daemonset-customnodeport-values.yaml
+++ /dev/null
@@ -1,22 +0,0 @@
-controller:
- kind: DaemonSet
- image:
- repository: ingress-controller/controller
- tag: 1.0.0-dev
- digest: null
- admissionWebhooks:
- enabled: false
-
- service:
- type: NodePort
- nodePorts:
- tcp:
- 9000: 30090
- udp:
- 9001: 30091
-
-tcp:
- 9000: "default/test:8080"
-
-udp:
- 9001: "default/test:8080"
diff --git a/charts/ingress-nginx/ci/daemonset-extra-modules.yaml b/charts/ingress-nginx/ci/daemonset-extra-modules.yaml
deleted file mode 100644
index 52a32fcbd..000000000
--- a/charts/ingress-nginx/ci/daemonset-extra-modules.yaml
+++ /dev/null
@@ -1,13 +0,0 @@
-controller:
- kind: DaemonSet
- image:
- repository: ingress-controller/controller
- tag: 1.0.0-dev
- service:
- type: ClusterIP
- extraModules:
- - name: opentelemetry
- image:
- registry: registry.k8s.io
- image: busybox
- tag: latest
diff --git a/charts/ingress-nginx/ci/daemonset-headers-values.yaml b/charts/ingress-nginx/ci/daemonset-headers-values.yaml
deleted file mode 100644
index ab7d47bd4..000000000
--- a/charts/ingress-nginx/ci/daemonset-headers-values.yaml
+++ /dev/null
@@ -1,14 +0,0 @@
-controller:
- kind: DaemonSet
- image:
- repository: ingress-controller/controller
- tag: 1.0.0-dev
- digest: null
- admissionWebhooks:
- enabled: false
- addHeaders:
- X-Frame-Options: deny
- proxySetHeaders:
- X-Forwarded-Proto: https
- service:
- type: ClusterIP
diff --git a/charts/ingress-nginx/ci/daemonset-nodeport-values.yaml b/charts/ingress-nginx/ci/daemonset-nodeport-values.yaml
deleted file mode 100644
index 3b7aa2fcd..000000000
--- a/charts/ingress-nginx/ci/daemonset-nodeport-values.yaml
+++ /dev/null
@@ -1,10 +0,0 @@
-controller:
- kind: DaemonSet
- image:
- repository: ingress-controller/controller
- tag: 1.0.0-dev
- digest: null
- admissionWebhooks:
- enabled: false
- service:
- type: NodePort
diff --git a/charts/ingress-nginx/ci/daemonset-tcp-udp-configMapNamespace-values.yaml b/charts/ingress-nginx/ci/daemonset-tcp-udp-configMapNamespace-values.yaml
deleted file mode 100644
index acd86a77a..000000000
--- a/charts/ingress-nginx/ci/daemonset-tcp-udp-configMapNamespace-values.yaml
+++ /dev/null
@@ -1,20 +0,0 @@
-controller:
- kind: DaemonSet
- image:
- repository: ingress-controller/controller
- tag: 1.0.0-dev
- digest: null
- admissionWebhooks:
- enabled: false
- service:
- type: ClusterIP
- tcp:
- configMapNamespace: default
- udp:
- configMapNamespace: default
-
-tcp:
- 9000: "default/test:8080"
-
-udp:
- 9001: "default/test:8080"
diff --git a/charts/ingress-nginx/ci/daemonset-tcp-udp-portNamePrefix-values.yaml b/charts/ingress-nginx/ci/daemonset-tcp-udp-portNamePrefix-values.yaml
deleted file mode 100644
index 90b0f57a5..000000000
--- a/charts/ingress-nginx/ci/daemonset-tcp-udp-portNamePrefix-values.yaml
+++ /dev/null
@@ -1,18 +0,0 @@
-controller:
- kind: DaemonSet
- image:
- repository: ingress-controller/controller
- tag: 1.0.0-dev
- digest: null
- admissionWebhooks:
- enabled: false
- service:
- type: ClusterIP
-
-tcp:
- 9000: "default/test:8080"
-
-udp:
- 9001: "default/test:8080"
-
-portNamePrefix: "port"
diff --git a/charts/ingress-nginx/ci/daemonset-tcp-udp-values.yaml b/charts/ingress-nginx/ci/daemonset-tcp-udp-values.yaml
deleted file mode 100644
index 25ee64d85..000000000
--- a/charts/ingress-nginx/ci/daemonset-tcp-udp-values.yaml
+++ /dev/null
@@ -1,16 +0,0 @@
-controller:
- kind: DaemonSet
- image:
- repository: ingress-controller/controller
- tag: 1.0.0-dev
- digest: null
- admissionWebhooks:
- enabled: false
- service:
- type: ClusterIP
-
-tcp:
- 9000: "default/test:8080"
-
-udp:
- 9001: "default/test:8080"
diff --git a/charts/ingress-nginx/ci/daemonset-tcp-values.yaml b/charts/ingress-nginx/ci/daemonset-tcp-values.yaml
deleted file mode 100644
index 380c8b4b1..000000000
--- a/charts/ingress-nginx/ci/daemonset-tcp-values.yaml
+++ /dev/null
@@ -1,14 +0,0 @@
-controller:
- kind: DaemonSet
- image:
- repository: ingress-controller/controller
- tag: 1.0.0-dev
- digest: null
- admissionWebhooks:
- enabled: false
- service:
- type: ClusterIP
-
-tcp:
- 9000: "default/test:8080"
- 9001: "default/test:8080"
diff --git a/charts/ingress-nginx/ci/deamonset-metrics-values.yaml b/charts/ingress-nginx/ci/deamonset-metrics-values.yaml
deleted file mode 100644
index cb3cb54be..000000000
--- a/charts/ingress-nginx/ci/deamonset-metrics-values.yaml
+++ /dev/null
@@ -1,12 +0,0 @@
-controller:
- kind: DaemonSet
- image:
- repository: ingress-controller/controller
- tag: 1.0.0-dev
- digest: null
- admissionWebhooks:
- enabled: false
- metrics:
- enabled: true
- service:
- type: ClusterIP
diff --git a/charts/ingress-nginx/ci/deployment-autoscaling-values.yaml b/charts/ingress-nginx/ci/deployment-autoscaling-values.yaml
deleted file mode 100644
index b8b3ac686..000000000
--- a/charts/ingress-nginx/ci/deployment-autoscaling-values.yaml
+++ /dev/null
@@ -1,11 +0,0 @@
-controller:
- image:
- repository: ingress-controller/controller
- tag: 1.0.0-dev
- digest: null
- autoscaling:
- enabled: true
- admissionWebhooks:
- enabled: false
- service:
- type: ClusterIP
diff --git a/charts/ingress-nginx/ci/deployment-extra-modules-default-container-sec-context.yaml b/charts/ingress-nginx/ci/deployment-extra-modules-default-container-sec-context.yaml
deleted file mode 100644
index 91b1b98a8..000000000
--- a/charts/ingress-nginx/ci/deployment-extra-modules-default-container-sec-context.yaml
+++ /dev/null
@@ -1,15 +0,0 @@
-controller:
- image:
- repository: ingress-controller/controller
- tag: 1.0.0-dev
- digest: null
- service:
- type: ClusterIP
- containerSecurityContext:
- allowPrivilegeEscalation: false
- extraModules:
- - name: opentelemetry
- image:
- registry: registry.k8s.io
- image: busybox
- tag: latest
diff --git a/charts/ingress-nginx/ci/deployment-extra-modules-specific-container-sec-context.yaml b/charts/ingress-nginx/ci/deployment-extra-modules-specific-container-sec-context.yaml
deleted file mode 100644
index b6013c7d0..000000000
--- a/charts/ingress-nginx/ci/deployment-extra-modules-specific-container-sec-context.yaml
+++ /dev/null
@@ -1,15 +0,0 @@
-controller:
- image:
- repository: ingress-controller/controller
- tag: 1.0.0-dev
- digest: null
- service:
- type: ClusterIP
- extraModules:
- - name: opentelemetry
- image:
- registry: registry.k8s.io
- image: busybox
- tag: latest
- containerSecurityContext:
- allowPrivilegeEscalation: false
diff --git a/charts/ingress-nginx/ci/deployment-extra-modules.yaml b/charts/ingress-nginx/ci/deployment-extra-modules.yaml
deleted file mode 100644
index 2fbe1cc01..000000000
--- a/charts/ingress-nginx/ci/deployment-extra-modules.yaml
+++ /dev/null
@@ -1,13 +0,0 @@
-controller:
- image:
- repository: ingress-controller/controller
- tag: 1.0.0-dev
- digest: null
- service:
- type: ClusterIP
- extraModules:
- - name: opentelemetry
- image:
- registry: registry.k8s.io
- image: busybox
- tag: latest
diff --git a/charts/ingress-nginx/ci/deployment-headers-values.yaml b/charts/ingress-nginx/ci/deployment-headers-values.yaml
deleted file mode 100644
index 17a11ac37..000000000
--- a/charts/ingress-nginx/ci/deployment-headers-values.yaml
+++ /dev/null
@@ -1,13 +0,0 @@
-controller:
- image:
- repository: ingress-controller/controller
- tag: 1.0.0-dev
- digest: null
- admissionWebhooks:
- enabled: false
- addHeaders:
- X-Frame-Options: deny
- proxySetHeaders:
- X-Forwarded-Proto: https
- service:
- type: ClusterIP
diff --git a/charts/ingress-nginx/ci/deployment-internal-lb-values.yaml b/charts/ingress-nginx/ci/deployment-internal-lb-values.yaml
deleted file mode 100644
index 663ccb9d1..000000000
--- a/charts/ingress-nginx/ci/deployment-internal-lb-values.yaml
+++ /dev/null
@@ -1,19 +0,0 @@
-controller:
- image:
- repository: ingress-controller/controller
- tag: 1.0.0-dev
- digest: null
- admissionWebhooks:
- enabled: false
- service:
- type: ClusterIP
- internal:
- enabled: true
- annotations:
- service.beta.kubernetes.io/aws-load-balancer-internal: "true"
- ports:
- http: 443
- https: 80
- targetPorts:
- http: 443
- https: 80
diff --git a/charts/ingress-nginx/ci/deployment-nodeport-values.yaml b/charts/ingress-nginx/ci/deployment-nodeport-values.yaml
deleted file mode 100644
index cd9b32352..000000000
--- a/charts/ingress-nginx/ci/deployment-nodeport-values.yaml
+++ /dev/null
@@ -1,9 +0,0 @@
-controller:
- image:
- repository: ingress-controller/controller
- tag: 1.0.0-dev
- digest: null
- admissionWebhooks:
- enabled: false
- service:
- type: NodePort
diff --git a/charts/ingress-nginx/ci/deployment-tcp-udp-configMapNamespace-values.yaml b/charts/ingress-nginx/ci/deployment-tcp-udp-configMapNamespace-values.yaml
deleted file mode 100644
index c51a4e91f..000000000
--- a/charts/ingress-nginx/ci/deployment-tcp-udp-configMapNamespace-values.yaml
+++ /dev/null
@@ -1,19 +0,0 @@
-controller:
- image:
- repository: ingress-controller/controller
- tag: 1.0.0-dev
- digest: null
- admissionWebhooks:
- enabled: false
- service:
- type: ClusterIP
- tcp:
- configMapNamespace: default
- udp:
- configMapNamespace: default
-
-tcp:
- 9000: "default/test:8080"
-
-udp:
- 9001: "default/test:8080"
diff --git a/charts/ingress-nginx/ci/deployment-tcp-udp-portNamePrefix-values.yaml b/charts/ingress-nginx/ci/deployment-tcp-udp-portNamePrefix-values.yaml
deleted file mode 100644
index 56323c5ee..000000000
--- a/charts/ingress-nginx/ci/deployment-tcp-udp-portNamePrefix-values.yaml
+++ /dev/null
@@ -1,17 +0,0 @@
-controller:
- image:
- repository: ingress-controller/controller
- tag: 1.0.0-dev
- digest: null
- admissionWebhooks:
- enabled: false
- service:
- type: ClusterIP
-
-tcp:
- 9000: "default/test:8080"
-
-udp:
- 9001: "default/test:8080"
-
-portNamePrefix: "port"
diff --git a/charts/ingress-nginx/ci/deployment-tcp-udp-values.yaml b/charts/ingress-nginx/ci/deployment-tcp-udp-values.yaml
deleted file mode 100644
index 5b45b69dc..000000000
--- a/charts/ingress-nginx/ci/deployment-tcp-udp-values.yaml
+++ /dev/null
@@ -1,15 +0,0 @@
-controller:
- image:
- repository: ingress-controller/controller
- tag: 1.0.0-dev
- digest: null
- admissionWebhooks:
- enabled: false
- service:
- type: ClusterIP
-
-tcp:
- 9000: "default/test:8080"
-
-udp:
- 9001: "default/test:8080"
diff --git a/charts/ingress-nginx/ci/deployment-tcp-values.yaml b/charts/ingress-nginx/ci/deployment-tcp-values.yaml
deleted file mode 100644
index ac0b6e60e..000000000
--- a/charts/ingress-nginx/ci/deployment-tcp-values.yaml
+++ /dev/null
@@ -1,11 +0,0 @@
-controller:
- image:
- repository: ingress-controller/controller
- tag: 1.0.0-dev
- digest: null
- service:
- type: ClusterIP
-
-tcp:
- 9000: "default/test:8080"
- 9001: "default/test:8080"
diff --git a/charts/ingress-nginx/ci/deployment-webhook-extraEnvs-values.yaml b/charts/ingress-nginx/ci/deployment-webhook-extraEnvs-values.yaml
deleted file mode 100644
index 95487b071..000000000
--- a/charts/ingress-nginx/ci/deployment-webhook-extraEnvs-values.yaml
+++ /dev/null
@@ -1,12 +0,0 @@
-controller:
- service:
- type: ClusterIP
- admissionWebhooks:
- enabled: true
- extraEnvs:
- - name: FOO
- value: foo
- - name: TEST
- value: test
- patch:
- enabled: true
diff --git a/charts/ingress-nginx/ci/deployment-webhook-resources-values.yaml b/charts/ingress-nginx/ci/deployment-webhook-resources-values.yaml
deleted file mode 100644
index 49ebbb02c..000000000
--- a/charts/ingress-nginx/ci/deployment-webhook-resources-values.yaml
+++ /dev/null
@@ -1,23 +0,0 @@
-controller:
- service:
- type: ClusterIP
- admissionWebhooks:
- enabled: true
- createSecretJob:
- resources:
- limits:
- cpu: 10m
- memory: 20Mi
- requests:
- cpu: 10m
- memory: 20Mi
- patchWebhookJob:
- resources:
- limits:
- cpu: 10m
- memory: 20Mi
- requests:
- cpu: 10m
- memory: 20Mi
- patch:
- enabled: true
diff --git a/docs/user-guide/third-party-addons/opentelemetry.md b/docs/user-guide/third-party-addons/opentelemetry.md
index af7fd2b14..32b17d2ca 100644
--- a/docs/user-guide/third-party-addons/opentelemetry.md
+++ b/docs/user-guide/third-party-addons/opentelemetry.md
@@ -191,7 +191,7 @@ To install the example and collectors run:
helm repo add grafana https://grafana.github.io/helm-charts
helm repo update
# deploy cert-manager needed for OpenTelemetry collector operator
- kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.9.1/cert-manager.yaml
+ kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.15.3/cert-manager.yaml
# create observability namespace
kubectl apply -f https://raw.githubusercontent.com/esigo/nginx-example/main/observability/namespace.yaml
# install OpenTelemetry collector operator
diff --git a/magefiles/steps/helm.go b/magefiles/steps/helm.go
index 245f5e1c0..73c9b0b3b 100644
--- a/magefiles/steps/helm.go
+++ b/magefiles/steps/helm.go
@@ -170,7 +170,7 @@ func runHelmDocs() error {
if err != nil {
return err
}
- err = sh.RunV("helm-docs", "--chart-search-root=${PWD}/charts")
+ err = sh.RunV("helm-docs", "--chart-search-root", "${PWD}/charts")
if err != nil {
return err
}
@@ -181,7 +181,7 @@ func installHelmDocs() error {
utils.Info("HELM Install HelmDocs")
g0 := sh.RunCmd("go")
- err := g0("install", "github.com/norwoodj/helm-docs/cmd/helm-docs@v1.11.0")
+ err := g0("install", "github.com/norwoodj/helm-docs/cmd/helm-docs@latest")
if err != nil {
return err
}
diff --git a/test/e2e/run-chart-test.sh b/test/e2e/run-chart-test.sh
index 95465ee32..b6748f129 100755
--- a/test/e2e/run-chart-test.sh
+++ b/test/e2e/run-chart-test.sh
@@ -91,25 +91,28 @@ echo "[dev-env] copying docker images to cluster..."
kind load docker-image --name="${KIND_CLUSTER_NAME}" --nodes=${KIND_WORKERS} ${REGISTRY}/controller:${TAG}
if [ "${SKIP_CERT_MANAGER_CREATION:-false}" = "false" ]; then
- curl -fsSL -o cmctl.tar.gz https://github.com/cert-manager/cert-manager/releases/download/v1.11.1/cmctl-linux-amd64.tar.gz
- tar xzf cmctl.tar.gz
- chmod +x cmctl
- ./cmctl help
- echo "[dev-env] apply cert-manager ..."
- kubectl apply --wait -f https://github.com/cert-manager/cert-manager/releases/download/v1.11.0/cert-manager.yaml
- kubectl wait --timeout=30s --for=condition=available deployment/cert-manager -n cert-manager
- kubectl get validatingwebhookconfigurations cert-manager-webhook -ojson | jq '.webhooks[].clientConfig'
- kubectl get endpoints -n cert-manager cert-manager-webhook
- ./cmctl check api --wait=2m
+ echo "[dev-env] deploying cert-manager..."
+
+ # Get OS & platform for downloading cmctl.
+ os="$(uname -o | tr "[:upper:]" "[:lower:]" | sed "s/gnu\///")"
+ platform="$(uname -m | sed "s/aarch64/arm64/;s/x86_64/amd64/")"
+
+ # Download cmctl. Cannot validate checksum as OS & platform may vary.
+ curl --fail --location "https://github.com/cert-manager/cmctl/releases/download/v2.1.1/cmctl_${os}_${platform}.tar.gz" | tar --extract --gzip cmctl
+
+ # Install cert-manager.
+ ./cmctl x install
+ ./cmctl check api --wait 1m
fi
echo "[dev-env] running helm chart e2e tests..."
-docker run --rm --interactive --network host \
- --name ct \
- --volume $KUBECONFIG:/root/.kube/config \
- --volume "${DIR}/../../":/workdir \
- --workdir /workdir \
- registry.k8s.io/ingress-nginx/e2e-test-runner:v20240829-2c421762@sha256:5b7809bfe9cbd9cd6bcb8033ca27576ca704f05ce729fe4dcb574810f7a25785 \
- ct install \
- --charts charts/ingress-nginx \
- --helm-extra-args "--timeout 60s"
+docker run \
+ --name ct \
+ --volume "${KUBECONFIG}:/root/.kube/config:ro" \
+ --volume "${DIR}/../../:/workdir" \
+ --network host \
+ --workdir /workdir \
+ --entrypoint ct \
+ --rm \
+ registry.k8s.io/ingress-nginx/e2e-test-runner:v20240829-2c421762@sha256:5b7809bfe9cbd9cd6bcb8033ca27576ca704f05ce729fe4dcb574810f7a25785 \
+ install --charts charts/ingress-nginx
From 3f6e6aef78259370b95213d094cf5d74df64aba2 Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Sun, 29 Sep 2024 17:31:04 +0200
Subject: [PATCH 251/283] Images: Remove OpenTelemetry. (#12024)
---
.github/workflows/images.yaml | 20 ---
charts/ingress-nginx/README.md | 17 +-
...roller-daemonset-extra-modules-values.yaml | 30 ----
...roller-daemonset-opentelemetry-values.yaml | 13 --
...oller-deployment-extra-modules-values.yaml | 30 ----
...oller-deployment-opentelemetry-values.yaml | 13 --
.../templates/controller-daemonset.yaml | 16 +-
.../templates/controller-deployment.yaml | 16 +-
charts/ingress-nginx/values.yaml | 27 +--
.../third-party-addons/opentelemetry.md | 22 +--
images/opentelemetry/Makefile | 69 --------
images/opentelemetry/TAG | 1 -
images/opentelemetry/cloudbuild.yaml | 14 --
images/opentelemetry/rootfs/CMakeLists.txt | 74 --------
images/opentelemetry/rootfs/Dockerfile | 46 -----
images/opentelemetry/rootfs/build.sh | 165 ------------------
images/opentelemetry/rootfs/go.mod | 3 -
images/opentelemetry/rootfs/init_module.go | 103 -----------
magefiles/utils/helm.go | 7 -
19 files changed, 18 insertions(+), 668 deletions(-)
delete mode 100644 charts/ingress-nginx/ci/controller-daemonset-extra-modules-values.yaml
delete mode 100644 charts/ingress-nginx/ci/controller-daemonset-opentelemetry-values.yaml
delete mode 100644 charts/ingress-nginx/ci/controller-deployment-extra-modules-values.yaml
delete mode 100644 charts/ingress-nginx/ci/controller-deployment-opentelemetry-values.yaml
delete mode 100644 images/opentelemetry/Makefile
delete mode 100644 images/opentelemetry/TAG
delete mode 100644 images/opentelemetry/cloudbuild.yaml
delete mode 100644 images/opentelemetry/rootfs/CMakeLists.txt
delete mode 100644 images/opentelemetry/rootfs/Dockerfile
delete mode 100755 images/opentelemetry/rootfs/build.sh
delete mode 100644 images/opentelemetry/rootfs/go.mod
delete mode 100644 images/opentelemetry/rootfs/init_module.go
diff --git a/.github/workflows/images.yaml b/.github/workflows/images.yaml
index 63a72dd3a..38df87f78 100644
--- a/.github/workflows/images.yaml
+++ b/.github/workflows/images.yaml
@@ -37,7 +37,6 @@ jobs:
ext-auth-example-authsvc: ${{ steps.filter.outputs.ext-auth-example-authsvc }}
nginx: ${{ steps.filter.outputs.nginx }}
nginx125: ${{ steps.filter.outputs.nginx125 }}
- opentelemetry: ${{ steps.filter.outputs.opentelemetry }}
steps:
- name: Checkout
@@ -65,8 +64,6 @@ jobs:
- 'images/ext-auth-example-authsvc/**'
nginx:
- 'images/nginx/**'
- opentelemetry:
- - 'images/opentelemetry/**'
nginx125:
- 'images/nginx-1.25/TAG'
@@ -166,23 +163,6 @@ jobs:
run: |
cd images/ && make NAME=kube-webhook-certgen test test-e2e
- opentelemetry:
- runs-on: ubuntu-latest
- env:
- PLATFORMS: linux/amd64,linux/arm,linux/arm64
- needs: changes
- if: |
- (needs.changes.outputs.opentelemetry == 'true')
- strategy:
- matrix:
- nginx: ['1.25.3', '1.21.6']
- steps:
- - name: Checkout
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- - name: image build
- run: |
- cd images/opentelemetry && make NGINX_VERSION=${{ matrix.nginx }} build
-
nginx125:
permissions:
contents: write
diff --git a/charts/ingress-nginx/README.md b/charts/ingress-nginx/README.md
index 5cf5bb179..f7ea20199 100644
--- a/charts/ingress-nginx/README.md
+++ b/charts/ingress-nginx/README.md
@@ -310,7 +310,7 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
| controller.extraContainers | list | `[]` | Additional containers to be added to the controller pod. See https://github.com/lemonldap-ng-controller/lemonldap-ng-controller as example. |
| controller.extraEnvs | list | `[]` | Additional environment variables to set |
| controller.extraInitContainers | list | `[]` | Containers, which are run before the app containers are started. |
-| controller.extraModules | list | `[]` | Modules, which are mounted into the core nginx image. See values.yaml for a sample to add opentelemetry module |
+| controller.extraModules | list | `[]` | Modules, which are mounted into the core nginx image. |
| controller.extraVolumeMounts | list | `[]` | Additional volumeMounts to the controller main container. |
| controller.extraVolumes | list | `[]` | Additional volumes to the controller pod. |
| controller.healthCheckHost | string | `""` | Address to bind the health check endpoint. It is better to set this option to the internal node address if the Ingress-Nginx Controller is running in the `hostNetwork: true` mode. |
@@ -393,21 +393,6 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
| controller.name | string | `"controller"` | |
| controller.networkPolicy.enabled | bool | `false` | Enable 'networkPolicy' or not |
| controller.nodeSelector | object | `{"kubernetes.io/os":"linux"}` | Node labels for controller pod assignment # Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/ # |
-| controller.opentelemetry.containerSecurityContext.allowPrivilegeEscalation | bool | `false` | |
-| controller.opentelemetry.containerSecurityContext.capabilities.drop[0] | string | `"ALL"` | |
-| controller.opentelemetry.containerSecurityContext.readOnlyRootFilesystem | bool | `true` | |
-| controller.opentelemetry.containerSecurityContext.runAsGroup | int | `65532` | |
-| controller.opentelemetry.containerSecurityContext.runAsNonRoot | bool | `true` | |
-| controller.opentelemetry.containerSecurityContext.runAsUser | int | `65532` | The image's default user, inherited from its base image `cgr.dev/chainguard/static`. |
-| controller.opentelemetry.containerSecurityContext.seccompProfile.type | string | `"RuntimeDefault"` | |
-| controller.opentelemetry.enabled | bool | `false` | |
-| controller.opentelemetry.image.digest | string | `"sha256:f7604ac0547ed64d79b98d92133234e66c2c8aade3c1f4809fed5eec1fb7f922"` | |
-| controller.opentelemetry.image.distroless | bool | `true` | |
-| controller.opentelemetry.image.image | string | `"ingress-nginx/opentelemetry-1.25.3"` | |
-| controller.opentelemetry.image.registry | string | `"registry.k8s.io"` | |
-| controller.opentelemetry.image.tag | string | `"v20240813-b933310d"` | |
-| controller.opentelemetry.name | string | `"opentelemetry"` | |
-| controller.opentelemetry.resources | object | `{}` | |
| controller.podAnnotations | object | `{}` | Annotations to be added to controller pods # |
| controller.podLabels | object | `{}` | Labels to add to the pod container metadata |
| controller.podSecurityContext | object | `{}` | Security context for controller pods |
diff --git a/charts/ingress-nginx/ci/controller-daemonset-extra-modules-values.yaml b/charts/ingress-nginx/ci/controller-daemonset-extra-modules-values.yaml
deleted file mode 100644
index edf12e77e..000000000
--- a/charts/ingress-nginx/ci/controller-daemonset-extra-modules-values.yaml
+++ /dev/null
@@ -1,30 +0,0 @@
-controller:
- image:
- repository: ingress-controller/controller
- tag: 1.0.0-dev
- digest: null
-
- service:
- type: ClusterIP
-
- kind: DaemonSet
-
- extraModules:
- - name: opentelemetry
- image:
- registry: registry.k8s.io
- image: ingress-nginx/opentelemetry-1.25.3
- tag: v20240813-b933310d
- digest: sha256:f7604ac0547ed64d79b98d92133234e66c2c8aade3c1f4809fed5eec1fb7f922
- distroless: true
- containerSecurityContext:
- runAsNonRoot: true
- runAsUser: 65532
- runAsGroup: 65532
- allowPrivilegeEscalation: false
- seccompProfile:
- type: RuntimeDefault
- capabilities:
- drop:
- - ALL
- readOnlyRootFilesystem: true
diff --git a/charts/ingress-nginx/ci/controller-daemonset-opentelemetry-values.yaml b/charts/ingress-nginx/ci/controller-daemonset-opentelemetry-values.yaml
deleted file mode 100644
index 179ab2a85..000000000
--- a/charts/ingress-nginx/ci/controller-daemonset-opentelemetry-values.yaml
+++ /dev/null
@@ -1,13 +0,0 @@
-controller:
- image:
- repository: ingress-controller/controller
- tag: 1.0.0-dev
- digest: null
-
- service:
- type: ClusterIP
-
- kind: DaemonSet
-
- opentelemetry:
- enabled: true
diff --git a/charts/ingress-nginx/ci/controller-deployment-extra-modules-values.yaml b/charts/ingress-nginx/ci/controller-deployment-extra-modules-values.yaml
deleted file mode 100644
index d4083cc37..000000000
--- a/charts/ingress-nginx/ci/controller-deployment-extra-modules-values.yaml
+++ /dev/null
@@ -1,30 +0,0 @@
-controller:
- image:
- repository: ingress-controller/controller
- tag: 1.0.0-dev
- digest: null
-
- service:
- type: ClusterIP
-
- kind: Deployment
-
- extraModules:
- - name: opentelemetry
- image:
- registry: registry.k8s.io
- image: ingress-nginx/opentelemetry-1.25.3
- tag: v20240813-b933310d
- digest: sha256:f7604ac0547ed64d79b98d92133234e66c2c8aade3c1f4809fed5eec1fb7f922
- distroless: true
- containerSecurityContext:
- runAsNonRoot: true
- runAsUser: 65532
- runAsGroup: 65532
- allowPrivilegeEscalation: false
- seccompProfile:
- type: RuntimeDefault
- capabilities:
- drop:
- - ALL
- readOnlyRootFilesystem: true
diff --git a/charts/ingress-nginx/ci/controller-deployment-opentelemetry-values.yaml b/charts/ingress-nginx/ci/controller-deployment-opentelemetry-values.yaml
deleted file mode 100644
index 9443ddefc..000000000
--- a/charts/ingress-nginx/ci/controller-deployment-opentelemetry-values.yaml
+++ /dev/null
@@ -1,13 +0,0 @@
-controller:
- image:
- repository: ingress-controller/controller
- tag: 1.0.0-dev
- digest: null
-
- service:
- type: ClusterIP
-
- kind: Deployment
-
- opentelemetry:
- enabled: true
diff --git a/charts/ingress-nginx/templates/controller-daemonset.yaml b/charts/ingress-nginx/templates/controller-daemonset.yaml
index fcc633d3d..b8f9c331c 100644
--- a/charts/ingress-nginx/templates/controller-daemonset.yaml
+++ b/charts/ingress-nginx/templates/controller-daemonset.yaml
@@ -144,9 +144,9 @@ spec:
hostPort: {{ $key }}
{{- end }}
{{- end }}
- {{- if (or .Values.controller.customTemplate.configMapName .Values.controller.extraVolumeMounts .Values.controller.admissionWebhooks.enabled .Values.controller.extraModules .Values.controller.opentelemetry.enabled) }}
+ {{- if (or .Values.controller.customTemplate.configMapName .Values.controller.extraVolumeMounts .Values.controller.admissionWebhooks.enabled .Values.controller.extraModules) }}
volumeMounts:
- {{- if (or .Values.controller.extraModules .Values.controller.opentelemetry.enabled) }}
+ {{- if .Values.controller.extraModules }}
- name: modules
{{- if .Values.controller.image.chroot }}
mountPath: /chroot/modules_mount
@@ -174,7 +174,7 @@ spec:
{{- if .Values.controller.extraContainers }}
{{- toYaml .Values.controller.extraContainers | nindent 8 }}
{{- end }}
- {{- if (or .Values.controller.extraInitContainers .Values.controller.extraModules .Values.controller.opentelemetry.enabled) }}
+ {{- if (or .Values.controller.extraInitContainers .Values.controller.extraModules) }}
initContainers:
{{- if .Values.controller.extraInitContainers }}
{{- toYaml .Values.controller.extraInitContainers | nindent 8 }}
@@ -185,12 +185,6 @@ spec:
{{- include "extraModules" (dict "name" .name "image" .image "containerSecurityContext" $containerSecurityContext "resources" .resources) | nindent 8 }}
{{- end }}
{{- end }}
- {{- if .Values.controller.opentelemetry.enabled }}
- {{- with .Values.controller.opentelemetry }}
- {{- $containerSecurityContext := .containerSecurityContext | default $.Values.controller.containerSecurityContext }}
- {{- include "extraModules" (dict "name" .name "image" .image "containerSecurityContext" $containerSecurityContext "resources" .resources) | nindent 8 }}
- {{- end }}
- {{- end }}
{{- end }}
{{- if .Values.controller.hostNetwork }}
hostNetwork: {{ .Values.controller.hostNetwork }}
@@ -209,9 +203,9 @@ spec:
{{- end }}
serviceAccountName: {{ template "ingress-nginx.serviceAccountName" . }}
terminationGracePeriodSeconds: {{ .Values.controller.terminationGracePeriodSeconds }}
- {{- if (or .Values.controller.customTemplate.configMapName .Values.controller.extraVolumeMounts .Values.controller.admissionWebhooks.enabled .Values.controller.extraVolumes .Values.controller.extraModules .Values.controller.opentelemetry.enabled) }}
+ {{- if (or .Values.controller.customTemplate.configMapName .Values.controller.extraVolumeMounts .Values.controller.admissionWebhooks.enabled .Values.controller.extraVolumes .Values.controller.extraModules) }}
volumes:
- {{- if (or .Values.controller.extraModules .Values.controller.opentelemetry.enabled)}}
+ {{- if .Values.controller.extraModules }}
- name: modules
emptyDir: {}
{{- end }}
diff --git a/charts/ingress-nginx/templates/controller-deployment.yaml b/charts/ingress-nginx/templates/controller-deployment.yaml
index c046311b0..286ec06b3 100644
--- a/charts/ingress-nginx/templates/controller-deployment.yaml
+++ b/charts/ingress-nginx/templates/controller-deployment.yaml
@@ -150,9 +150,9 @@ spec:
hostPort: {{ $key }}
{{- end }}
{{- end }}
- {{- if (or .Values.controller.customTemplate.configMapName .Values.controller.extraVolumeMounts .Values.controller.admissionWebhooks.enabled .Values.controller.extraModules .Values.controller.opentelemetry.enabled) }}
+ {{- if (or .Values.controller.customTemplate.configMapName .Values.controller.extraVolumeMounts .Values.controller.admissionWebhooks.enabled .Values.controller.extraModules) }}
volumeMounts:
- {{- if (or .Values.controller.extraModules .Values.controller.opentelemetry.enabled) }}
+ {{- if .Values.controller.extraModules }}
- name: modules
{{- if .Values.controller.image.chroot }}
mountPath: /chroot/modules_mount
@@ -180,7 +180,7 @@ spec:
{{- if .Values.controller.extraContainers }}
{{- toYaml .Values.controller.extraContainers | nindent 8 }}
{{- end }}
- {{- if (or .Values.controller.extraInitContainers .Values.controller.extraModules .Values.controller.opentelemetry.enabled) }}
+ {{- if (or .Values.controller.extraInitContainers .Values.controller.extraModules) }}
initContainers:
{{- if .Values.controller.extraInitContainers }}
{{- toYaml .Values.controller.extraInitContainers | nindent 8 }}
@@ -191,12 +191,6 @@ spec:
{{- include "extraModules" (dict "name" .name "image" .image "containerSecurityContext" $containerSecurityContext "resources" .resources) | nindent 8 }}
{{- end }}
{{- end }}
- {{- if .Values.controller.opentelemetry.enabled }}
- {{- with .Values.controller.opentelemetry }}
- {{- $containerSecurityContext := .containerSecurityContext | default $.Values.controller.containerSecurityContext }}
- {{- include "extraModules" (dict "name" .name "image" .image "containerSecurityContext" $containerSecurityContext "resources" .resources) | nindent 8 }}
- {{- end }}
- {{- end }}
{{- end }}
{{- if .Values.controller.hostNetwork }}
hostNetwork: {{ .Values.controller.hostNetwork }}
@@ -215,9 +209,9 @@ spec:
{{- end }}
serviceAccountName: {{ template "ingress-nginx.serviceAccountName" . }}
terminationGracePeriodSeconds: {{ .Values.controller.terminationGracePeriodSeconds }}
- {{- if (or .Values.controller.customTemplate.configMapName .Values.controller.extraVolumeMounts .Values.controller.admissionWebhooks.enabled .Values.controller.extraVolumes .Values.controller.extraModules .Values.controller.opentelemetry.enabled) }}
+ {{- if (or .Values.controller.customTemplate.configMapName .Values.controller.extraVolumeMounts .Values.controller.admissionWebhooks.enabled .Values.controller.extraVolumes .Values.controller.extraModules) }}
volumes:
- {{- if (or .Values.controller.extraModules .Values.controller.opentelemetry.enabled)}}
+ {{- if .Values.controller.extraModules }}
- name: modules
emptyDir: {}
{{- end }}
diff --git a/charts/ingress-nginx/values.yaml b/charts/ingress-nginx/values.yaml
index c2a0a1541..dd3faba59 100644
--- a/charts/ingress-nginx/values.yaml
+++ b/charts/ingress-nginx/values.yaml
@@ -682,7 +682,7 @@ controller:
# image: busybox
# command: ['sh', '-c', 'until nslookup myservice; do echo waiting for myservice; sleep 2; done;']
- # -- Modules, which are mounted into the core nginx image. See values.yaml for a sample to add opentelemetry module
+ # -- Modules, which are mounted into the core nginx image.
extraModules: []
# - name: mytestmodule
# image:
@@ -711,31 +711,6 @@ controller:
# will be executed as initContainers, to move its config files within the
# mounted volume.
- opentelemetry:
- enabled: false
- name: opentelemetry
- image:
- registry: registry.k8s.io
- image: ingress-nginx/opentelemetry-1.25.3
- ## for backwards compatibility consider setting the full image url via the repository value below
- ## use *either* current default registry/image or repository format or installing chart by providing the values.yaml will fail
- ## repository:
- tag: v20240813-b933310d
- digest: sha256:f7604ac0547ed64d79b98d92133234e66c2c8aade3c1f4809fed5eec1fb7f922
- distroless: true
- containerSecurityContext:
- runAsNonRoot: true
- # -- The image's default user, inherited from its base image `cgr.dev/chainguard/static`.
- runAsUser: 65532
- runAsGroup: 65532
- allowPrivilegeEscalation: false
- seccompProfile:
- type: RuntimeDefault
- capabilities:
- drop:
- - ALL
- readOnlyRootFilesystem: true
- resources: {}
admissionWebhooks:
name: admission
annotations: {}
diff --git a/docs/user-guide/third-party-addons/opentelemetry.md b/docs/user-guide/third-party-addons/opentelemetry.md
index 32b17d2ca..255ba1ffa 100644
--- a/docs/user-guide/third-party-addons/opentelemetry.md
+++ b/docs/user-guide/third-party-addons/opentelemetry.md
@@ -147,17 +147,7 @@ graph TB
To install the example and collectors run:
-1. Enable Ingress addon with:
-
- ```yaml
- opentelemetry:
- enabled: true
- image: registry.k8s.io/ingress-nginx/opentelemetry-1.25.3:v20240813-b933310d@sha256:f7604ac0547ed64d79b98d92133234e66c2c8aade3c1f4809fed5eec1fb7f922
- containerSecurityContext:
- allowPrivilegeEscalation: false
- ```
-
-2. Enable OpenTelemetry and set the otlp-collector-host:
+1. Enable OpenTelemetry and set the otlp-collector-host:
```yaml
$ echo '
@@ -183,7 +173,7 @@ To install the example and collectors run:
' | kubectl replace -f -
```
-4. Deploy otel-collector, grafana and Jaeger backend:
+2. Deploy otel-collector, grafana and Jaeger backend:
```bash
# add helm charts needed for grafana and OpenTelemetry collector
@@ -218,7 +208,7 @@ To install the example and collectors run:
make deploy-app
```
-5. Make a few requests to the Service:
+4. Make a few requests to the Service:
```bash
kubectl port-forward --namespace=ingress-nginx service/ingress-nginx-controller 8090:80
@@ -247,7 +237,7 @@ To install the example and collectors run:
RawContentLength : 21
```
-6. View the Grafana UI:
+5. View the Grafana UI:
```bash
kubectl port-forward --namespace=observability service/grafana 3000:80
@@ -255,7 +245,7 @@ To install the example and collectors run:
In the Grafana interface we can see the details:

-7. View the Jaeger UI:
+6. View the Jaeger UI:
```bash
kubectl port-forward --namespace=observability service/jaeger-all-in-one-query 16686:16686
@@ -263,7 +253,7 @@ To install the example and collectors run:
In the Jaeger interface we can see the details:

-8. View the Zipkin UI:
+7. View the Zipkin UI:
```bash
kubectl port-forward --namespace=observability service/zipkin 9411:9411
diff --git a/images/opentelemetry/Makefile b/images/opentelemetry/Makefile
deleted file mode 100644
index eae435bef..000000000
--- a/images/opentelemetry/Makefile
+++ /dev/null
@@ -1,69 +0,0 @@
-# Copyright 2024 The Kubernetes Authors. All rights reserved.
-#
-# Licensed under the Apache License, Version 2.0 (the "License");
-# you may not use this file except in compliance with the License.
-# You may obtain a copy of the License at
-#
-# http://www.apache.org/licenses/LICENSE-2.0
-#
-# Unless required by applicable law or agreed to in writing, software
-# distributed under the License is distributed on an "AS IS" BASIS,
-# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-# See the License for the specific language governing permissions and
-# limitations under the License.
-
-.DEFAULT_GOAL:=build
-
-# set default shell
-SHELL=/bin/bash -o pipefail -o errexit
-
-DIR:=$(strip $(shell dirname $(realpath $(lastword $(MAKEFILE_LIST)))))
-INIT_BUILDX=$(DIR)/../../hack/init-buildx.sh
-
-# 0.0.0 shouldn't clobber any released builds
-SHORT_SHA ?=$(shell git rev-parse --short HEAD)
-TAG ?=v$(shell date +%Y%m%d)-$(SHORT_SHA)
-
-REGISTRY ?= gcr.io/k8s-staging-ingress-nginx
-
-IMAGE = $(REGISTRY)/opentelemetry
-
-# required to enable buildx
-export DOCKER_CLI_EXPERIMENTAL=enabled
-
-# build with buildx
-PLATFORMS?=linux/amd64,linux/arm,linux/arm64
-OUTPUT=
-PROGRESS=plain
-
-precheck:
-ifndef NGINX_VERSION
- $(error NGINX_VERSION variable is required)
-endif
-
-build: precheck ensure-buildx
- docker buildx build \
- --label=org.opencontainers.image.source=https://github.com/kubernetes/ingress-nginx \
- --label=org.opencontainers.image.licenses=Apache-2.0 \
- --label=org.opencontainers.image.description="Ingress NGINX Opentelemetry image" \
- --platform=${PLATFORMS} $(OUTPUT) \
- --progress=$(PROGRESS) \
- --build-arg=NGINX_VERSION=$(NGINX_VERSION) \
- --pull \
- --tag $(IMAGE)-$(NGINX_VERSION):$(TAG) rootfs
-
-# push the cross built image
-push: OUTPUT=--push
-push: build
-
-# enable buildx
-ensure-buildx:
-# this is required for cloudbuild
-ifeq ("$(wildcard $(INIT_BUILDX))","")
- @curl -sSL https://raw.githubusercontent.com/kubernetes/ingress-nginx/main/hack/init-buildx.sh | bash
-else
- @exec $(INIT_BUILDX)
-endif
- @echo "done"
-
-.PHONY: build precheck push ensure-buildx
diff --git a/images/opentelemetry/TAG b/images/opentelemetry/TAG
deleted file mode 100644
index 0ec25f750..000000000
--- a/images/opentelemetry/TAG
+++ /dev/null
@@ -1 +0,0 @@
-v1.0.0
diff --git a/images/opentelemetry/cloudbuild.yaml b/images/opentelemetry/cloudbuild.yaml
deleted file mode 100644
index df86d37e7..000000000
--- a/images/opentelemetry/cloudbuild.yaml
+++ /dev/null
@@ -1,14 +0,0 @@
-options:
- # Increase machine type for multi-arch builds.
- machineType: E2_HIGHCPU_8
- # Ignore Prow provided substitutions.
- substitution_option: ALLOW_LOOSE
-steps:
- - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
- env:
- - REGISTRY=gcr.io/k8s-staging-ingress-nginx
- entrypoint: bash
- args:
- - -c
- - gcloud auth configure-docker && cd images/opentelemetry && make NGINX_VERSION=1.21.6 push && make NGINX_VERSION=1.25.3 push
-timeout: 1800s
diff --git a/images/opentelemetry/rootfs/CMakeLists.txt b/images/opentelemetry/rootfs/CMakeLists.txt
deleted file mode 100644
index 1c68d6fc6..000000000
--- a/images/opentelemetry/rootfs/CMakeLists.txt
+++ /dev/null
@@ -1,74 +0,0 @@
-#!/bin/bash
-
-# Copyright 2021 The Kubernetes Authors.
-#
-# Licensed under the Apache License, Version 2.0 (the "License");
-# you may not use this file except in compliance with the License.
-# You may obtain a copy of the License at
-#
-# http://www.apache.org/licenses/LICENSE-2.0
-#
-# Unless required by applicable law or agreed to in writing, software
-# distributed under the License is distributed on an "AS IS" BASIS,
-# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-# See the License for the specific language governing permissions and
-# limitations under the License.
-
-cmake_minimum_required(VERSION 3.11 FATAL_ERROR)
-
-project(
- dependencies
- LANGUAGES CXX
- VERSION 0.0.1)
-
-set(CMAKE_CXX_STANDARD 17)
-set(CMAKE_CXX_EXTENSIONS OFF)
-set(CMAKE_CXX_STANDARD_REQUIRED ON)
-set(CMAKE_CXX_FLAGS "-O2 -fpic")
-set(CMAKE_VERBOSE_MAKEFILE ON CACHE BOOL "ON" FORCE)
-
-set(CMAKE_BUILD_TYPE
- Release
- CACHE STRING "Build type" FORCE)
-
-include(GNUInstallDirs)
-
-set(CMAKE_ARCHIVE_OUTPUT_DIRECTORY
- ${PROJECT_BINARY_DIR}/${CMAKE_INSTALL_LIBDIR})
-set(CMAKE_LIBRARY_OUTPUT_DIRECTORY
- ${PROJECT_BINARY_DIR}/${CMAKE_INSTALL_LIBDIR})
-set(CMAKE_RUNTIME_OUTPUT_DIRECTORY
- ${PROJECT_BINARY_DIR}/${CMAKE_INSTALL_BINDIR})
-
-set(INSTALL_LIBDIR
- ${CMAKE_INSTALL_LIBDIR}
- CACHE PATH "directory for libraries")
-set(INSTALL_BINDIR
- ${CMAKE_INSTALL_BINDIR}
- CACHE PATH "directory for executables")
-set(INSTALL_INCLUDEDIR
- ${CMAKE_INSTALL_INCLUDEDIR}
- CACHE PATH "directory for header files")
-
-set(DEF_INSTALL_CMAKEDIR share/cmake/${PROJECT_NAME})
-set(INSTALL_CMAKEDIR
- ${DEF_INSTALL_CMAKEDIR}
- CACHE PATH "directory for CMake files")
-
-set_property(DIRECTORY PROPERTY EP_BASE ${CMAKE_BINARY_DIR}/subs)
-
-set(STAGED_INSTALL_PREFIX ${CMAKE_BINARY_DIR}/stage)
-message(STATUS "${PROJECT_NAME} staged install: ${STAGED_INSTALL_PREFIX}")
-
-find_package(OpenSSL REQUIRED)
-message("OpenSSL include dir: ${OPENSSL_INCLUDE_DIR}")
-message("OpenSSL libraries: ${OPENSSL_LIBRARIES}")
-
-find_package(Protobuf REQUIRED)
-find_package(gRPC REQUIRED)
-find_package(OpentelemetryCPP REQUIRED)
-
-install(
- DIRECTORY ${STAGED_INSTALL_PREFIX}/
- DESTINATION .
- USE_SOURCE_PERMISSIONS)
diff --git a/images/opentelemetry/rootfs/Dockerfile b/images/opentelemetry/rootfs/Dockerfile
deleted file mode 100644
index 4b64b96a6..000000000
--- a/images/opentelemetry/rootfs/Dockerfile
+++ /dev/null
@@ -1,46 +0,0 @@
-# Copyright 2021 The Kubernetes Authors. All rights reserved.
-#
-# Licensed under the Apache License, Version 2.0 (the "License");
-# you may not use this file except in compliance with the License.
-# You may obtain a copy of the License at
-#
-# http://www.apache.org/licenses/LICENSE-2.0
-#
-# Unless required by applicable law or agreed to in writing, software
-# distributed under the License is distributed on an "AS IS" BASIS,
-# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-# See the License for the specific language governing permissions and
-# limitations under the License.
-
-
-FROM alpine:3.20 AS base
-
-RUN mkdir -p /opt/third_party/install
-COPY . /opt/third_party/
-
-# install build tools
-RUN apk update \
- && apk upgrade \
- && apk add -U bash \
- && bash /opt/third_party/build.sh -p
-
-ENV NINJA_STATUS="[%p/%f/%t] "
-
-# install otel_ngx_module.so
-FROM base AS nginx
-ARG NGINX_VERSION=1.25.3
-RUN bash /opt/third_party/build.sh -n ${NGINX_VERSION}
-
-FROM golang:1.22.7-bullseye AS build-init
-
-WORKDIR /go/src/app
-COPY . .
-
-RUN go mod download
-RUN CGO_ENABLED=0 go build -o /go/bin/init_module
-
-FROM gcr.io/distroless/static-debian11 AS final
-COPY --from=build-init /go/bin/init_module /
-COPY --from=nginx /etc/nginx/modules /etc/nginx/modules
-
-CMD ["/init_module"]
diff --git a/images/opentelemetry/rootfs/build.sh b/images/opentelemetry/rootfs/build.sh
deleted file mode 100755
index 6f803fc9f..000000000
--- a/images/opentelemetry/rootfs/build.sh
+++ /dev/null
@@ -1,165 +0,0 @@
-#!/bin/bash
-
-# Copyright 2021 The Kubernetes Authors.
-#
-# Licensed under the Apache License, Version 2.0 (the "License");
-# you may not use this file except in compliance with the License.
-# You may obtain a copy of the License at
-#
-# http://www.apache.org/licenses/LICENSE-2.0
-#
-# Unless required by applicable law or agreed to in writing, software
-# distributed under the License is distributed on an "AS IS" BASIS,
-# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-# See the License for the specific language governing permissions and
-# limitations under the License.
-
-set -o errexit
-set -o nounset
-set -o pipefail
-set -x
-# Check for recent changes: https://github.com/open-telemetry/opentelemetry-cpp/compare/v1.2.0...main
-export OPENTELEMETRY_CPP_VERSION=${OPENTELEMETRY_CPP_VERSION:="v1.11.0"}
-export INSTALL_DIR=/opt/third_party/install
-
-export NGINX_VERSION=${NGINX_VERSION:="1.25.3"}
-# improve compilation times
-CORES=$(($(grep -c ^processor /proc/cpuinfo) - 1))
-
-rm -rf \
- /var/cache/debconf/* \
- /var/lib/apt/lists/* \
- /var/log/* \
- /tmp/* \
- /var/tmp/*
-
-export BUILD_PATH=/tmp/build
-mkdir --verbose -p "$BUILD_PATH"
-
-Help()
-{
- # Display Help
- echo "Add description of the script functions here."
- echo
- echo "Syntax: scriptTemplate [-h|o|n|p|]"
- echo "options:"
- echo "h Print Help."
- echo "o OpenTelemetry git tag"
- echo "n install nginx"
- echo "p prepare"
- echo
-}
-
-prepare()
-{
- echo "https://dl-cdn.alpinelinux.org/alpine/edge/main" >> /etc/apk/repositories
- echo "https://dl-cdn.alpinelinux.org/alpine/edge/community" >> /etc/apk/repositories
- echo "https://dl-cdn.alpinelinux.org/alpine/edge/testing" >> /etc/apk/repositories
-
- apk add \
- linux-headers \
- cmake \
- ninja \
- openssl \
- curl-dev \
- openssl-dev \
- gtest-dev \
- c-ares-dev \
- pcre-dev \
- curl \
- git \
- build-base \
- coreutils \
- build-base \
- openssl-dev \
- pkgconfig \
- c-ares-dev \
- re2-dev \
- grpc-dev \
- protobuf-dev \
- opentelemetry-cpp-dev
-
- git config --global http.version HTTP/1.1
- git config --global http.postBuffer 157286400
-}
-
-install_otel()
-{
- cd ${BUILD_PATH}
- export LD_LIBRARY_PATH="${LD_LIBRARY_PATH:+LD_LIBRARY_PATH:}${INSTALL_DIR}/lib:/usr/local"
- export PATH="${PATH}:${INSTALL_DIR}/bin"
- git clone --recurse-submodules -j ${CORES} --depth=1 -b \
- ${OPENTELEMETRY_CPP_VERSION} https://github.com/open-telemetry/opentelemetry-cpp.git opentelemetry-cpp-${OPENTELEMETRY_CPP_VERSION}
- cd "opentelemetry-cpp-${OPENTELEMETRY_CPP_VERSION}"
- mkdir -p .build
- cd .build
-
- cmake -DCMAKE_BUILD_TYPE=Release \
- -G Ninja \
- -DCMAKE_CXX_STANDARD=17 \
- -DCMAKE_POSITION_INDEPENDENT_CODE=TRUE \
- -DWITH_ZIPKIN=OFF \
- -DCMAKE_INSTALL_PREFIX=${INSTALL_DIR} \
- -DBUILD_TESTING=OFF \
- -DWITH_BENCHMARK=OFF \
- -DWITH_FUNC_TESTS=OFF \
- -DBUILD_SHARED_LIBS=OFF \
- -DWITH_OTLP_GRPC=ON \
- -DWITH_OTLP_HTTP=OFF \
- -DWITH_ABSEIL=ON \
- -DWITH_EXAMPLES=OFF \
- -DWITH_NO_DEPRECATED_CODE=ON \
- ..
- cmake --build . -j ${CORES} --target install
-}
-
-install_nginx()
-{
-
- # Check for recent changes: https://github.com/open-telemetry/opentelemetry-cpp-contrib/compare/e11348bb400d5472bf1da5d6128bead66fa111ff...main
- export OPENTELEMETRY_CONTRIB_COMMIT=e11348bb400d5472bf1da5d6128bead66fa111ff
-
- mkdir -p /etc/nginx
- cd "$BUILD_PATH"
-
- # TODO fix curl
- # get_src 0528e793a97f942868616449d49326160f9cb67b2253fb2c4864603ac6ab09a9 \
- # "https://github.com/open-telemetry/opentelemetry-cpp-contrib/archive/$OPENTELEMETRY_CONTRIB_COMMIT.tar.gz"
-
- git clone https://github.com/open-telemetry/opentelemetry-cpp-contrib.git \
- opentelemetry-cpp-contrib-${OPENTELEMETRY_CONTRIB_COMMIT}
- cd ${BUILD_PATH}/opentelemetry-cpp-contrib-${OPENTELEMETRY_CONTRIB_COMMIT}
- git reset --hard ${OPENTELEMETRY_CONTRIB_COMMIT}
- cd ${BUILD_PATH}/opentelemetry-cpp-contrib-${OPENTELEMETRY_CONTRIB_COMMIT}/instrumentation/nginx
- mkdir -p build
- cd build
- cmake -DCMAKE_BUILD_TYPE=Release \
- -G Ninja \
- -DCMAKE_CXX_STANDARD=17 \
- -DCMAKE_INSTALL_PREFIX=${INSTALL_DIR} \
- -DBUILD_SHARED_LIBS=ON \
- -DNGINX_VERSION=${NGINX_VERSION} \
- ..
- cmake --build . -j ${CORES} --target install
-
- mkdir -p /etc/nginx/modules
- cp ${INSTALL_DIR}/otel_ngx_module.so /etc/nginx/modules/otel_ngx_module.so
-}
-
-while getopts ":phn:" option; do
- case $option in
- h) # display Help
- Help
- exit;;
- p) # prepare
- prepare
- exit;;
- n) # install nginx
- NGINX_VERSION=${OPTARG}
- install_nginx
- exit;;
- \?)
- Help
- exit;;
- esac
-done
diff --git a/images/opentelemetry/rootfs/go.mod b/images/opentelemetry/rootfs/go.mod
deleted file mode 100644
index 207d1d914..000000000
--- a/images/opentelemetry/rootfs/go.mod
+++ /dev/null
@@ -1,3 +0,0 @@
-module init-otel
-
-go 1.22.7
diff --git a/images/opentelemetry/rootfs/init_module.go b/images/opentelemetry/rootfs/init_module.go
deleted file mode 100644
index 5d285052d..000000000
--- a/images/opentelemetry/rootfs/init_module.go
+++ /dev/null
@@ -1,103 +0,0 @@
-/*
-Copyright 2023 The Kubernetes Authors.
-
-Licensed under the Apache License, Version 2.0 (the "License");
-you may not use this file except in compliance with the License.
-You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
-Unless required by applicable law or agreed to in writing, software
-distributed under the License is distributed on an "AS IS" BASIS,
-WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-See the License for the specific language governing permissions and
-limitations under the License.
-*/
-
-package main
-
-import (
- "fmt"
- "io"
- "os"
- "path/filepath"
-)
-
-func main() {
- // Enable error handling for all operations
- err := run()
- if err != nil {
- fmt.Fprintf(os.Stderr, "Error: %v\n", err)
- os.Exit(1)
- }
-}
-
-func run() error {
- // Create the target directory if it doesn't exist
- targetDir := "/modules_mount/etc/nginx/modules/otel"
- err := os.MkdirAll(targetDir, os.ModePerm)
- if err != nil {
- return fmt.Errorf("failed to create target directory: %w", err)
- }
-
- // Copy files from source directory to target directory
- sourceDir := "/etc/nginx/modules/"
- err = filepath.Walk(sourceDir, func(path string, info os.FileInfo, err error) error {
- if err != nil {
- return err
- }
-
- // Skip directories
- if info.IsDir() {
- return nil
- }
-
- // Calculate the destination path
- relPath, err := filepath.Rel(sourceDir, path)
- if err != nil {
- return err
- }
- destPath := filepath.Join(targetDir, relPath)
-
- // Create the destination directory if it doesn't exist
- destDir := filepath.Dir(destPath)
- err = os.MkdirAll(destDir, os.ModePerm)
- if err != nil {
- return err
- }
-
- // Copy the file
- err = copyFile(path, destPath)
- if err != nil {
- return err
- }
-
- return nil
- })
- if err != nil {
- return fmt.Errorf("failed to copy files: %w", err)
- }
-
- return nil
-}
-
-func copyFile(sourcePath, destPath string) error {
- sourceFile, err := os.Open(sourcePath)
- if err != nil {
- return err
- }
- defer sourceFile.Close()
-
- destFile, err := os.Create(destPath)
- if err != nil {
- return err
- }
- defer destFile.Close()
-
- _, err = io.Copy(destFile, sourceFile)
- if err != nil {
- return err
- }
-
- return nil
-}
diff --git a/magefiles/utils/helm.go b/magefiles/utils/helm.go
index 677e322f5..cb8acae57 100644
--- a/magefiles/utils/helm.go
+++ b/magefiles/utils/helm.go
@@ -207,13 +207,6 @@ type IngressChartValue struct {
ExtraVolumes []interface{} `yaml:"extraVolumes"`
ExtraInitContainers []interface{} `yaml:"extraInitContainers"`
ExtraModules []interface{} `yaml:"extraModules"`
- Opentelemetry struct {
- Enabled bool `yaml:"enabled"`
- Image string `yaml:"image"`
- ContainerSecurityContext struct {
- AllowPrivilegeEscalation bool `yaml:"allowPrivilegeEscalation"`
- } `yaml:"containerSecurityContext"`
- } `yaml:"opentelemetry"`
AdmissionWebhooks struct {
Annotations struct{} `yaml:"annotations"`
Enabled bool `yaml:"enabled"`
From 45fc8860cfc1012c1025dbb2c474c34f3aa9b0f9 Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Mon, 30 Sep 2024 10:26:04 +0200
Subject: [PATCH 252/283] Chart: Add `global.image.registry`. (#12028)
---
charts/ingress-nginx/README.md | 4 +---
.../job-patch/job-createSecret.yaml | 2 +-
.../job-patch/job-patchWebhook.yaml | 2 +-
.../templates/controller-daemonset.yaml | 4 ++--
.../templates/controller-deployment.yaml | 4 ++--
.../templates/default-backend-deployment.yaml | 2 +-
.../tests/controller-daemonset_test.yaml | 11 +++++++++++
.../tests/controller-deployment_test.yaml | 10 ++++++++++
.../tests/default-backend-deployment_test.yaml | 11 +++++++++++
charts/ingress-nginx/values.yaml | 13 +++++++++----
10 files changed, 49 insertions(+), 14 deletions(-)
diff --git a/charts/ingress-nginx/README.md b/charts/ingress-nginx/README.md
index f7ea20199..cd181f76e 100644
--- a/charts/ingress-nginx/README.md
+++ b/charts/ingress-nginx/README.md
@@ -255,7 +255,6 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
| controller.admissionWebhooks.patch.image.digest | string | `"sha256:a320a50cc91bd15fd2d6fa6de58bd98c1bd64b9a6f926ce23a600d87043455a3"` | |
| controller.admissionWebhooks.patch.image.image | string | `"ingress-nginx/kube-webhook-certgen"` | |
| controller.admissionWebhooks.patch.image.pullPolicy | string | `"IfNotPresent"` | |
-| controller.admissionWebhooks.patch.image.registry | string | `"registry.k8s.io"` | |
| controller.admissionWebhooks.patch.image.tag | string | `"v1.4.3"` | |
| controller.admissionWebhooks.patch.labels | object | `{}` | Labels to be added to patch job resources |
| controller.admissionWebhooks.patch.networkPolicy.enabled | bool | `false` | Enable 'networkPolicy' or not |
@@ -328,7 +327,6 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
| controller.image.image | string | `"ingress-nginx/controller"` | |
| controller.image.pullPolicy | string | `"IfNotPresent"` | |
| controller.image.readOnlyRootFilesystem | bool | `false` | |
-| controller.image.registry | string | `"registry.k8s.io"` | |
| controller.image.runAsGroup | int | `82` | This value must not be changed using the official image. uid=101(www-data) gid=82(www-data) groups=82(www-data) |
| controller.image.runAsNonRoot | bool | `true` | |
| controller.image.runAsUser | int | `101` | This value must not be changed using the official image. uid=101(www-data) gid=82(www-data) groups=82(www-data) |
@@ -491,7 +489,6 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
| defaultBackend.image.image | string | `"defaultbackend-amd64"` | |
| defaultBackend.image.pullPolicy | string | `"IfNotPresent"` | |
| defaultBackend.image.readOnlyRootFilesystem | bool | `true` | |
-| defaultBackend.image.registry | string | `"registry.k8s.io"` | |
| defaultBackend.image.runAsGroup | int | `65534` | |
| defaultBackend.image.runAsNonRoot | bool | `true` | |
| defaultBackend.image.runAsUser | int | `65534` | |
@@ -533,6 +530,7 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
| defaultBackend.unhealthyPodEvictionPolicy | string | `""` | Eviction policy for unhealthy pods guarded by PodDisruptionBudget. Ref: https://kubernetes.io/blog/2023/01/06/unhealthy-pod-eviction-policy-for-pdbs/ |
| defaultBackend.updateStrategy | object | `{}` | The update strategy to apply to the Deployment or DaemonSet # |
| dhParam | string | `""` | A base64-encoded Diffie-Hellman parameter. This can be generated with: `openssl dhparam 4096 2> /dev/null | base64` # Ref: https://github.com/kubernetes/ingress-nginx/tree/main/docs/examples/customization/ssl-dh-param |
+| global.image.registry | string | `"registry.k8s.io"` | Registry host to pull images from. |
| imagePullSecrets | list | `[]` | Optional array of imagePullSecrets containing private registry credentials # Ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ |
| namespaceOverride | string | `""` | Override the deployment namespace; defaults to .Release.Namespace |
| portNamePrefix | string | `""` | Prefix for TCP and UDP ports names in ingress controller service # Some cloud providers, like Yandex Cloud may have a requirements for a port name regex to support cloud load balancer integration |
diff --git a/charts/ingress-nginx/templates/admission-webhooks/job-patch/job-createSecret.yaml b/charts/ingress-nginx/templates/admission-webhooks/job-patch/job-createSecret.yaml
index 176616467..af3ea12a3 100644
--- a/charts/ingress-nginx/templates/admission-webhooks/job-patch/job-createSecret.yaml
+++ b/charts/ingress-nginx/templates/admission-webhooks/job-patch/job-createSecret.yaml
@@ -42,7 +42,7 @@ spec:
{{- end }}
containers:
- name: create
- {{- with .Values.controller.admissionWebhooks.patch.image }}
+ {{- with (merge .Values.controller.admissionWebhooks.patch.image .Values.global.image) }}
image: {{ if .repository }}{{ .repository }}{{ else }}{{ .registry }}/{{ .image }}{{ end }}:{{ .tag }}{{ if .digest }}@{{ .digest }}{{ end }}
{{- end }}
imagePullPolicy: {{ .Values.controller.admissionWebhooks.patch.image.pullPolicy }}
diff --git a/charts/ingress-nginx/templates/admission-webhooks/job-patch/job-patchWebhook.yaml b/charts/ingress-nginx/templates/admission-webhooks/job-patch/job-patchWebhook.yaml
index f7d44a24d..87dd2c251 100644
--- a/charts/ingress-nginx/templates/admission-webhooks/job-patch/job-patchWebhook.yaml
+++ b/charts/ingress-nginx/templates/admission-webhooks/job-patch/job-patchWebhook.yaml
@@ -42,7 +42,7 @@ spec:
{{- end }}
containers:
- name: patch
- {{- with .Values.controller.admissionWebhooks.patch.image }}
+ {{- with (merge .Values.controller.admissionWebhooks.patch.image .Values.global.image) }}
image: {{ if .repository }}{{ .repository }}{{ else }}{{ .registry }}/{{ .image }}{{ end }}:{{ .tag }}{{ if .digest }}@{{ .digest }}{{ end }}
{{- end }}
imagePullPolicy: {{ .Values.controller.admissionWebhooks.patch.image.pullPolicy }}
diff --git a/charts/ingress-nginx/templates/controller-daemonset.yaml b/charts/ingress-nginx/templates/controller-daemonset.yaml
index b8f9c331c..fd1b13284 100644
--- a/charts/ingress-nginx/templates/controller-daemonset.yaml
+++ b/charts/ingress-nginx/templates/controller-daemonset.yaml
@@ -75,7 +75,7 @@ spec:
{{- end }}
containers:
- name: {{ .Values.controller.containerName }}
- {{- with .Values.controller.image }}
+ {{- with (merge .Values.controller.image .Values.global.image) }}
image: {{ if .repository }}{{ .repository }}{{ else }}{{ .registry }}/{{ include "ingress-nginx.image" . }}{{ end }}:{{ .tag }}{{ include "ingress-nginx.imageDigest" . }}
{{- end }}
imagePullPolicy: {{ .Values.controller.image.pullPolicy }}
@@ -182,7 +182,7 @@ spec:
{{- if .Values.controller.extraModules }}
{{- range .Values.controller.extraModules }}
{{- $containerSecurityContext := .containerSecurityContext | default $.Values.controller.containerSecurityContext }}
- {{- include "extraModules" (dict "name" .name "image" .image "containerSecurityContext" $containerSecurityContext "resources" .resources) | nindent 8 }}
+ {{- include "extraModules" (dict "name" .name "image" (merge .image $.Values.global.image) "containerSecurityContext" $containerSecurityContext "resources" .resources) | nindent 8 }}
{{- end }}
{{- end }}
{{- end }}
diff --git a/charts/ingress-nginx/templates/controller-deployment.yaml b/charts/ingress-nginx/templates/controller-deployment.yaml
index 286ec06b3..cc41bfbc7 100644
--- a/charts/ingress-nginx/templates/controller-deployment.yaml
+++ b/charts/ingress-nginx/templates/controller-deployment.yaml
@@ -81,7 +81,7 @@ spec:
{{- end }}
containers:
- name: {{ .Values.controller.containerName }}
- {{- with .Values.controller.image }}
+ {{- with (merge .Values.controller.image .Values.global.image) }}
image: {{ if .repository }}{{ .repository }}{{ else }}{{ .registry }}/{{ include "ingress-nginx.image" . }}{{ end }}:{{ .tag }}{{ include "ingress-nginx.imageDigest" . }}
{{- end }}
imagePullPolicy: {{ .Values.controller.image.pullPolicy }}
@@ -188,7 +188,7 @@ spec:
{{- if .Values.controller.extraModules }}
{{- range .Values.controller.extraModules }}
{{- $containerSecurityContext := .containerSecurityContext | default $.Values.controller.containerSecurityContext }}
- {{- include "extraModules" (dict "name" .name "image" .image "containerSecurityContext" $containerSecurityContext "resources" .resources) | nindent 8 }}
+ {{- include "extraModules" (dict "name" .name "image" (merge .image $.Values.global.image) "containerSecurityContext" $containerSecurityContext "resources" .resources) | nindent 8 }}
{{- end }}
{{- end }}
{{- end }}
diff --git a/charts/ingress-nginx/templates/default-backend-deployment.yaml b/charts/ingress-nginx/templates/default-backend-deployment.yaml
index 6755e2378..f7d9de121 100644
--- a/charts/ingress-nginx/templates/default-backend-deployment.yaml
+++ b/charts/ingress-nginx/templates/default-backend-deployment.yaml
@@ -50,7 +50,7 @@ spec:
{{- end }}
containers:
- name: {{ template "ingress-nginx.name" . }}-default-backend
- {{- with .Values.defaultBackend.image }}
+ {{- with (merge .Values.defaultBackend.image .Values.global.image) }}
image: {{ if .repository }}{{ .repository }}{{ else }}{{ .registry }}/{{ .image }}{{ end }}:{{ .tag }}{{ if .digest }}@{{ .digest }}{{ end }}
{{- end }}
imagePullPolicy: {{ .Values.defaultBackend.image.pullPolicy }}
diff --git a/charts/ingress-nginx/tests/controller-daemonset_test.yaml b/charts/ingress-nginx/tests/controller-daemonset_test.yaml
index 0e7b79e95..c28c6ee0d 100644
--- a/charts/ingress-nginx/tests/controller-daemonset_test.yaml
+++ b/charts/ingress-nginx/tests/controller-daemonset_test.yaml
@@ -148,6 +148,17 @@ tests:
path: spec.template.spec.containers[0].securityContext.runAsGroup
value: 1000
+ - it: should create a DaemonSet with a custom registry if `global.image.registry` is set
+ set:
+ global.image.registry: custom.registry.io
+ controller.kind: DaemonSet
+ controller.image.tag: v1.0.0-dev
+ controller.image.digest: sha256:faa2d18687f734994b6bd9e309e7a73852a81c30e1b8f63165fcd4f0a087e3cd
+ asserts:
+ - equal:
+ path: spec.template.spec.containers[0].image
+ value: custom.registry.io/ingress-nginx/controller:v1.0.0-dev@sha256:faa2d18687f734994b6bd9e309e7a73852a81c30e1b8f63165fcd4f0a087e3cd
+
- it: should create a DaemonSet with a custom registry if `controller.image.registry` is set
set:
controller.kind: DaemonSet
diff --git a/charts/ingress-nginx/tests/controller-deployment_test.yaml b/charts/ingress-nginx/tests/controller-deployment_test.yaml
index 1954b7ec9..2c57636fb 100644
--- a/charts/ingress-nginx/tests/controller-deployment_test.yaml
+++ b/charts/ingress-nginx/tests/controller-deployment_test.yaml
@@ -169,6 +169,16 @@ tests:
path: spec.template.spec.containers[0].securityContext.runAsGroup
value: 1000
+ - it: should create a Deployment with a custom registry if `global.image.registry` is set
+ set:
+ global.image.registry: custom.registry.io
+ controller.image.tag: v1.0.0-dev
+ controller.image.digest: sha256:faa2d18687f734994b6bd9e309e7a73852a81c30e1b8f63165fcd4f0a087e3cd
+ asserts:
+ - equal:
+ path: spec.template.spec.containers[0].image
+ value: custom.registry.io/ingress-nginx/controller:v1.0.0-dev@sha256:faa2d18687f734994b6bd9e309e7a73852a81c30e1b8f63165fcd4f0a087e3cd
+
- it: should create a Deployment with a custom registry if `controller.image.registry` is set
set:
controller.image.registry: custom.registry.io
diff --git a/charts/ingress-nginx/tests/default-backend-deployment_test.yaml b/charts/ingress-nginx/tests/default-backend-deployment_test.yaml
index e90e6f944..c3fa33968 100644
--- a/charts/ingress-nginx/tests/default-backend-deployment_test.yaml
+++ b/charts/ingress-nginx/tests/default-backend-deployment_test.yaml
@@ -145,6 +145,17 @@ tests:
path: spec.template.spec.containers[0].securityContext.runAsGroup
value: 1000
+ - it: should create a Deployment with a custom registry if `global.image.registry` is set
+ set:
+ global.image.registry: custom.registry.io
+ defaultBackend.enabled: true
+ defaultBackend.image.tag: v1.0.0-dev
+ defaultBackend.image.digest: sha256:faa2d18687f734994b6bd9e309e7a73852a81c30e1b8f63165fcd4f0a087e3cd
+ asserts:
+ - equal:
+ path: spec.template.spec.containers[0].image
+ value: custom.registry.io/defaultbackend-amd64:v1.0.0-dev@sha256:faa2d18687f734994b6bd9e309e7a73852a81c30e1b8f63165fcd4f0a087e3cd
+
- it: should create a Deployment with a custom registry if `defaultBackend.image.registry` is set
set:
defaultBackend.enabled: true
diff --git a/charts/ingress-nginx/values.yaml b/charts/ingress-nginx/values.yaml
index dd3faba59..50a41f2f0 100644
--- a/charts/ingress-nginx/values.yaml
+++ b/charts/ingress-nginx/values.yaml
@@ -2,6 +2,11 @@
## Ref: https://github.com/kubernetes/ingress-nginx/blob/main/docs/user-guide/nginx-configuration/index.md
##
+global:
+ image:
+ # -- Registry host to pull images from.
+ registry: registry.k8s.io
+
## Overrides for generated resource names
# See templates/_helpers.tpl
# nameOverride:
@@ -21,7 +26,7 @@ controller:
image:
## Keep false as default for now!
chroot: false
- registry: registry.k8s.io
+ # registry: registry.k8s.io
image: ingress-nginx/controller
## for backwards compatibility consider setting the full image url via the repository value below
## use *either* current default registry/image or repository format or installing chart by providing the values.yaml will fail
@@ -686,7 +691,7 @@ controller:
extraModules: []
# - name: mytestmodule
# image:
- # registry: registry.k8s.io
+ # # registry: registry.k8s.io
# image: ingress-nginx/mytestmodule
# ## for backwards compatibility consider setting the full image url via the repository value below
# ## use *either* current default registry/image or repository format or installing chart by providing the values.yaml will fail
@@ -785,7 +790,7 @@ controller:
patch:
enabled: true
image:
- registry: registry.k8s.io
+ # registry: registry.k8s.io
image: ingress-nginx/kube-webhook-certgen
## for backwards compatibility consider setting the full image url via the repository value below
## use *either* current default registry/image or repository format or installing chart by providing the values.yaml will fail
@@ -942,7 +947,7 @@ defaultBackend:
enabled: false
name: defaultbackend
image:
- registry: registry.k8s.io
+ # registry: registry.k8s.io
image: defaultbackend-amd64
## for backwards compatibility consider setting the full image url via the repository value below
## use *either* current default registry/image or repository format or installing chart by providing the values.yaml will fail
From b4d884e0d72d4b5717744341980a644d0bd87175 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 30 Sep 2024 09:38:03 +0100
Subject: [PATCH 253/283] Bump the all group with 2 updates (#12032)
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
.github/workflows/chart.yaml | 2 +-
.github/workflows/ci.yaml | 14 +++++++-------
.github/workflows/depreview.yaml | 2 +-
.github/workflows/docs.yaml | 4 ++--
.github/workflows/golangci-lint.yml | 2 +-
.github/workflows/images.yaml | 6 +++---
.github/workflows/perftest.yaml | 2 +-
.github/workflows/plugin.yaml | 2 +-
.github/workflows/scorecards.yml | 4 ++--
.github/workflows/vulnerability-scans.yaml | 6 +++---
.github/workflows/zz-tmpl-images.yaml | 6 +++---
.github/workflows/zz-tmpl-k8s-e2e.yaml | 2 +-
12 files changed, 26 insertions(+), 26 deletions(-)
diff --git a/.github/workflows/chart.yaml b/.github/workflows/chart.yaml
index b99374a90..a546801a0 100644
--- a/.github/workflows/chart.yaml
+++ b/.github/workflows/chart.yaml
@@ -45,7 +45,7 @@ jobs:
git config --global user.email "${GITHUB_ACTOR}@users.noreply.github.com"
- name: Checkout code
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
+ uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
with:
fetch-depth: 0
diff --git a/.github/workflows/ci.yaml b/.github/workflows/ci.yaml
index 3b937594a..56a28f3d0 100644
--- a/.github/workflows/ci.yaml
+++ b/.github/workflows/ci.yaml
@@ -47,7 +47,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
+ uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
- uses: dorny/paths-filter@de90cc6fb38fc0963ad72b210f1f284cd68cea36 # v3.0.2
id: filter
@@ -81,7 +81,7 @@ jobs:
(needs.changes.outputs.lua == 'true') || ${{ github.event.workflow_dispatch.run_e2e == 'true' }}
steps:
- name: Checkout
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
+ uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
- name: Lint Lua
uses: lunarmodules/luacheck@v1
@@ -95,7 +95,7 @@ jobs:
(needs.changes.outputs.go == 'true') || ${{ github.event.workflow_dispatch.run_e2e == 'true' }}
steps:
- name: Checkout
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
+ uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
- name: Get go version
run: echo "GOLANG_VERSION=$(cat GOLANG_VERSION)" >> $GITHUB_ENV
@@ -119,7 +119,7 @@ jobs:
(needs.changes.outputs.go == 'true') || (needs.changes.outputs.docs == 'true') || ${{ github.event.workflow_dispatch.run_e2e == 'true' }}
steps:
- name: Checkout
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
+ uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
- name: Get go version
run: echo "GOLANG_VERSION=$(cat GOLANG_VERSION)" >> $GITHUB_ENV
- name: Set up Go
@@ -144,7 +144,7 @@ jobs:
PLATFORMS: linux/amd64
steps:
- name: Checkout
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
+ uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
- name: Get go version
id: golangversion
@@ -241,7 +241,7 @@ jobs:
run: helm plugin install https://github.com/helm-unittest/helm-unittest
- name: Checkout code
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
+ uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
with:
fetch-depth: 0
@@ -274,7 +274,7 @@ jobs:
steps:
- name: Checkout code
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
+ uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
- name: Download cache
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
diff --git a/.github/workflows/depreview.yaml b/.github/workflows/depreview.yaml
index 913b995bd..857411f79 100644
--- a/.github/workflows/depreview.yaml
+++ b/.github/workflows/depreview.yaml
@@ -9,6 +9,6 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: 'Checkout Repository'
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
+ uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
- name: 'Dependency Review'
uses: actions/dependency-review-action@5a2ce3f5b92ee19cbb1541a4984c76d921601d7c # v4.3.4
diff --git a/.github/workflows/docs.yaml b/.github/workflows/docs.yaml
index c1434c7b7..479c139aa 100644
--- a/.github/workflows/docs.yaml
+++ b/.github/workflows/docs.yaml
@@ -23,7 +23,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
+ uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
- uses: dorny/paths-filter@de90cc6fb38fc0963ad72b210f1f284cd68cea36 # v3.0.2
id: filter
@@ -47,7 +47,7 @@ jobs:
steps:
- name: Checkout master
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
+ uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
- name: Deploy
uses: ./.github/actions/mkdocs
diff --git a/.github/workflows/golangci-lint.yml b/.github/workflows/golangci-lint.yml
index dca8f07db..93db7fbb7 100644
--- a/.github/workflows/golangci-lint.yml
+++ b/.github/workflows/golangci-lint.yml
@@ -15,7 +15,7 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Checkout
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
+ uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
- name: Get go version
run: echo "GOLANG_VERSION=$(cat GOLANG_VERSION)" >> $GITHUB_ENV
diff --git a/.github/workflows/images.yaml b/.github/workflows/images.yaml
index 38df87f78..5dd089e59 100644
--- a/.github/workflows/images.yaml
+++ b/.github/workflows/images.yaml
@@ -40,7 +40,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
+ uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
- uses: dorny/paths-filter@de90cc6fb38fc0963ad72b210f1f284cd68cea36 # v3.0.2
id: filter
with:
@@ -141,7 +141,7 @@ jobs:
k8s: [v1.28.13, v1.29.8, v1.30.4, v1.31.0]
steps:
- name: Checkout
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
+ uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
- name: Get go version
run: echo "GOLANG_VERSION=$(cat GOLANG_VERSION)" >> $GITHUB_ENV
@@ -175,7 +175,7 @@ jobs:
PLATFORMS: linux/amd64,linux/arm,linux/arm64,linux/s390x
steps:
- name: Checkout
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
+ uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
- name: Set up QEMU
uses: docker/setup-qemu-action@49b3bc8e6bdd4a60e6116a5414239cba5943d3cf # v3.2.0
- name: Set up Docker Buildx
diff --git a/.github/workflows/perftest.yaml b/.github/workflows/perftest.yaml
index 2e1e01a3e..eb086538e 100644
--- a/.github/workflows/perftest.yaml
+++ b/.github/workflows/perftest.yaml
@@ -19,7 +19,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
+ uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
- name: Install K6
run: |
diff --git a/.github/workflows/plugin.yaml b/.github/workflows/plugin.yaml
index 63b8c19bf..0ae13a2df 100644
--- a/.github/workflows/plugin.yaml
+++ b/.github/workflows/plugin.yaml
@@ -12,7 +12,7 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Checkout
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
+ uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
with:
fetch-depth: 0
diff --git a/.github/workflows/scorecards.yml b/.github/workflows/scorecards.yml
index ad0317845..764126450 100644
--- a/.github/workflows/scorecards.yml
+++ b/.github/workflows/scorecards.yml
@@ -27,7 +27,7 @@ jobs:
steps:
- name: "Checkout code"
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
+ uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
with:
persist-credentials: false
@@ -59,6 +59,6 @@ jobs:
# Upload the results to GitHub's code scanning dashboard.
- name: "Upload to code-scanning"
- uses: github/codeql-action/upload-sarif@294a9d92911152fe08befb9ec03e240add280cb3 # v3.26.8
+ uses: github/codeql-action/upload-sarif@461ef6c76dfe95d5c364de2f431ddbd31a417628 # v3.26.9
with:
sarif_file: results.sarif
diff --git a/.github/workflows/vulnerability-scans.yaml b/.github/workflows/vulnerability-scans.yaml
index e35ee0a65..9b038de98 100644
--- a/.github/workflows/vulnerability-scans.yaml
+++ b/.github/workflows/vulnerability-scans.yaml
@@ -22,7 +22,7 @@ jobs:
versions: ${{ steps.version.outputs.TAGS }}
steps:
- name: Checkout code
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
+ uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
with:
fetch-depth: 0
@@ -52,7 +52,7 @@ jobs:
versions: ${{ fromJSON(needs.version.outputs.versions) }}
steps:
- name: Checkout code
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
+ uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
- shell: bash
id: test
@@ -75,7 +75,7 @@ jobs:
# This step checks out a copy of your repository.
- name: Upload SARIF file
- uses: github/codeql-action/upload-sarif@294a9d92911152fe08befb9ec03e240add280cb3 # v3.26.8
+ uses: github/codeql-action/upload-sarif@461ef6c76dfe95d5c364de2f431ddbd31a417628 # v3.26.9
with:
token: ${{ github.token }}
# Path to SARIF file relative to the root of the repository
diff --git a/.github/workflows/zz-tmpl-images.yaml b/.github/workflows/zz-tmpl-images.yaml
index 6d5a4ef17..2efc039d6 100644
--- a/.github/workflows/zz-tmpl-images.yaml
+++ b/.github/workflows/zz-tmpl-images.yaml
@@ -31,7 +31,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
+ uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
- uses: dorny/paths-filter@de90cc6fb38fc0963ad72b210f1f284cd68cea36 # v3.0.2
id: filter
with:
@@ -48,7 +48,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
+ uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
- name: Build
run: |
@@ -67,7 +67,7 @@ jobs:
PLATFORMS: ${{ inputs.platforms-publish }}
steps:
- name: Checkout
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
+ uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
- name: Login to GitHub Container Registry
uses: docker/login-action@9780b0c442fbb1117ed29e0efdff1e18412f7567 # v3.3.0
diff --git a/.github/workflows/zz-tmpl-k8s-e2e.yaml b/.github/workflows/zz-tmpl-k8s-e2e.yaml
index 20106cc95..f1b6bb242 100644
--- a/.github/workflows/zz-tmpl-k8s-e2e.yaml
+++ b/.github/workflows/zz-tmpl-k8s-e2e.yaml
@@ -20,7 +20,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
+ uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
- name: cache
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
From cb1dcb3e550d95563798ba06beb4281962d27933 Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Mon, 30 Sep 2024 14:22:02 +0200
Subject: [PATCH 254/283] GitHub: Improve Dependabot. (#12033)
---
.github/dependabot.yml | 54 ++++++++++++++++++++++--------------------
1 file changed, 28 insertions(+), 26 deletions(-)
diff --git a/.github/dependabot.yml b/.github/dependabot.yml
index 69d1ba161..deb434675 100644
--- a/.github/dependabot.yml
+++ b/.github/dependabot.yml
@@ -1,33 +1,7 @@
----
version: 2
updates:
- - package-ecosystem: "gomod"
- directory: "/"
- schedule:
- interval: "weekly"
- labels:
- - "area/dependency"
- - "release-note-none"
- - "ok-to-test"
- groups:
- all:
- update-types:
- - "patch"
- package-ecosystem: "github-actions"
directory: "/"
- schedule:
- interval: "weekly"
- labels:
- - "area/dependency"
- - "release-note-none"
- - "ok-to-test"
- groups:
- all:
- update-types:
- - "minor"
- - "patch"
- - package-ecosystem: "docker"
- directory: "/images"
schedule:
interval: "weekly"
labels:
@@ -39,3 +13,31 @@ updates:
update-types:
- "minor"
- "patch"
+ - package-ecosystem: "docker"
+ directories:
+ - "**/rootfs"
+ schedule:
+ interval: "weekly"
+ labels:
+ - "area/dependency"
+ - "release-note-none"
+ - "ok-to-test"
+ groups:
+ docker:
+ update-types:
+ - "minor"
+ - "patch"
+ - package-ecosystem: "gomod"
+ directories:
+ - "/"
+ - "**/rootfs"
+ schedule:
+ interval: "weekly"
+ labels:
+ - "area/dependency"
+ - "release-note-none"
+ - "ok-to-test"
+ groups:
+ go:
+ update-types:
+ - "patch"
From f061a9acbf200e26de0c3d78dbdf7c24ae8f193b Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 30 Sep 2024 13:28:03 +0100
Subject: [PATCH 255/283] Bump github.com/prometheus/client_golang from 1.11.1
to 1.20.4 in /images/custom-error-pages/rootfs (#12040)
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
images/custom-error-pages/rootfs/go.mod | 18 +--
images/custom-error-pages/rootfs/go.sum | 161 ++++--------------------
2 files changed, 31 insertions(+), 148 deletions(-)
diff --git a/images/custom-error-pages/rootfs/go.mod b/images/custom-error-pages/rootfs/go.mod
index 34363c50a..bd24d4e1c 100644
--- a/images/custom-error-pages/rootfs/go.mod
+++ b/images/custom-error-pages/rootfs/go.mod
@@ -2,16 +2,16 @@ module k8s.io/ingress-nginx/custom-error-pages
go 1.22.7
-require github.com/prometheus/client_golang v1.11.1
+require github.com/prometheus/client_golang v1.20.4
require (
github.com/beorn7/perks v1.0.1 // indirect
- github.com/cespare/xxhash/v2 v2.1.1 // indirect
- github.com/golang/protobuf v1.5.0 // indirect
- github.com/matttproud/golang_protobuf_extensions v1.0.1 // indirect
- github.com/prometheus/client_model v0.2.0 // indirect
- github.com/prometheus/common v0.26.0 // indirect
- github.com/prometheus/procfs v0.6.0 // indirect
- golang.org/x/sys v0.1.0 // indirect
- google.golang.org/protobuf v1.33.0 // indirect
+ github.com/cespare/xxhash/v2 v2.3.0 // indirect
+ github.com/klauspost/compress v1.17.9 // indirect
+ github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 // indirect
+ github.com/prometheus/client_model v0.6.1 // indirect
+ github.com/prometheus/common v0.55.0 // indirect
+ github.com/prometheus/procfs v0.15.1 // indirect
+ golang.org/x/sys v0.22.0 // indirect
+ google.golang.org/protobuf v1.34.2 // indirect
)
diff --git a/images/custom-error-pages/rootfs/go.sum b/images/custom-error-pages/rootfs/go.sum
index 99c959a36..a228b18fb 100644
--- a/images/custom-error-pages/rootfs/go.sum
+++ b/images/custom-error-pages/rootfs/go.sum
@@ -1,141 +1,24 @@
-cloud.google.com/go v0.34.0/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMTw=
-github.com/alecthomas/template v0.0.0-20160405071501-a0175ee3bccc/go.mod h1:LOuyumcjzFXgccqObfd/Ljyb9UuFJ6TxHnclSeseNhc=
-github.com/alecthomas/template v0.0.0-20190718012654-fb15b899a751/go.mod h1:LOuyumcjzFXgccqObfd/Ljyb9UuFJ6TxHnclSeseNhc=
-github.com/alecthomas/units v0.0.0-20151022065526-2efee857e7cf/go.mod h1:ybxpYRFXyAe+OPACYpWeL0wqObRcbAqCMya13uyzqw0=
-github.com/alecthomas/units v0.0.0-20190717042225-c3de453c63f4/go.mod h1:ybxpYRFXyAe+OPACYpWeL0wqObRcbAqCMya13uyzqw0=
-github.com/alecthomas/units v0.0.0-20190924025748-f65c72e2690d/go.mod h1:rBZYJk541a8SKzHPHnH3zbiI+7dagKZ0cgpgrD7Fyho=
-github.com/beorn7/perks v0.0.0-20180321164747-3a771d992973/go.mod h1:Dwedo/Wpr24TaqPxmxbtue+5NUziq4I4S80YR8gNf3Q=
-github.com/beorn7/perks v1.0.0/go.mod h1:KWe93zE9D1o94FZ5RNwFwVgaQK1VOXiVxmqh+CedLV8=
github.com/beorn7/perks v1.0.1 h1:VlbKKnNfV8bJzeqoa4cOKqO6bYr3WgKZxO8Z16+hsOM=
github.com/beorn7/perks v1.0.1/go.mod h1:G2ZrVWU2WbWT9wwq4/hrbKbnv/1ERSJQ0ibhJ6rlkpw=
-github.com/cespare/xxhash/v2 v2.1.1 h1:6MnRN8NT7+YBpUIWxHtefFZOKTAPgGjpQSxqLNn0+qY=
-github.com/cespare/xxhash/v2 v2.1.1/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs=
-github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
-github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
-github.com/go-kit/kit v0.8.0/go.mod h1:xBxKIO96dXMWWy0MnWVtmwkA9/13aqxPnvrjFYMA2as=
-github.com/go-kit/kit v0.9.0/go.mod h1:xBxKIO96dXMWWy0MnWVtmwkA9/13aqxPnvrjFYMA2as=
-github.com/go-kit/log v0.1.0/go.mod h1:zbhenjAZHb184qTLMA9ZjW7ThYL0H2mk7Q6pNt4vbaY=
-github.com/go-logfmt/logfmt v0.3.0/go.mod h1:Qt1PoO58o5twSAckw1HlFXLmHsOX5/0LbT9GBnD5lWE=
-github.com/go-logfmt/logfmt v0.4.0/go.mod h1:3RMwSq7FuexP4Kalkev3ejPJsZTpXXBr9+V4qmtdjCk=
-github.com/go-logfmt/logfmt v0.5.0/go.mod h1:wCYkCAKZfumFQihp8CzCvQ3paCTfi41vtzG1KdI/P7A=
-github.com/go-stack/stack v1.8.0/go.mod h1:v0f6uXyyMGvRgIKkXu+yp6POWl0qKG85gN/melR3HDY=
-github.com/gogo/protobuf v1.1.1/go.mod h1:r8qH/GZQm5c6nD/R0oafs1akxWv10x8SbQlK7atdtwQ=
-github.com/golang/protobuf v1.2.0/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
-github.com/golang/protobuf v1.3.1/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
-github.com/golang/protobuf v1.3.2/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
-github.com/golang/protobuf v1.4.0-rc.1/go.mod h1:ceaxUfeHdC40wWswd/P6IGgMaK3YpKi5j83Wpe3EHw8=
-github.com/golang/protobuf v1.4.0-rc.1.0.20200221234624-67d41d38c208/go.mod h1:xKAWHe0F5eneWXFV3EuXVDTCmh+JuBKY0li0aMyXATA=
-github.com/golang/protobuf v1.4.0-rc.2/go.mod h1:LlEzMj4AhA7rCAGe4KMBDvJI+AwstrUpVNzEA03Pprs=
-github.com/golang/protobuf v1.4.0-rc.4.0.20200313231945-b860323f09d0/go.mod h1:WU3c8KckQ9AFe+yFwt9sWVRKCVIyN9cPHBJSNnbL67w=
-github.com/golang/protobuf v1.4.0/go.mod h1:jodUvKwWbYaEsadDk5Fwe5c77LiNKVO9IDvqG2KuDX0=
-github.com/golang/protobuf v1.4.2/go.mod h1:oDoupMAO8OvCJWAcko0GGGIgR6R6ocIYbsSw735rRwI=
-github.com/golang/protobuf v1.4.3/go.mod h1:oDoupMAO8OvCJWAcko0GGGIgR6R6ocIYbsSw735rRwI=
-github.com/golang/protobuf v1.5.0 h1:LUVKkCeviFUMKqHa4tXIIij/lbhnMbP7Fn5wKdKkRh4=
-github.com/golang/protobuf v1.5.0/go.mod h1:FsONVRAS9T7sI+LIUmWTfcYkHO4aIWwzhcaSAoJOfIk=
-github.com/google/go-cmp v0.3.0/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU=
-github.com/google/go-cmp v0.3.1/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU=
-github.com/google/go-cmp v0.4.0/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
-github.com/google/go-cmp v0.5.4/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
-github.com/google/go-cmp v0.5.5 h1:Khx7svrCpmxxtHBq5j2mp/xVjsi8hQMfNLvJFAlrGgU=
-github.com/google/go-cmp v0.5.5/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
-github.com/google/gofuzz v1.0.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
-github.com/jpillora/backoff v1.0.0/go.mod h1:J/6gKK9jxlEcS3zixgDgUAsiuZ7yrSoa/FX5e0EB2j4=
-github.com/json-iterator/go v1.1.6/go.mod h1:+SdeFBvtyEkXs7REEP0seUULqWtbJapLOCVDaaPEHmU=
-github.com/json-iterator/go v1.1.10/go.mod h1:KdQUCv79m/52Kvf8AW2vK1V8akMuk1QjK/uOdHXbAo4=
-github.com/json-iterator/go v1.1.11/go.mod h1:KdQUCv79m/52Kvf8AW2vK1V8akMuk1QjK/uOdHXbAo4=
-github.com/julienschmidt/httprouter v1.2.0/go.mod h1:SYymIcj16QtmaHHD7aYtjjsJG7VTCxuUUipMqKk8s4w=
-github.com/julienschmidt/httprouter v1.3.0/go.mod h1:JR6WtHb+2LUe8TCKY3cZOxFyyO8IZAc4RVcycCCAKdM=
-github.com/konsorten/go-windows-terminal-sequences v1.0.1/go.mod h1:T0+1ngSBFLxvqU3pZ+m/2kptfBszLMUkC4ZK/EgS/cQ=
-github.com/konsorten/go-windows-terminal-sequences v1.0.3/go.mod h1:T0+1ngSBFLxvqU3pZ+m/2kptfBszLMUkC4ZK/EgS/cQ=
-github.com/kr/logfmt v0.0.0-20140226030751-b84e30acd515/go.mod h1:+0opPa2QZZtGFBFZlji/RkVcI2GknAs/DXo4wKdlNEc=
-github.com/kr/pretty v0.1.0/go.mod h1:dAy3ld7l9f0ibDNOQOHHMYYIIbhfbHSm3C4ZsoJORNo=
-github.com/kr/pty v1.1.1/go.mod h1:pFQYn66WHrOpPYNljwOMqo10TkYh1fy3cYio2l3bCsQ=
-github.com/kr/text v0.1.0/go.mod h1:4Jbv+DJW3UT/LiOwJeYQe1efqtUx/iVham/4vfdArNI=
-github.com/matttproud/golang_protobuf_extensions v1.0.1 h1:4hp9jkHxhMHkqkrB3Ix0jegS5sx/RkqARlsWZ6pIwiU=
-github.com/matttproud/golang_protobuf_extensions v1.0.1/go.mod h1:D8He9yQNgCq6Z5Ld7szi9bcBfOoFv/3dc6xSMkL2PC0=
-github.com/modern-go/concurrent v0.0.0-20180228061459-e0a39a4cb421/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q=
-github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q=
-github.com/modern-go/reflect2 v0.0.0-20180701023420-4b7aa43c6742/go.mod h1:bx2lNnkwVCuqBIxFjflWJWanXIb3RllmbCylyMrvgv0=
-github.com/modern-go/reflect2 v1.0.1/go.mod h1:bx2lNnkwVCuqBIxFjflWJWanXIb3RllmbCylyMrvgv0=
-github.com/mwitkow/go-conntrack v0.0.0-20161129095857-cc309e4a2223/go.mod h1:qRWi+5nqEBWmkhHvq77mSJWrCKwh8bxhgT7d/eI7P4U=
-github.com/mwitkow/go-conntrack v0.0.0-20190716064945-2f068394615f/go.mod h1:qRWi+5nqEBWmkhHvq77mSJWrCKwh8bxhgT7d/eI7P4U=
-github.com/pkg/errors v0.8.0/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
-github.com/pkg/errors v0.8.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
-github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
-github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
-github.com/prometheus/client_golang v0.9.1/go.mod h1:7SWBe2y4D6OKWSNQJUaRYU/AaXPKyh/dDVn+NZz0KFw=
-github.com/prometheus/client_golang v1.0.0/go.mod h1:db9x61etRT2tGnBNRi70OPL5FsnadC4Ky3P0J6CfImo=
-github.com/prometheus/client_golang v1.7.1/go.mod h1:PY5Wy2awLA44sXw4AOSfFBetzPP4j5+D6mVACh+pe2M=
-github.com/prometheus/client_golang v1.11.1 h1:+4eQaD7vAZ6DsfsxB15hbE0odUjGI5ARs9yskGu1v4s=
-github.com/prometheus/client_golang v1.11.1/go.mod h1:Z6t4BnS23TR94PD6BsDNk8yVqroYurpAkEiz0P2BEV0=
-github.com/prometheus/client_model v0.0.0-20180712105110-5c3871d89910/go.mod h1:MbSGuTsp3dbXC40dX6PRTWyKYBIrTGTE9sqQNg2J8bo=
-github.com/prometheus/client_model v0.0.0-20190129233127-fd36f4220a90/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
-github.com/prometheus/client_model v0.2.0 h1:uq5h0d+GuxiXLJLNABMgp2qUWDPiLvgCzz2dUR+/W/M=
-github.com/prometheus/client_model v0.2.0/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
-github.com/prometheus/common v0.4.1/go.mod h1:TNfzLD0ON7rHzMJeJkieUDPYmFC7Snx/y86RQel1bk4=
-github.com/prometheus/common v0.10.0/go.mod h1:Tlit/dnDKsSWFlCLTWaA1cyBgKHSMdTB80sz/V91rCo=
-github.com/prometheus/common v0.26.0 h1:iMAkS2TDoNWnKM+Kopnx/8tnEStIfpYA0ur0xQzzhMQ=
-github.com/prometheus/common v0.26.0/go.mod h1:M7rCNAaPfAosfx8veZJCuw84e35h3Cfd9VFqTh1DIvc=
-github.com/prometheus/procfs v0.0.0-20181005140218-185b4288413d/go.mod h1:c3At6R/oaqEKCNdg8wHV1ftS6bRYblBhIjjI8uT2IGk=
-github.com/prometheus/procfs v0.0.2/go.mod h1:TjEm7ze935MbeOT/UhFTIMYKhuLP4wbCsTZCD3I8kEA=
-github.com/prometheus/procfs v0.1.3/go.mod h1:lV6e/gmhEcM9IjHGsFOCxxuZ+z1YqCvr4OA4YeYWdaU=
-github.com/prometheus/procfs v0.6.0 h1:mxy4L2jP6qMonqmq+aTtOx1ifVWUgG/TAmntgbh3xv4=
-github.com/prometheus/procfs v0.6.0/go.mod h1:cz+aTbrPOrUb4q7XlbU9ygM+/jj0fzG6c1xBZuNvfVA=
-github.com/sirupsen/logrus v1.2.0/go.mod h1:LxeOpSwHxABJmUn/MG1IvRgCAasNZTLOkJPxbbu5VWo=
-github.com/sirupsen/logrus v1.4.2/go.mod h1:tLMulIdttU9McNUspp0xgXVQah82FyeX6MwdIuYE2rE=
-github.com/sirupsen/logrus v1.6.0/go.mod h1:7uNnSEd1DgxDLC74fIahvMZmmYsHGZGEOFrfsX/uA88=
-github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
-github.com/stretchr/objx v0.1.1/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
-github.com/stretchr/testify v1.2.2/go.mod h1:a8OnRcib4nhh0OaRAV+Yts87kKdq0PP7pXfy6kDkUVs=
-github.com/stretchr/testify v1.3.0/go.mod h1:M5WIy9Dh21IEIfnGCwXGc5bZfKNJtfHm1UVUgZn+9EI=
-github.com/stretchr/testify v1.4.0/go.mod h1:j7eGeouHqKxXV5pUuKE4zz7dFj8WfuZ+81PSLYec5m4=
-golang.org/x/crypto v0.0.0-20180904163835-0709b304e793/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4=
-golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
-golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
-golang.org/x/net v0.0.0-20180724234803-3673e40ba225/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
-golang.org/x/net v0.0.0-20181114220301-adae6a3d119a/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
-golang.org/x/net v0.0.0-20190108225652-1e06a53dbb7e/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
-golang.org/x/net v0.0.0-20190404232315-eb5bcb51f2a3/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
-golang.org/x/net v0.0.0-20190613194153-d28f0bde5980/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
-golang.org/x/net v0.0.0-20200625001655-4c5254603344/go.mod h1:/O7V0waA8r7cgGh81Ro3o1hOxt32SMVPicZroKQ2sZA=
-golang.org/x/oauth2 v0.0.0-20190226205417-e64efc72b421/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
-golang.org/x/sync v0.0.0-20181108010431-42b317875d0f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
-golang.org/x/sync v0.0.0-20181221193216-37e7f081c4d4/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
-golang.org/x/sync v0.0.0-20190911185100-cd5d95a43a6e/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
-golang.org/x/sync v0.0.0-20201207232520-09787c993a3a/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
-golang.org/x/sys v0.0.0-20180905080454-ebe1bf3edb33/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
-golang.org/x/sys v0.0.0-20181116152217-5ac8a444bdc5/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
-golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
-golang.org/x/sys v0.0.0-20190412213103-97732733099d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
-golang.org/x/sys v0.0.0-20190422165155-953cdadca894/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
-golang.org/x/sys v0.0.0-20200106162015-b016eb3dc98e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
-golang.org/x/sys v0.0.0-20200323222414-85ca7c5b95cd/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
-golang.org/x/sys v0.0.0-20200615200032-f1bc736245b1/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
-golang.org/x/sys v0.0.0-20200625212154-ddb9806d33ae/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
-golang.org/x/sys v0.0.0-20210124154548-22da62e12c0c/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
-golang.org/x/sys v0.0.0-20210603081109-ebe580a85c40/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.1.0 h1:kunALQeHf1/185U1i0GOB/fy1IPRDDpuoOOqRReG57U=
-golang.org/x/sys v0.1.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
-golang.org/x/text v0.3.2/go.mod h1:bEr9sfX3Q8Zfm5fL9x+3itogRgK3+ptLWKqgva+5dAk=
-golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
-golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543 h1:E7g+9GITq07hpfrRu66IVDexMakfv52eLZ2CXBWiKr4=
-golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
-google.golang.org/appengine v1.4.0/go.mod h1:xpcJRLb0r/rnEns0DIKYYv+WjYCduHsrkT7/EB5XEv4=
-google.golang.org/protobuf v0.0.0-20200109180630-ec00e32a8dfd/go.mod h1:DFci5gLYBciE7Vtevhsrf46CRTquxDuWsQurQQe4oz8=
-google.golang.org/protobuf v0.0.0-20200221191635-4d8936d0db64/go.mod h1:kwYJMbMJ01Woi6D6+Kah6886xMZcty6N08ah7+eCXa0=
-google.golang.org/protobuf v0.0.0-20200228230310-ab0ca4ff8a60/go.mod h1:cfTl7dwQJ+fmap5saPgwCLgHXTUD7jkjRqWcaiX5VyM=
-google.golang.org/protobuf v1.20.1-0.20200309200217-e05f789c0967/go.mod h1:A+miEFZTKqfCUM6K7xSMQL9OKL/b6hQv+e19PK+JZNE=
-google.golang.org/protobuf v1.21.0/go.mod h1:47Nbq4nVaFHyn7ilMalzfO3qCViNmqZ2kzikPIcrTAo=
-google.golang.org/protobuf v1.23.0/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2l/sGQquU=
-google.golang.org/protobuf v1.26.0-rc.1/go.mod h1:jlhhOSvTdKEhbULTjvd4ARK9grFBp09yW+WbY/TyQbw=
-google.golang.org/protobuf v1.33.0 h1:uNO2rsAINq/JlFpSdYEKIZ0uKD/R9cpdv0T+yoGwGmI=
-google.golang.org/protobuf v1.33.0/go.mod h1:c6P6GXX6sHbq/GpV6MGZEdwhWPcYBgnhAHhKbcUYpos=
-gopkg.in/alecthomas/kingpin.v2 v2.2.6/go.mod h1:FMv+mEhP44yOT+4EoQTLFTRgOQ1FBLkstjWtayDeSgw=
-gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
-gopkg.in/check.v1 v1.0.0-20190902080502-41f04d3bba15/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
-gopkg.in/yaml.v2 v2.2.1/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
-gopkg.in/yaml.v2 v2.2.2/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
-gopkg.in/yaml.v2 v2.2.4/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
-gopkg.in/yaml.v2 v2.2.5/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
-gopkg.in/yaml.v2 v2.3.0/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+github.com/cespare/xxhash/v2 v2.3.0 h1:UL815xU9SqsFlibzuggzjXhog7bL6oX9BbNZnL2UFvs=
+github.com/cespare/xxhash/v2 v2.3.0/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs=
+github.com/google/go-cmp v0.6.0 h1:ofyhxvXcZhMsU5ulbFiLKl/XBFqE1GSq7atu8tAmTRI=
+github.com/google/go-cmp v0.6.0/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY=
+github.com/klauspost/compress v1.17.9 h1:6KIumPrER1LHsvBVuDa0r5xaG0Es51mhhB9BQB2qeMA=
+github.com/klauspost/compress v1.17.9/go.mod h1:Di0epgTjJY877eYKx5yC51cX2A2Vl2ibi7bDH9ttBbw=
+github.com/kylelemons/godebug v1.1.0 h1:RPNrshWIDI6G2gRW9EHilWtl7Z6Sb1BR0xunSBf0SNc=
+github.com/kylelemons/godebug v1.1.0/go.mod h1:9/0rRGxNHcop5bhtWyNeEfOS8JIWk580+fNqagV/RAw=
+github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 h1:C3w9PqII01/Oq1c1nUAm88MOHcQC9l5mIlSMApZMrHA=
+github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822/go.mod h1:+n7T8mK8HuQTcFwEeznm/DIxMOiR9yIdICNftLE1DvQ=
+github.com/prometheus/client_golang v1.20.4 h1:Tgh3Yr67PaOv/uTqloMsCEdeuFTatm5zIq5+qNN23vI=
+github.com/prometheus/client_golang v1.20.4/go.mod h1:PIEt8X02hGcP8JWbeHyeZ53Y/jReSnHgO035n//V5WE=
+github.com/prometheus/client_model v0.6.1 h1:ZKSh/rekM+n3CeS952MLRAdFwIKqeY8b62p8ais2e9E=
+github.com/prometheus/client_model v0.6.1/go.mod h1:OrxVMOVHjw3lKMa8+x6HeMGkHMQyHDk9E3jmP2AmGiY=
+github.com/prometheus/common v0.55.0 h1:KEi6DK7lXW/m7Ig5i47x0vRzuBsHuvJdi5ee6Y3G1dc=
+github.com/prometheus/common v0.55.0/go.mod h1:2SECS4xJG1kd8XF9IcM1gMX6510RAEL65zxzNImwdc8=
+github.com/prometheus/procfs v0.15.1 h1:YagwOFzUgYfKKHX6Dr+sHT7km/hxC76UB0learggepc=
+github.com/prometheus/procfs v0.15.1/go.mod h1:fB45yRUv8NstnjriLhBQLuOUt+WW4BsoGhij/e3PBqk=
+golang.org/x/sys v0.22.0 h1:RI27ohtqKCnwULzJLqkv897zojh5/DwS/ENaMzUOaWI=
+golang.org/x/sys v0.22.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
+google.golang.org/protobuf v1.34.2 h1:6xV6lTsCfpGD21XK49h7MhtcApnLqkfYgPcdHftf6hg=
+google.golang.org/protobuf v1.34.2/go.mod h1:qYOHts0dSfpeUzUFpOMr/WGzszTmLH+DiWniOlNbLDw=
From 1d0025372c26ee260578042b5ef130f421849cf9 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 30 Sep 2024 13:30:02 +0100
Subject: [PATCH 256/283] Bump k8s.io/apimachinery from 0.23.1 to 0.31.1 in
/images/ext-auth-example-authsvc/rootfs (#12041)
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
images/ext-auth-example-authsvc/rootfs/go.mod | 4 +-
images/ext-auth-example-authsvc/rootfs/go.sum | 219 +-----------------
2 files changed, 6 insertions(+), 217 deletions(-)
diff --git a/images/ext-auth-example-authsvc/rootfs/go.mod b/images/ext-auth-example-authsvc/rootfs/go.mod
index 366e19639..908da4b2e 100644
--- a/images/ext-auth-example-authsvc/rootfs/go.mod
+++ b/images/ext-auth-example-authsvc/rootfs/go.mod
@@ -2,6 +2,6 @@ module example.com/authsvc
go 1.22.7
-require k8s.io/apimachinery v0.23.1
+require k8s.io/apimachinery v0.31.1
-require github.com/google/uuid v1.1.2 // indirect
+require github.com/google/uuid v1.6.0 // indirect
diff --git a/images/ext-auth-example-authsvc/rootfs/go.sum b/images/ext-auth-example-authsvc/rootfs/go.sum
index 6e3fab295..a3b9e420d 100644
--- a/images/ext-auth-example-authsvc/rootfs/go.sum
+++ b/images/ext-auth-example-authsvc/rootfs/go.sum
@@ -1,215 +1,4 @@
-cloud.google.com/go v0.26.0/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMTw=
-github.com/BurntSushi/toml v0.3.1/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU=
-github.com/NYTimes/gziphandler v0.0.0-20170623195520-56545f4a5d46/go.mod h1:3wb06e3pkSAbeQ52E9H9iFoQsEEwGN64994WTCIhntQ=
-github.com/PuerkitoBio/purell v1.1.1/go.mod h1:c11w/QuzBsJSee3cPx9rAFu61PvFxuPbtSwDGJws/X0=
-github.com/PuerkitoBio/urlesc v0.0.0-20170810143723-de5bf2ad4578/go.mod h1:uGdkoq3SwY9Y+13GIhn11/XLaGBb4BfwItxLd5jeuXE=
-github.com/asaskevich/govalidator v0.0.0-20190424111038-f61b66f89f4a/go.mod h1:lB+ZfQJz7igIIfQNfa7Ml4HSf2uFQQRzpGGRXenZAgY=
-github.com/census-instrumentation/opencensus-proto v0.2.1/go.mod h1:f6KPmirojxKA12rnyqOA5BBL4O983OfeGPqjHWSTneU=
-github.com/client9/misspell v0.3.4/go.mod h1:qj6jICC3Q7zFZvVWo7KLAzC3yx5G7kyvSDkc90ppPyw=
-github.com/creack/pty v1.1.9/go.mod h1:oKZEueFk5CKHvIhNR5MUki03XCEU+Q6VDXinZuGJ33E=
-github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
-github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
-github.com/docopt/docopt-go v0.0.0-20180111231733-ee0de3bc6815/go.mod h1:WwZ+bS3ebgob9U8Nd0kOddGdZWjyMGR8Wziv+TBNwSE=
-github.com/elazarl/goproxy v0.0.0-20180725130230-947c36da3153/go.mod h1:/Zj4wYkgs4iZTTu3o/KG3Itv/qCCa8VVMlb3i9OVuzc=
-github.com/emicklei/go-restful v0.0.0-20170410110728-ff4f55a20633/go.mod h1:otzb+WCGbkyDHkqmQmT5YD2WR4BBwUdeQoFo8l/7tVs=
-github.com/envoyproxy/go-control-plane v0.9.1-0.20191026205805-5f8ba28d4473/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4=
-github.com/envoyproxy/protoc-gen-validate v0.1.0/go.mod h1:iSmxcyjqTsJpI2R4NaDN7+kN2VEUnK/pcBlmesArF7c=
-github.com/evanphx/json-patch v4.12.0+incompatible/go.mod h1:50XU6AFN0ol/bzJsmQLiYLvXMP4fmwYFNcr97nuDLSk=
-github.com/fsnotify/fsnotify v1.4.7/go.mod h1:jwhsz4b93w/PPRr/qN1Yymfu8t87LnFCMoQvtojpjFo=
-github.com/fsnotify/fsnotify v1.4.9/go.mod h1:znqG4EE+3YCdAaPaxE2ZRY/06pZUdp0tY4IgpuI1SZQ=
-github.com/getkin/kin-openapi v0.76.0/go.mod h1:660oXbgy5JFMKreazJaQTw7o+X00qeSyhcnluiMv+Xg=
-github.com/ghodss/yaml v1.0.0/go.mod h1:4dBDuWmgqj2HViK6kFavaiC9ZROes6MMH2rRYeMEF04=
-github.com/go-logr/logr v0.1.0/go.mod h1:ixOQHD9gLJUVQQ2ZOR7zLEifBX6tGkNJF4QyIY7sIas=
-github.com/go-logr/logr v0.2.0/go.mod h1:z6/tIYblkpsD+a4lm/fGIIU9mZ+XfAiaFtq7xTgseGU=
-github.com/go-logr/logr v1.2.0/go.mod h1:jdQByPbusPIv2/zmleS9BjJVeZ6kBagPoEUsqbVz/1A=
-github.com/go-openapi/jsonpointer v0.19.3/go.mod h1:Pl9vOtqEWErmShwVjC8pYs9cog34VGT37dQOVbmoatg=
-github.com/go-openapi/jsonpointer v0.19.5/go.mod h1:Pl9vOtqEWErmShwVjC8pYs9cog34VGT37dQOVbmoatg=
-github.com/go-openapi/jsonreference v0.19.3/go.mod h1:rjx6GuL8TTa9VaixXglHmQmIL98+wF9xc8zWvFonSJ8=
-github.com/go-openapi/swag v0.19.5/go.mod h1:POnQmlKehdgb5mhVOsnJFsivZCEZ/vjK9gh66Z9tfKk=
-github.com/gogo/protobuf v1.3.2/go.mod h1:P1XiOD3dCwIKUDQYPy72D8LYyHL2YPYrpS2s69NZV8Q=
-github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b/go.mod h1:SBH7ygxi8pfUlaOkMMuAQtPIUF8ecWP5IEl/CR7VP2Q=
-github.com/golang/mock v1.1.1/go.mod h1:oTYuIxOrZwtPieC+H1uAHpcLFnEyAGVDL/k47Jfbm0A=
-github.com/golang/protobuf v1.2.0/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
-github.com/golang/protobuf v1.3.2/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
-github.com/golang/protobuf v1.4.0-rc.1/go.mod h1:ceaxUfeHdC40wWswd/P6IGgMaK3YpKi5j83Wpe3EHw8=
-github.com/golang/protobuf v1.4.0-rc.1.0.20200221234624-67d41d38c208/go.mod h1:xKAWHe0F5eneWXFV3EuXVDTCmh+JuBKY0li0aMyXATA=
-github.com/golang/protobuf v1.4.0-rc.2/go.mod h1:LlEzMj4AhA7rCAGe4KMBDvJI+AwstrUpVNzEA03Pprs=
-github.com/golang/protobuf v1.4.0-rc.4.0.20200313231945-b860323f09d0/go.mod h1:WU3c8KckQ9AFe+yFwt9sWVRKCVIyN9cPHBJSNnbL67w=
-github.com/golang/protobuf v1.4.0/go.mod h1:jodUvKwWbYaEsadDk5Fwe5c77LiNKVO9IDvqG2KuDX0=
-github.com/golang/protobuf v1.4.1/go.mod h1:U8fpvMrcmy5pZrNK1lt4xCsGvpyWQ/VVv6QDs8UjoX8=
-github.com/golang/protobuf v1.4.2/go.mod h1:oDoupMAO8OvCJWAcko0GGGIgR6R6ocIYbsSw735rRwI=
-github.com/golang/protobuf v1.5.0/go.mod h1:FsONVRAS9T7sI+LIUmWTfcYkHO4aIWwzhcaSAoJOfIk=
-github.com/golang/protobuf v1.5.2/go.mod h1:XVQd3VNwM+JqD3oG2Ue2ip4fOMUkwXdXDdiuN0vRsmY=
-github.com/google/go-cmp v0.2.0/go.mod h1:oXzfMopK8JAjlY9xF4vHSVASa0yLyX7SntLO5aqRK0M=
-github.com/google/go-cmp v0.3.0/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU=
-github.com/google/go-cmp v0.3.1/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU=
-github.com/google/go-cmp v0.4.0/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
-github.com/google/go-cmp v0.5.5/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
-github.com/google/gofuzz v1.0.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
-github.com/google/gofuzz v1.1.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
-github.com/google/uuid v1.1.2 h1:EVhdT+1Kseyi1/pUmXKaFxYsDNy9RQYkMWRH68J/W7Y=
-github.com/google/uuid v1.1.2/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
-github.com/googleapis/gnostic v0.5.1/go.mod h1:6U4PtQXGIEt/Z3h5MAT7FNofLnw9vXk2cUuW7uA/OeU=
-github.com/googleapis/gnostic v0.5.5/go.mod h1:7+EbHbldMins07ALC74bsA81Ovc97DwqyJO1AENw9kA=
-github.com/gorilla/mux v1.8.0/go.mod h1:DVbg23sWSpFRCP0SfiEN6jmj59UnW/n46BH5rLB71So=
-github.com/gorilla/websocket v1.4.2/go.mod h1:YR8l580nyteQvAITg2hZ9XVh4b55+EU/adAjf1fMHhE=
-github.com/hpcloud/tail v1.0.0/go.mod h1:ab1qPbhIpdTxEkNHXyeSf5vhxWSCs/tWer42PpOxQnU=
-github.com/json-iterator/go v1.1.6/go.mod h1:+SdeFBvtyEkXs7REEP0seUULqWtbJapLOCVDaaPEHmU=
-github.com/json-iterator/go v1.1.12/go.mod h1:e30LSqwooZae/UwlEbR2852Gd8hjQvJoHmT4TnhNGBo=
-github.com/kisielk/errcheck v1.5.0/go.mod h1:pFxgyoBC7bSaBwPgfKdkLd5X25qrDl4LWUI2bnpBCr8=
-github.com/kisielk/gotool v1.0.0/go.mod h1:XhKaO+MFFWcvkIS/tQcRk01m1F5IRFswLeQ+oQHNcck=
-github.com/kr/pretty v0.1.0/go.mod h1:dAy3ld7l9f0ibDNOQOHHMYYIIbhfbHSm3C4ZsoJORNo=
-github.com/kr/pretty v0.2.0/go.mod h1:ipq/a2n7PKx3OHsz4KJII5eveXtPO4qwEXGdVfWzfnI=
-github.com/kr/pty v1.1.1/go.mod h1:pFQYn66WHrOpPYNljwOMqo10TkYh1fy3cYio2l3bCsQ=
-github.com/kr/text v0.1.0/go.mod h1:4Jbv+DJW3UT/LiOwJeYQe1efqtUx/iVham/4vfdArNI=
-github.com/kr/text v0.2.0/go.mod h1:eLer722TekiGuMkidMxC/pM04lWEeraHUUmBw8l2grE=
-github.com/mailru/easyjson v0.0.0-20190614124828-94de47d64c63/go.mod h1:C1wdFJiN94OJF2b5HbByQZoLdCWB1Yqtg26g4irojpc=
-github.com/mailru/easyjson v0.0.0-20190626092158-b2ccc519800e/go.mod h1:C1wdFJiN94OJF2b5HbByQZoLdCWB1Yqtg26g4irojpc=
-github.com/mitchellh/mapstructure v1.1.2/go.mod h1:FVVH3fgwuzCH5S8UJGiWEs2h04kUh9fWfEaFds41c1Y=
-github.com/moby/spdystream v0.2.0/go.mod h1:f7i0iNDQJ059oMTcWxx8MA/zKFIuD/lY+0GqbN2Wy8c=
-github.com/modern-go/concurrent v0.0.0-20180228061459-e0a39a4cb421/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q=
-github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q=
-github.com/modern-go/reflect2 v1.0.1/go.mod h1:bx2lNnkwVCuqBIxFjflWJWanXIb3RllmbCylyMrvgv0=
-github.com/modern-go/reflect2 v1.0.2/go.mod h1:yWuevngMOJpCy52FWWMvUC8ws7m/LJsjYzDa0/r8luk=
-github.com/munnerz/goautoneg v0.0.0-20120707110453-a547fc61f48d/go.mod h1:+n7T8mK8HuQTcFwEeznm/DIxMOiR9yIdICNftLE1DvQ=
-github.com/mxk/go-flowrate v0.0.0-20140419014527-cca7078d478f/go.mod h1:ZdcZmHo+o7JKHSa8/e818NopupXU1YMK5fe1lsApnBw=
-github.com/niemeyer/pretty v0.0.0-20200227124842-a10e7caefd8e/go.mod h1:zD1mROLANZcx1PVRCS0qkT7pwLkGfwJo4zjcN/Tysno=
-github.com/nxadm/tail v1.4.4/go.mod h1:kenIhsEOeOJmVchQTgglprH7qJGnHDVpk1VPCcaMI8A=
-github.com/onsi/ginkgo v0.0.0-20170829012221-11459a886d9c/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+WWjE=
-github.com/onsi/ginkgo v1.6.0/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+WWjE=
-github.com/onsi/ginkgo v1.12.1/go.mod h1:zj2OWP4+oCPe1qIXoGWkgMRwljMUYCdkwsT2108oapk=
-github.com/onsi/ginkgo v1.14.0/go.mod h1:iSB4RoI2tjJc9BBv4NKIKWKya62Rps+oPG/Lv9klQyY=
-github.com/onsi/gomega v0.0.0-20170829124025-dcabb60a477c/go.mod h1:C1qb7wdrVGGVU+Z6iS04AVkA3Q65CEZX59MT0QO5uiA=
-github.com/onsi/gomega v1.7.1/go.mod h1:XdKZgCCFLUoM/7CFJVPcG8C1xQ1AJ0vpAezJrB7JYyY=
-github.com/onsi/gomega v1.10.1/go.mod h1:iN09h71vgCQne3DLsj+A5owkum+a2tYe+TOCB1ybHNo=
-github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
-github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
-github.com/prometheus/client_model v0.0.0-20190812154241-14fe0d1b01d4/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
-github.com/spf13/afero v1.2.2/go.mod h1:9ZxEEn6pIJ8Rxe320qSDBk6AsU0r9pR7Q4OcevTdifk=
-github.com/spf13/pflag v1.0.5/go.mod h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg=
-github.com/stoewer/go-strcase v1.2.0/go.mod h1:IBiWB2sKIp3wVVQ3Y035++gc+knqhUQag1KpM8ahLw8=
-github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
-github.com/stretchr/testify v1.3.0/go.mod h1:M5WIy9Dh21IEIfnGCwXGc5bZfKNJtfHm1UVUgZn+9EI=
-github.com/stretchr/testify v1.5.1/go.mod h1:5W2xD1RspED5o8YsWQXVCued0rvSQ+mT+I5cxcmMvtA=
-github.com/stretchr/testify v1.7.0/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
-github.com/yuin/goldmark v1.1.27/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
-github.com/yuin/goldmark v1.2.1/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
-github.com/yuin/goldmark v1.3.5/go.mod h1:mwnBkeHKe2W/ZEtQ+71ViKU8L12m81fl3OWwC1Zlc8k=
-golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
-golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
-golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
-golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
-golang.org/x/lint v0.0.0-20181026193005-c67002cb31c3/go.mod h1:UVdnD1Gm6xHRNCYTkRU2/jEulfH38KcIWyp/GAMgvoE=
-golang.org/x/lint v0.0.0-20190227174305-5b3e6a55c961/go.mod h1:wehouNa3lNwaWXcvxsM5YxQ5yQlVC4a0KAMCusXpPoU=
-golang.org/x/lint v0.0.0-20190313153728-d0100b6bd8b3/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc=
-golang.org/x/mod v0.2.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
-golang.org/x/mod v0.3.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
-golang.org/x/mod v0.4.2/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
-golang.org/x/net v0.0.0-20180724234803-3673e40ba225/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
-golang.org/x/net v0.0.0-20180826012351-8a410e7b638d/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
-golang.org/x/net v0.0.0-20180906233101-161cd47e91fd/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
-golang.org/x/net v0.0.0-20190213061140-3a22650c66bd/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
-golang.org/x/net v0.0.0-20190311183353-d8887717615a/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
-golang.org/x/net v0.0.0-20190404232315-eb5bcb51f2a3/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
-golang.org/x/net v0.0.0-20190620200207-3b0461eec859/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
-golang.org/x/net v0.0.0-20190827160401-ba9fcec4b297/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
-golang.org/x/net v0.0.0-20200226121028-0de0cce0169b/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
-golang.org/x/net v0.0.0-20200520004742-59133d7f0dd7/go.mod h1:qpuaurCH72eLCgpAm/N6yyVIVM9cpaDIP3A8BGJEC5A=
-golang.org/x/net v0.0.0-20201021035429-f5854403a974/go.mod h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU=
-golang.org/x/net v0.0.0-20210405180319-a5a99cb37ef4/go.mod h1:p54w0d4576C0XHj96bSt6lcn1PtDYWL6XObtHCRCNQM=
-golang.org/x/net v0.0.0-20211209124913-491a49abca63/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
-golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U=
-golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
-golang.org/x/sync v0.0.0-20181108010431-42b317875d0f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
-golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
-golang.org/x/sync v0.0.0-20190911185100-cd5d95a43a6e/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
-golang.org/x/sync v0.0.0-20201020160332-67f06af15bc9/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
-golang.org/x/sync v0.0.0-20210220032951-036812b2e83c/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
-golang.org/x/sys v0.0.0-20180830151530-49385e6e1522/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
-golang.org/x/sys v0.0.0-20180909124046-d0be0721c37e/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
-golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
-golang.org/x/sys v0.0.0-20190412213103-97732733099d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
-golang.org/x/sys v0.0.0-20190904154756-749cb33beabd/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
-golang.org/x/sys v0.0.0-20191005200804-aed5e4c7ecf9/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
-golang.org/x/sys v0.0.0-20191120155948-bd437916bb0e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
-golang.org/x/sys v0.0.0-20200323222414-85ca7c5b95cd/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
-golang.org/x/sys v0.0.0-20200519105757-fe76b779f299/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
-golang.org/x/sys v0.0.0-20200930185726-fdedc70b468f/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
-golang.org/x/sys v0.0.0-20201119102817-f84b799fce68/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
-golang.org/x/sys v0.0.0-20210330210617-4fbd30eecc44/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
-golang.org/x/sys v0.0.0-20210423082822-04245dca01da/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
-golang.org/x/sys v0.0.0-20210510120138-977fb7262007/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.0.0-20210831042530-f4d43177bf5e/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
-golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
-golang.org/x/text v0.3.2/go.mod h1:bEr9sfX3Q8Zfm5fL9x+3itogRgK3+ptLWKqgva+5dAk=
-golang.org/x/text v0.3.3/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
-golang.org/x/text v0.3.5/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
-golang.org/x/text v0.3.6/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
-golang.org/x/text v0.3.7/go.mod h1:u+2+/6zg+i71rQMx5EYifcz6MCKuco9NR6JIITiCfzQ=
-golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
-golang.org/x/tools v0.0.0-20190114222345-bf090417da8b/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
-golang.org/x/tools v0.0.0-20190226205152-f727befe758c/go.mod h1:9Yl7xja0Znq3iFh3HoIrodX9oNMXvdceNzlUR8zjMvY=
-golang.org/x/tools v0.0.0-20190311212946-11955173bddd/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs=
-golang.org/x/tools v0.0.0-20190524140312-2c0ae7006135/go.mod h1:RgjU9mgBXZiqYHBnxXauZ1Gv1EHHAz9KjViQ78xBX0Q=
-golang.org/x/tools v0.0.0-20191119224855-298f0cb1881e/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
-golang.org/x/tools v0.0.0-20200505023115-26f46d2f7ef8/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
-golang.org/x/tools v0.0.0-20200619180055-7c47624df98f/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
-golang.org/x/tools v0.0.0-20210106214847-113979e3529a/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
-golang.org/x/tools v0.1.5/go.mod h1:o0xws9oXOQQZyjljx8fwUC0k7L1pTE6eaCbjGeHmOkk=
-golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
-golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
-golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
-golang.org/x/xerrors v0.0.0-20200804184101-5ec99f83aff1/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
-google.golang.org/appengine v1.1.0/go.mod h1:EbEs0AVv82hx2wNQdGPgUI5lhzA/G0D9YwlJXL52JkM=
-google.golang.org/appengine v1.4.0/go.mod h1:xpcJRLb0r/rnEns0DIKYYv+WjYCduHsrkT7/EB5XEv4=
-google.golang.org/genproto v0.0.0-20180817151627-c66870c02cf8/go.mod h1:JiN7NxoALGmiZfu7CAH4rXhgtRTLTxftemlI0sWmxmc=
-google.golang.org/genproto v0.0.0-20190819201941-24fa4b261c55/go.mod h1:DMBHOl98Agz4BDEuKkezgsaosCRResVns1a3J2ZsMNc=
-google.golang.org/genproto v0.0.0-20200526211855-cb27e3aa2013/go.mod h1:NbSheEEYHJ7i3ixzK3sjbqSGDJWnxyFXZblF3eUsNvo=
-google.golang.org/genproto v0.0.0-20201019141844-1ed22bb0c154/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
-google.golang.org/grpc v1.19.0/go.mod h1:mqu4LbDTu4XGKhr4mRzUsmM4RtVoemTSY81AxZiDr8c=
-google.golang.org/grpc v1.23.0/go.mod h1:Y5yQAOtifL1yxbo5wqy6BxZv8vAUGQwXBOALyacEbxg=
-google.golang.org/grpc v1.27.0/go.mod h1:qbnxyOmOxrQa7FizSgH+ReBfzJrCY1pSN7KXBS8abTk=
-google.golang.org/protobuf v0.0.0-20200109180630-ec00e32a8dfd/go.mod h1:DFci5gLYBciE7Vtevhsrf46CRTquxDuWsQurQQe4oz8=
-google.golang.org/protobuf v0.0.0-20200221191635-4d8936d0db64/go.mod h1:kwYJMbMJ01Woi6D6+Kah6886xMZcty6N08ah7+eCXa0=
-google.golang.org/protobuf v0.0.0-20200228230310-ab0ca4ff8a60/go.mod h1:cfTl7dwQJ+fmap5saPgwCLgHXTUD7jkjRqWcaiX5VyM=
-google.golang.org/protobuf v1.20.1-0.20200309200217-e05f789c0967/go.mod h1:A+miEFZTKqfCUM6K7xSMQL9OKL/b6hQv+e19PK+JZNE=
-google.golang.org/protobuf v1.21.0/go.mod h1:47Nbq4nVaFHyn7ilMalzfO3qCViNmqZ2kzikPIcrTAo=
-google.golang.org/protobuf v1.22.0/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2l/sGQquU=
-google.golang.org/protobuf v1.23.0/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2l/sGQquU=
-google.golang.org/protobuf v1.23.1-0.20200526195155-81db48ad09cc/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2l/sGQquU=
-google.golang.org/protobuf v1.24.0/go.mod h1:r/3tXBNzIEhYS9I1OUVjXDlt8tc493IdKGjtUeSXeh4=
-google.golang.org/protobuf v1.26.0-rc.1/go.mod h1:jlhhOSvTdKEhbULTjvd4ARK9grFBp09yW+WbY/TyQbw=
-google.golang.org/protobuf v1.26.0/go.mod h1:9q0QmTI4eRPtz6boOQmLYwt+qCgq0jsYwAQnmE0givc=
-google.golang.org/protobuf v1.27.1/go.mod h1:9q0QmTI4eRPtz6boOQmLYwt+qCgq0jsYwAQnmE0givc=
-gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
-gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
-gopkg.in/check.v1 v1.0.0-20190902080502-41f04d3bba15/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
-gopkg.in/check.v1 v1.0.0-20200227125254-8fa46927fb4f/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
-gopkg.in/fsnotify.v1 v1.4.7/go.mod h1:Tz8NjZHkW78fSQdbUxIjBTcgA1z1m8ZHf0WmKUhAMys=
-gopkg.in/inf.v0 v0.9.1/go.mod h1:cWUDdTG/fYaXco+Dcufb5Vnc6Gp2YChqWtbxRZE0mXw=
-gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7/go.mod h1:dt/ZhP58zS4L8KSrWDmTeBkI65Dw0HsyUHuEVlX15mw=
-gopkg.in/yaml.v2 v2.2.1/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
-gopkg.in/yaml.v2 v2.2.2/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
-gopkg.in/yaml.v2 v2.2.4/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
-gopkg.in/yaml.v2 v2.2.8/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
-gopkg.in/yaml.v2 v2.3.0/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
-gopkg.in/yaml.v2 v2.4.0/go.mod h1:RDklbk79AGWmwhnvt/jBztapEOGDOx6ZbXqjP6csGnQ=
-gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
-gopkg.in/yaml.v3 v3.0.0-20200615113413-eeeca48fe776/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
-gopkg.in/yaml.v3 v3.0.0-20210107192922-496545a6307b/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
-honnef.co/go/tools v0.0.0-20190102054323-c2f93a96b099/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
-honnef.co/go/tools v0.0.0-20190523083050-ea95bdfd59fc/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
-k8s.io/apimachinery v0.23.1 h1:sfBjlDFwj2onG0Ijx5C+SrAoeUscPrmghm7wHP+uXlo=
-k8s.io/apimachinery v0.23.1/go.mod h1:SADt2Kl8/sttJ62RRsi9MIV4o8f5S3coArm0Iu3fBno=
-k8s.io/gengo v0.0.0-20210813121822-485abfe95c7c/go.mod h1:FiNAH4ZV3gBg2Kwh89tzAEV2be7d5xI0vBa/VySYy3E=
-k8s.io/klog/v2 v2.0.0/go.mod h1:PBfzABfn139FHAV07az/IF9Wp1bkk3vpT2XSJ76fSDE=
-k8s.io/klog/v2 v2.2.0/go.mod h1:Od+F08eJP+W3HUb4pSrPpgp9DGU4GzlpG/TmITuYh/Y=
-k8s.io/klog/v2 v2.30.0/go.mod h1:y1WjHnz7Dj687irZUWR/WLkLc5N1YHtjLdmgWjndZn0=
-k8s.io/kube-openapi v0.0.0-20211115234752-e816edb12b65/go.mod h1:sX9MT8g7NVZM5lVL/j8QyCCJe8YSMW30QvGZWaCIDIk=
-k8s.io/utils v0.0.0-20210802155522-efc7438f0176/go.mod h1:jPW/WVKK9YHAvNhRxK0md/EJ228hCsBRufyofKtW8HA=
-k8s.io/utils v0.0.0-20210930125809-cb0fa318a74b/go.mod h1:jPW/WVKK9YHAvNhRxK0md/EJ228hCsBRufyofKtW8HA=
-sigs.k8s.io/json v0.0.0-20211020170558-c049b76a60c6/go.mod h1:p4QtZmO4uMYipTQNzagwnNoseA6OxSUutVw05NhYDRs=
-sigs.k8s.io/structured-merge-diff/v4 v4.0.2/go.mod h1:bJZC9H9iH24zzfZ/41RGcq60oK1F7G282QMXDPYydCw=
-sigs.k8s.io/structured-merge-diff/v4 v4.1.2/go.mod h1:j/nl6xW8vLS49O8YvXW1ocPhZawJtm+Yrr7PPRQ0Vg4=
-sigs.k8s.io/yaml v1.2.0/go.mod h1:yfXDCHCao9+ENCvLSE62v9VSji2MKu5jeNfTrofGhJc=
+github.com/google/uuid v1.6.0 h1:NIvaJDMOsjHA8n1jAhLSgzrAzy1Hgr+hNrb57e+94F0=
+github.com/google/uuid v1.6.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
+k8s.io/apimachinery v0.31.1 h1:mhcUBbj7KUjaVhyXILglcVjuS4nYXiwC+KKFBgIVy7U=
+k8s.io/apimachinery v0.31.1/go.mod h1:rsPdaZJfTfLsNJSQzNHQvYoTmxhoOEofxtOsF3rtsMo=
From d89be7ad65310c5888dfc8934662aa9485238602 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 30 Sep 2024 13:32:02 +0100
Subject: [PATCH 257/283] Bump k8s.io/kube-aggregator from 0.29.3 to 0.31.1 in
/images/kube-webhook-certgen/rootfs (#12043)
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
images/kube-webhook-certgen/rootfs/go.mod | 29 ++++----
images/kube-webhook-certgen/rootfs/go.sum | 83 +++++++++--------------
2 files changed, 48 insertions(+), 64 deletions(-)
diff --git a/images/kube-webhook-certgen/rootfs/go.mod b/images/kube-webhook-certgen/rootfs/go.mod
index 9bbb5b391..c9f1c827c 100644
--- a/images/kube-webhook-certgen/rootfs/go.mod
+++ b/images/kube-webhook-certgen/rootfs/go.mod
@@ -5,17 +5,17 @@ go 1.22.7
require (
github.com/onrik/logrus v0.11.0
github.com/sirupsen/logrus v1.9.3
- github.com/spf13/cobra v1.8.0
- k8s.io/api v0.29.3
- k8s.io/apimachinery v0.29.3
- k8s.io/client-go v0.29.3
- k8s.io/kube-aggregator v0.29.3
+ github.com/spf13/cobra v1.8.1
+ k8s.io/api v0.31.1
+ k8s.io/apimachinery v0.31.1
+ k8s.io/client-go v0.31.1
+ k8s.io/kube-aggregator v0.31.1
)
require (
- github.com/davecgh/go-spew v1.1.1 // indirect
+ github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc // indirect
github.com/emicklei/go-restful/v3 v3.11.3 // indirect
- github.com/evanphx/json-patch v5.9.0+incompatible // indirect
+ github.com/fxamacker/cbor/v2 v2.7.0 // indirect
github.com/go-logr/logr v1.4.2 // indirect
github.com/go-openapi/jsonpointer v0.20.2 // indirect
github.com/go-openapi/jsonreference v0.20.4 // indirect
@@ -23,6 +23,7 @@ require (
github.com/gogo/protobuf v1.3.2 // indirect
github.com/golang/protobuf v1.5.4 // indirect
github.com/google/gnostic-models v0.6.8 // indirect
+ github.com/google/go-cmp v0.6.0 // indirect
github.com/google/gofuzz v1.2.0 // indirect
github.com/google/uuid v1.6.0 // indirect
github.com/imdario/mergo v0.3.16 // indirect
@@ -37,21 +38,21 @@ require (
github.com/onsi/gomega v1.34.1 // indirect
github.com/pkg/errors v0.9.1 // indirect
github.com/spf13/pflag v1.0.5 // indirect
- github.com/stretchr/testify v1.9.0 // indirect
+ github.com/x448/float16 v0.8.4 // indirect
golang.org/x/net v0.28.0 // indirect
- golang.org/x/oauth2 v0.18.0 // indirect
+ golang.org/x/oauth2 v0.21.0 // indirect
golang.org/x/sys v0.24.0 // indirect
golang.org/x/term v0.23.0 // indirect
golang.org/x/text v0.17.0 // indirect
golang.org/x/time v0.5.0 // indirect
- google.golang.org/appengine v1.6.8 // indirect
- google.golang.org/protobuf v1.34.1 // indirect
+ google.golang.org/protobuf v1.34.2 // indirect
+ gopkg.in/evanphx/json-patch.v4 v4.12.0 // indirect
gopkg.in/inf.v0 v0.9.1 // indirect
gopkg.in/yaml.v2 v2.4.0 // indirect
gopkg.in/yaml.v3 v3.0.1 // indirect
- k8s.io/klog/v2 v2.120.1 // indirect
- k8s.io/kube-openapi v0.0.0-20240224005224-582cce78233b // indirect
- k8s.io/utils v0.0.0-20240102154912-e7106e64919e // indirect
+ k8s.io/klog/v2 v2.130.1 // indirect
+ k8s.io/kube-openapi v0.0.0-20240228011516-70dd3763d340 // indirect
+ k8s.io/utils v0.0.0-20240711033017-18e509b52bc8 // indirect
sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd // indirect
sigs.k8s.io/structured-merge-diff/v4 v4.4.1 // indirect
sigs.k8s.io/yaml v1.4.0 // indirect
diff --git a/images/kube-webhook-certgen/rootfs/go.sum b/images/kube-webhook-certgen/rootfs/go.sum
index f96347108..da633e6db 100644
--- a/images/kube-webhook-certgen/rootfs/go.sum
+++ b/images/kube-webhook-certgen/rootfs/go.sum
@@ -1,11 +1,12 @@
-github.com/cpuguy83/go-md2man/v2 v2.0.3/go.mod h1:tgQtvFlXSQOSOSIRvRPT7W67SCa46tRHOmNcaadrF8o=
+github.com/cpuguy83/go-md2man/v2 v2.0.4/go.mod h1:tgQtvFlXSQOSOSIRvRPT7W67SCa46tRHOmNcaadrF8o=
github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
-github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c=
github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
+github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc h1:U9qPSI2PIWSS1VwoXQT9A3Wy9MM3WgvqSxFWenqJduM=
+github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
github.com/emicklei/go-restful/v3 v3.11.3 h1:yagOQz/38xJmcNeZJtrUcKjkHRltIaIFXKWeG1SkWGE=
github.com/emicklei/go-restful/v3 v3.11.3/go.mod h1:6n3XBCmQQb25CM2LCACGz8ukIrRry+4bhvbpWn3mrbc=
-github.com/evanphx/json-patch v5.9.0+incompatible h1:fBXyNpNMuTTDdquAq/uisOr2lShz4oaXpDTX2bLe7ls=
-github.com/evanphx/json-patch v5.9.0+incompatible/go.mod h1:50XU6AFN0ol/bzJsmQLiYLvXMP4fmwYFNcr97nuDLSk=
+github.com/fxamacker/cbor/v2 v2.7.0 h1:iM5WgngdRBanHcxugY4JySA0nk1wZorNOpTgCMedv5E=
+github.com/fxamacker/cbor/v2 v2.7.0/go.mod h1:pxXPTn3joSm21Gbwsv0w9OSA2y1HFR9qXEeXQVeNoDQ=
github.com/go-logr/logr v1.4.2 h1:6pFjapn8bFcIbiKo3XT4j/BhANplGihG6tvd+8rYgrY=
github.com/go-logr/logr v1.4.2/go.mod h1:9T104GzyrTigFIr8wt5mBrctHMim0Nb2HLGrmQ40KvY=
github.com/go-openapi/jsonpointer v0.20.2 h1:mQc3nmndL8ZBzStEo3JYF8wzmeWffDH4VbXz58sAx6Q=
@@ -14,18 +15,14 @@ github.com/go-openapi/jsonreference v0.20.4 h1:bKlDxQxQJgwpUSgOENiMPzCTBVuc7vTdX
github.com/go-openapi/jsonreference v0.20.4/go.mod h1:5pZJyJP2MnYCpoeoMAql78cCHauHj0V9Lhc506VOpw4=
github.com/go-openapi/swag v0.22.9 h1:XX2DssF+mQKM2DHsbgZK74y/zj4mo9I99+89xUmuZCE=
github.com/go-openapi/swag v0.22.9/go.mod h1:3/OXnFfnMAwBD099SwYRk7GD3xOrr1iL7d/XNLXVVwE=
-github.com/go-task/slim-sprig v0.0.0-20230315185526-52ccab3ef572 h1:tfuBGBXKqDEevZMzYi5KSi8KkcZtzBcTgAUUtapy0OI=
github.com/go-task/slim-sprig/v3 v3.0.0 h1:sUs3vkvUymDpBKi3qH1YSqBQk9+9D/8M2mN1vB6EwHI=
github.com/go-task/slim-sprig/v3 v3.0.0/go.mod h1:W848ghGpv3Qj3dhTPRyJypKRiqCdHZiAzKg9hl15HA8=
github.com/gogo/protobuf v1.3.2 h1:Ov1cvc58UF3b5XjBnZv7+opcTcQFZebYjWzi34vdm4Q=
github.com/gogo/protobuf v1.3.2/go.mod h1:P1XiOD3dCwIKUDQYPy72D8LYyHL2YPYrpS2s69NZV8Q=
-github.com/golang/protobuf v1.5.0/go.mod h1:FsONVRAS9T7sI+LIUmWTfcYkHO4aIWwzhcaSAoJOfIk=
-github.com/golang/protobuf v1.5.2/go.mod h1:XVQd3VNwM+JqD3oG2Ue2ip4fOMUkwXdXDdiuN0vRsmY=
github.com/golang/protobuf v1.5.4 h1:i7eJL8qZTpSEXOPTxNKhASYpMn+8e5Q6AdndVa1dWek=
github.com/golang/protobuf v1.5.4/go.mod h1:lnTiLA8Wa4RWRcIUkrtSVa5nRhsEGBg48fD6rSs7xps=
github.com/google/gnostic-models v0.6.8 h1:yo/ABAfM5IMRsS1VnXjTBvUb61tFIHozhlYvRgGre9I=
github.com/google/gnostic-models v0.6.8/go.mod h1:5n7qKqH0f5wFt+aWF8CW6pZLLNOfYuF5OpfBSENuI8U=
-github.com/google/go-cmp v0.5.5/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
github.com/google/go-cmp v0.5.9/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY=
github.com/google/go-cmp v0.6.0 h1:ofyhxvXcZhMsU5ulbFiLKl/XBFqE1GSq7atu8tAmTRI=
github.com/google/go-cmp v0.6.0/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY=
@@ -67,15 +64,16 @@ github.com/onsi/gomega v1.34.1 h1:EUMJIKUjM8sKjYbtxQI9A4z2o+rruxnzNvpknOXie6k=
github.com/onsi/gomega v1.34.1/go.mod h1:kU1QgUvBDLXBJq618Xvm2LUX6rSAfRaFRTcdOeDLwwY=
github.com/pkg/errors v0.9.1 h1:FEBLx1zS214owpjy7qsBeixbURkuhQAwrK5UwLGTwt4=
github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
-github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
-github.com/rogpeppe/go-internal v1.11.0 h1:cWPaGQEPrBb5/AsnsZesgZZ9yb1OQ+GOISoDNXVBh4M=
-github.com/rogpeppe/go-internal v1.11.0/go.mod h1:ddIwULY96R17DhadqLgMfk9H9tvdUzkipdSkR5nkCZA=
+github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 h1:Jamvg5psRIccs7FGNTlIRMkT8wgtp5eCXdBlqhYGL6U=
+github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
+github.com/rogpeppe/go-internal v1.12.0 h1:exVL4IDcn6na9z1rAb56Vxr+CgyK3nn3O+epU5NdKM8=
+github.com/rogpeppe/go-internal v1.12.0/go.mod h1:E+RYuTGaKKdloAfM02xzb0FW3Paa99yedzYV+kq4uf4=
github.com/russross/blackfriday/v2 v2.1.0/go.mod h1:+Rmxgy9KzJVeS9/2gXHxylqXiyQDYRxCVz55jmeOWTM=
github.com/sirupsen/logrus v1.9.3 h1:dueUQJ1C2q9oE3F7wvmSGAaVtTmUizReu6fjN8uqzbQ=
github.com/sirupsen/logrus v1.9.3/go.mod h1:naHLuLoDiP4jHNo9R0sCBMtWGeIprob74mVsIT4qYEQ=
-github.com/spf13/cobra v1.8.0 h1:7aJaZx1B85qltLMc546zn58BxxfZdR/W22ej9CFoEf0=
-github.com/spf13/cobra v1.8.0/go.mod h1:WXLWApfZ71AjXPya3WOlMsY9yMs7YeiHhFVlvLyhcho=
+github.com/spf13/cobra v1.8.1 h1:e5/vxKd/rZsfSJMUX1agtjeTDf+qv1/JdBF8gg5k9ZM=
+github.com/spf13/cobra v1.8.1/go.mod h1:wHxEcudfqmLYa8iTfL+OuZPbBZkmvliBWKIezN3kD9Y=
github.com/spf13/pflag v1.0.5 h1:iy+VFUOCP1a+8yFto/drg2CJ5u0yRoB7fZw3DKv/JXA=
github.com/spf13/pflag v1.0.5/go.mod h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg=
github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
@@ -89,50 +87,38 @@ github.com/tidwall/match v1.1.1 h1:+Ho715JplO36QYgwN9PGYNhgZvoUSc9X2c80KVTi+GA=
github.com/tidwall/match v1.1.1/go.mod h1:eRSPERbgtNPcGhD8UCthc6PmLEQXEWd3PRB5JTxsfmM=
github.com/tidwall/pretty v1.2.0 h1:RWIZEg2iJ8/g6fDDYzMpobmaoGh5OLl4AXtGUGPcqCs=
github.com/tidwall/pretty v1.2.0/go.mod h1:ITEVvHYasfjBbM0u2Pg8T2nJnzm8xPwvNhhsoaGGjNU=
+github.com/x448/float16 v0.8.4 h1:qLwI1I70+NjRFUR3zs1JPUCgaCXSh3SW62uAKT1mSBM=
+github.com/x448/float16 v0.8.4/go.mod h1:14CWIYCyZA/cWjXOioeEpHeN/83MdbZDRQHoFcYsOfg=
github.com/yuin/goldmark v1.1.27/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
github.com/yuin/goldmark v1.2.1/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
-github.com/yuin/goldmark v1.4.13/go.mod h1:6yULJ656Px+3vBD8DxQVa3kxgyrAnzto9xy5taEt/CY=
golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
-golang.org/x/crypto v0.0.0-20210921155107-089bfa567519/go.mod h1:GvvjBRRGRdwPK5ydBHafDWAxML/pGHZbMvKqRZ5+Abc=
golang.org/x/exp v0.0.0-20240719175910-8a7402abbf56 h1:2dVuKD2vS7b0QIHQbpyTISPd0LeHDbnYEryqj5Q1ug8=
golang.org/x/exp v0.0.0-20240719175910-8a7402abbf56/go.mod h1:M4RDyNAINzryxdtnbRXRL/OHtkFuWGRjvuhBJpk2IlY=
golang.org/x/mod v0.2.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
golang.org/x/mod v0.3.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
-golang.org/x/mod v0.6.0-dev.0.20220419223038-86c51ed26bb4/go.mod h1:jJ57K6gSWd91VN4djpZkiMVwK6gcyfeH4XE8wZrZaV4=
golang.org/x/net v0.0.0-20190404232315-eb5bcb51f2a3/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
golang.org/x/net v0.0.0-20190620200207-3b0461eec859/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
golang.org/x/net v0.0.0-20200226121028-0de0cce0169b/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
golang.org/x/net v0.0.0-20201021035429-f5854403a974/go.mod h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU=
-golang.org/x/net v0.0.0-20210226172049-e18ecbb05110/go.mod h1:m0MpNAwzfU5UDzcl9v0D8zg8gWTRqZa9RBIspLL5mdg=
-golang.org/x/net v0.0.0-20220722155237-a158d28d115b/go.mod h1:XRhObCWvk6IyKnWLug+ECip1KBveYUHfp+8e9klMJ9c=
golang.org/x/net v0.28.0 h1:a9JDOJc5GMUJ0+UDqmLT86WiEy7iWyIhz8gz8E4e5hE=
golang.org/x/net v0.28.0/go.mod h1:yqtgsTWOOnlGLG9GFRrK3++bGOUEkNBoHZc8MEDWPNg=
-golang.org/x/oauth2 v0.18.0 h1:09qnuIAgzdx1XplqJvW6CQqMCtGZykZWcXzPMPUusvI=
-golang.org/x/oauth2 v0.18.0/go.mod h1:Wf7knwG0MPoWIMMBgFlEaSUDaKskp0dCfrlJRJXbBi8=
+golang.org/x/oauth2 v0.21.0 h1:tsimM75w1tF/uws5rbeHzIWxEqElMehnc+iW793zsZs=
+golang.org/x/oauth2 v0.21.0/go.mod h1:XYTD2NtWslqkgxebSiOHnXEap4TF09sJSc7H1sXbhtI=
golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sync v0.0.0-20190911185100-cd5d95a43a6e/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sync v0.0.0-20201020160332-67f06af15bc9/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
-golang.org/x/sync v0.0.0-20220722155255-886fb9371eb4/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
golang.org/x/sys v0.0.0-20190412213103-97732733099d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20200930185726-fdedc70b468f/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
-golang.org/x/sys v0.0.0-20201119102817-f84b799fce68/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
-golang.org/x/sys v0.0.0-20210615035016-665e8c7367d1/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.0.0-20220520151302-bc2c85ada10a/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.0.0-20220715151400-c0bba94af5f8/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.0.0-20220722155257-8c9f86f7a55f/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.24.0 h1:Twjiwq9dn6R1fQcyiK+wQyHWfaz/BJB+YIpzU/Cv3Xg=
golang.org/x/sys v0.24.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
-golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
-golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8=
golang.org/x/term v0.23.0 h1:F6D4vR+EHoL9/sWAWgAR1H2DcHr4PareCbAaCo1RpuU=
golang.org/x/term v0.23.0/go.mod h1:DgV24QBUrK6jhZXl+20l6UWznPlwAHm1Q1mGHtydmSk=
golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
golang.org/x/text v0.3.3/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
-golang.org/x/text v0.3.7/go.mod h1:u+2+/6zg+i71rQMx5EYifcz6MCKuco9NR6JIITiCfzQ=
-golang.org/x/text v0.3.8/go.mod h1:E6s5w1FMmriuDzIBO73fBruAKo1PCIq6d2Q6DHfQ8WQ=
golang.org/x/text v0.17.0 h1:XtiM5bkSOt+ewxlOE/aE/AKEHibwj/6gvWMl9Rsh0Qc=
golang.org/x/text v0.17.0/go.mod h1:BuEKDfySbSR4drPmRPG/7iBdf8hvFMuRexcpahXilzY=
golang.org/x/time v0.5.0 h1:o7cqy6amK/52YcAKIPlM3a+Fpj35zvRj2TP+e1xFSfk=
@@ -141,22 +127,19 @@ golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGm
golang.org/x/tools v0.0.0-20191119224855-298f0cb1881e/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
golang.org/x/tools v0.0.0-20200619180055-7c47624df98f/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
golang.org/x/tools v0.0.0-20210106214847-113979e3529a/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
-golang.org/x/tools v0.1.12/go.mod h1:hNGJHUnrk76NpqgfD5Aqm5Crs+Hm0VOH/i9J2+nxYbc=
golang.org/x/tools v0.24.0 h1:J1shsA93PJUEVaUSaay7UXAyE8aimq3GW0pjlolpa24=
golang.org/x/tools v0.24.0/go.mod h1:YhNqVBIfWHdzvTLs0d8LCuMhkKUgSUKldakyV7W/WDQ=
golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
golang.org/x/xerrors v0.0.0-20200804184101-5ec99f83aff1/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
-google.golang.org/appengine v1.6.8 h1:IhEN5q69dyKagZPYMSdIjS2HqprW324FRQZJcGqPAsM=
-google.golang.org/appengine v1.6.8/go.mod h1:1jJ3jBArFh5pcgW8gCtRJnepW8FzD1V44FJffLiz/Ds=
-google.golang.org/protobuf v1.26.0-rc.1/go.mod h1:jlhhOSvTdKEhbULTjvd4ARK9grFBp09yW+WbY/TyQbw=
-google.golang.org/protobuf v1.26.0/go.mod h1:9q0QmTI4eRPtz6boOQmLYwt+qCgq0jsYwAQnmE0givc=
-google.golang.org/protobuf v1.34.1 h1:9ddQBjfCyZPOHPUiPxpYESBLc+T8P3E+Vo4IbKZgFWg=
-google.golang.org/protobuf v1.34.1/go.mod h1:c6P6GXX6sHbq/GpV6MGZEdwhWPcYBgnhAHhKbcUYpos=
+google.golang.org/protobuf v1.34.2 h1:6xV6lTsCfpGD21XK49h7MhtcApnLqkfYgPcdHftf6hg=
+google.golang.org/protobuf v1.34.2/go.mod h1:qYOHts0dSfpeUzUFpOMr/WGzszTmLH+DiWniOlNbLDw=
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c h1:Hei/4ADfdWqJk1ZMxUNpqntNwaWcugrBjAiHlqqRiVk=
gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c/go.mod h1:JHkPIbrfpd72SG/EVd6muEfDQjcINNoR0C8j2r3qZ4Q=
+gopkg.in/evanphx/json-patch.v4 v4.12.0 h1:n6jtcsulIzXPJaxegRbvFNNrZDjbij7ny3gmSPG+6V4=
+gopkg.in/evanphx/json-patch.v4 v4.12.0/go.mod h1:p8EYWUEYMpynmqDbY58zCKCFZw8pRWMG4EsWvDvM72M=
gopkg.in/inf.v0 v0.9.1 h1:73M5CoZyi3ZLMOyDlQh031Cx6N9NDJ2Vvfl76EDAgDc=
gopkg.in/inf.v0 v0.9.1/go.mod h1:cWUDdTG/fYaXco+Dcufb5Vnc6Gp2YChqWtbxRZE0mXw=
gopkg.in/yaml.v2 v2.2.8/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
@@ -165,20 +148,20 @@ gopkg.in/yaml.v2 v2.4.0/go.mod h1:RDklbk79AGWmwhnvt/jBztapEOGDOx6ZbXqjP6csGnQ=
gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA=
gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
-k8s.io/api v0.29.3 h1:2ORfZ7+bGC3YJqGpV0KSDDEVf8hdGQ6A03/50vj8pmw=
-k8s.io/api v0.29.3/go.mod h1:y2yg2NTyHUUkIoTC+phinTnEa3KFM6RZ3szxt014a80=
-k8s.io/apimachinery v0.29.3 h1:2tbx+5L7RNvqJjn7RIuIKu9XTsIZ9Z5wX2G22XAa5EU=
-k8s.io/apimachinery v0.29.3/go.mod h1:hx/S4V2PNW4OMg3WizRrHutyB5la0iCUbZym+W0EQIU=
-k8s.io/client-go v0.29.3 h1:R/zaZbEAxqComZ9FHeQwOh3Y1ZUs7FaHKZdQtIc2WZg=
-k8s.io/client-go v0.29.3/go.mod h1:tkDisCvgPfiRpxGnOORfkljmS+UrW+WtXAy2fTvXJB0=
-k8s.io/klog/v2 v2.120.1 h1:QXU6cPEOIslTGvZaXvFWiP9VKyeet3sawzTOvdXb4Vw=
-k8s.io/klog/v2 v2.120.1/go.mod h1:3Jpz1GvMt720eyJH1ckRHK1EDfpxISzJ7I9OYgaDtPE=
-k8s.io/kube-aggregator v0.29.3 h1:5KvTyFN8sQq2imq8tMAHWEKoE64Zg9WSMaGX78KV6ps=
-k8s.io/kube-aggregator v0.29.3/go.mod h1:xGJqV/SJJ1fbwTGfQLAZfwgqX1EMoaqfotDTkDrqqSk=
-k8s.io/kube-openapi v0.0.0-20240224005224-582cce78233b h1:1dzw/KqgSPod72SUp2tuTOmK33TlY2fHlrVU2M9VrOM=
-k8s.io/kube-openapi v0.0.0-20240224005224-582cce78233b/go.mod h1:Pa1PvrP7ACSkuX6I7KYomY6cmMA0Tx86waBhDUgoKPw=
-k8s.io/utils v0.0.0-20240102154912-e7106e64919e h1:eQ/4ljkx21sObifjzXwlPKpdGLrCfRziVtos3ofG/sQ=
-k8s.io/utils v0.0.0-20240102154912-e7106e64919e/go.mod h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0=
+k8s.io/api v0.31.1 h1:Xe1hX/fPW3PXYYv8BlozYqw63ytA92snr96zMW9gWTU=
+k8s.io/api v0.31.1/go.mod h1:sbN1g6eY6XVLeqNsZGLnI5FwVseTrZX7Fv3O26rhAaI=
+k8s.io/apimachinery v0.31.1 h1:mhcUBbj7KUjaVhyXILglcVjuS4nYXiwC+KKFBgIVy7U=
+k8s.io/apimachinery v0.31.1/go.mod h1:rsPdaZJfTfLsNJSQzNHQvYoTmxhoOEofxtOsF3rtsMo=
+k8s.io/client-go v0.31.1 h1:f0ugtWSbWpxHR7sjVpQwuvw9a3ZKLXX0u0itkFXufb0=
+k8s.io/client-go v0.31.1/go.mod h1:sKI8871MJN2OyeqRlmA4W4KM9KBdBUpDLu/43eGemCg=
+k8s.io/klog/v2 v2.130.1 h1:n9Xl7H1Xvksem4KFG4PYbdQCQxqc/tTUyrgXaOhHSzk=
+k8s.io/klog/v2 v2.130.1/go.mod h1:3Jpz1GvMt720eyJH1ckRHK1EDfpxISzJ7I9OYgaDtPE=
+k8s.io/kube-aggregator v0.31.1 h1:vrYBTTs3xMrpiEsmBjsLETZE9uuX67oQ8B3i1BFfMPw=
+k8s.io/kube-aggregator v0.31.1/go.mod h1:+aW4NX50uneozN+BtoCxI4g7ND922p8Wy3tWKFDiWVk=
+k8s.io/kube-openapi v0.0.0-20240228011516-70dd3763d340 h1:BZqlfIlq5YbRMFko6/PM7FjZpUb45WallggurYhKGag=
+k8s.io/kube-openapi v0.0.0-20240228011516-70dd3763d340/go.mod h1:yD4MZYeKMBwQKVht279WycxKyM84kkAx2DPrTXaeb98=
+k8s.io/utils v0.0.0-20240711033017-18e509b52bc8 h1:pUdcCO1Lk/tbT5ztQWOBi5HBgbBP1J8+AsQnQCKsi8A=
+k8s.io/utils v0.0.0-20240711033017-18e509b52bc8/go.mod h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0=
sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd h1:EDPBXCAspyGV4jQlpZSudPeMmr1bNJefnuqLsRAsHZo=
sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd/go.mod h1:B8JuhiUyNFVKdsE8h686QcCxMaH6HrOAZj4vswFpcB0=
sigs.k8s.io/structured-merge-diff/v4 v4.4.1 h1:150L+0vs/8DA78h1u02ooW1/fFq/Lwr+sGiqlzvrtq4=
From 2208fa398510b0677b85c8653c533ca8dcfc4a3f Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 30 Sep 2024 14:32:03 +0100
Subject: [PATCH 258/283] Bump the go group across 1 directory with 3 updates
(#12050)
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 6 +++---
go.sum | 12 ++++++------
2 files changed, 9 insertions(+), 9 deletions(-)
diff --git a/go.mod b/go.mod
index b9f9f10f6..6bdaead75 100644
--- a/go.mod
+++ b/go.mod
@@ -32,12 +32,12 @@ require (
gopkg.in/go-playground/pool.v3 v3.1.1
gopkg.in/mcuadros/go-syslog.v2 v2.3.0
k8s.io/api v0.31.1
- k8s.io/apiextensions-apiserver v0.31.0
+ k8s.io/apiextensions-apiserver v0.31.1
k8s.io/apimachinery v0.31.1
- k8s.io/apiserver v0.31.0
+ k8s.io/apiserver v0.31.1
k8s.io/cli-runtime v0.30.0
k8s.io/client-go v0.31.1
- k8s.io/code-generator v0.31.0
+ k8s.io/code-generator v0.31.1
k8s.io/component-base v0.31.1
k8s.io/klog/v2 v2.130.1
pault.ag/go/sniff v0.0.0-20200207005214-cf7e4d167732
diff --git a/go.sum b/go.sum
index 20134af1e..04a26d653 100644
--- a/go.sum
+++ b/go.sum
@@ -343,18 +343,18 @@ gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA=
gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
k8s.io/api v0.31.1 h1:Xe1hX/fPW3PXYYv8BlozYqw63ytA92snr96zMW9gWTU=
k8s.io/api v0.31.1/go.mod h1:sbN1g6eY6XVLeqNsZGLnI5FwVseTrZX7Fv3O26rhAaI=
-k8s.io/apiextensions-apiserver v0.31.0 h1:fZgCVhGwsclj3qCw1buVXCV6khjRzKC5eCFt24kyLSk=
-k8s.io/apiextensions-apiserver v0.31.0/go.mod h1:b9aMDEYaEe5sdK+1T0KU78ApR/5ZVp4i56VacZYEHxk=
+k8s.io/apiextensions-apiserver v0.31.1 h1:L+hwULvXx+nvTYX/MKM3kKMZyei+UiSXQWciX/N6E40=
+k8s.io/apiextensions-apiserver v0.31.1/go.mod h1:tWMPR3sgW+jsl2xm9v7lAyRF1rYEK71i9G5dRtkknoQ=
k8s.io/apimachinery v0.31.1 h1:mhcUBbj7KUjaVhyXILglcVjuS4nYXiwC+KKFBgIVy7U=
k8s.io/apimachinery v0.31.1/go.mod h1:rsPdaZJfTfLsNJSQzNHQvYoTmxhoOEofxtOsF3rtsMo=
-k8s.io/apiserver v0.31.0 h1:p+2dgJjy+bk+B1Csz+mc2wl5gHwvNkC9QJV+w55LVrY=
-k8s.io/apiserver v0.31.0/go.mod h1:KI9ox5Yu902iBnnyMmy7ajonhKnkeZYJhTZ/YI+WEMk=
+k8s.io/apiserver v0.31.1 h1:Sars5ejQDCRBY5f7R3QFHdqN3s61nhkpaX8/k1iEw1c=
+k8s.io/apiserver v0.31.1/go.mod h1:lzDhpeToamVZJmmFlaLwdYZwd7zB+WYRYIboqA1kGxM=
k8s.io/cli-runtime v0.30.0 h1:0vn6/XhOvn1RJ2KJOC6IRR2CGqrpT6QQF4+8pYpWQ48=
k8s.io/cli-runtime v0.30.0/go.mod h1:vATpDMATVTMA79sZ0YUCzlMelf6rUjoBzlp+RnoM+cg=
k8s.io/client-go v0.31.1 h1:f0ugtWSbWpxHR7sjVpQwuvw9a3ZKLXX0u0itkFXufb0=
k8s.io/client-go v0.31.1/go.mod h1:sKI8871MJN2OyeqRlmA4W4KM9KBdBUpDLu/43eGemCg=
-k8s.io/code-generator v0.31.0 h1:w607nrMi1KeDKB3/F/J4lIoOgAwc+gV9ZKew4XRfMp8=
-k8s.io/code-generator v0.31.0/go.mod h1:84y4w3es8rOJOUUP1rLsIiGlO1JuEaPFXQPA9e/K6U0=
+k8s.io/code-generator v0.31.1 h1:GvkRZEP2g2UnB2QKT2Dgc/kYxIkDxCHENv2Q1itioVs=
+k8s.io/code-generator v0.31.1/go.mod h1:oL2ky46L48osNqqZAeOcWWy0S5BXj50vVdwOtTefqIs=
k8s.io/component-base v0.31.1 h1:UpOepcrX3rQ3ab5NB6g5iP0tvsgJWzxTyAo20sgYSy8=
k8s.io/component-base v0.31.1/go.mod h1:WGeaw7t/kTsqpVTaCoVEtillbqAhF2/JgvO0LDOMa0w=
k8s.io/gengo/v2 v2.0.0-20240404160639-a0386bf69313 h1:bKcdZJOPICVmIIuaM9+MXmapE94dn5AYv5ODs1jA43o=
From 03affadd3645cc88b837717346c76db76206de63 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 30 Sep 2024 15:18:03 +0100
Subject: [PATCH 259/283] Bump github/codeql-action from 3.26.9 to 3.26.10 in
the actions group (#12051)
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
.github/workflows/scorecards.yml | 2 +-
.github/workflows/vulnerability-scans.yaml | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/.github/workflows/scorecards.yml b/.github/workflows/scorecards.yml
index 764126450..4038f1158 100644
--- a/.github/workflows/scorecards.yml
+++ b/.github/workflows/scorecards.yml
@@ -59,6 +59,6 @@ jobs:
# Upload the results to GitHub's code scanning dashboard.
- name: "Upload to code-scanning"
- uses: github/codeql-action/upload-sarif@461ef6c76dfe95d5c364de2f431ddbd31a417628 # v3.26.9
+ uses: github/codeql-action/upload-sarif@e2b3eafc8d227b0241d48be5f425d47c2d750a13 # v3.26.10
with:
sarif_file: results.sarif
diff --git a/.github/workflows/vulnerability-scans.yaml b/.github/workflows/vulnerability-scans.yaml
index 9b038de98..adf8a593f 100644
--- a/.github/workflows/vulnerability-scans.yaml
+++ b/.github/workflows/vulnerability-scans.yaml
@@ -75,7 +75,7 @@ jobs:
# This step checks out a copy of your repository.
- name: Upload SARIF file
- uses: github/codeql-action/upload-sarif@461ef6c76dfe95d5c364de2f431ddbd31a417628 # v3.26.9
+ uses: github/codeql-action/upload-sarif@e2b3eafc8d227b0241d48be5f425d47c2d750a13 # v3.26.10
with:
token: ${{ github.token }}
# Path to SARIF file relative to the root of the repository
From f3bfa56c61446e1de7423038cc551c3e8eaa237b Mon Sep 17 00:00:00 2001
From: Myst <1592048+LeMyst@users.noreply.github.com>
Date: Tue, 1 Oct 2024 07:21:49 +0200
Subject: [PATCH 260/283] Chart: Add `controller.metrics.service.enabled`.
(#12056)
---
charts/ingress-nginx/README.md | 1 +
.../templates/controller-service-metrics.yaml | 2 +-
.../controller-service-metrics_test.yaml | 22 +++++++++++++++++--
charts/ingress-nginx/values.yaml | 2 ++
4 files changed, 24 insertions(+), 3 deletions(-)
diff --git a/charts/ingress-nginx/README.md b/charts/ingress-nginx/README.md
index cd181f76e..4a0f50484 100644
--- a/charts/ingress-nginx/README.md
+++ b/charts/ingress-nginx/README.md
@@ -372,6 +372,7 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
| controller.metrics.prometheusRule.enabled | bool | `false` | |
| controller.metrics.prometheusRule.rules | list | `[]` | |
| controller.metrics.service.annotations | object | `{}` | |
+| controller.metrics.service.enabled | bool | `true` | Enable the metrics service or not. |
| controller.metrics.service.externalIPs | list | `[]` | List of IP addresses at which the stats-exporter service is available # Ref: https://kubernetes.io/docs/concepts/services-networking/service/#external-ips # |
| controller.metrics.service.labels | object | `{}` | Labels to be added to the metrics service resource |
| controller.metrics.service.loadBalancerSourceRanges | list | `[]` | |
diff --git a/charts/ingress-nginx/templates/controller-service-metrics.yaml b/charts/ingress-nginx/templates/controller-service-metrics.yaml
index 7c153295f..4b25a840e 100644
--- a/charts/ingress-nginx/templates/controller-service-metrics.yaml
+++ b/charts/ingress-nginx/templates/controller-service-metrics.yaml
@@ -1,4 +1,4 @@
-{{- if .Values.controller.metrics.enabled -}}
+{{- if and .Values.controller.metrics.enabled .Values.controller.metrics.service.enabled -}}
apiVersion: v1
kind: Service
metadata:
diff --git a/charts/ingress-nginx/tests/controller-service-metrics_test.yaml b/charts/ingress-nginx/tests/controller-service-metrics_test.yaml
index afdb94046..ddb412e5b 100644
--- a/charts/ingress-nginx/tests/controller-service-metrics_test.yaml
+++ b/charts/ingress-nginx/tests/controller-service-metrics_test.yaml
@@ -3,16 +3,34 @@ templates:
- controller-service-metrics.yaml
tests:
- - it: should not create a metrics Service if `controller.metrics.enabled` is false
+ - it: should not create a metrics Service if `controller.metrics.enabled` is false and `controller.metrics.service.enabled` is false
set:
controller.metrics.enabled: false
+ controller.metrics.service.enabled: false
asserts:
- hasDocuments:
count: 0
- - it: should create a metrics Service if `controller.metrics.enabled` is true
+ - it: should not create a metrics Service if `controller.metrics.enabled` is false and `controller.metrics.service.enabled` is true
+ set:
+ controller.metrics.enabled: false
+ controller.metrics.service.enabled: true
+ asserts:
+ - hasDocuments:
+ count: 0
+
+ - it: should not create a metrics Service if `controller.metrics.enabled` is true and `controller.metrics.service.enabled` is false
set:
controller.metrics.enabled: true
+ controller.metrics.service.enabled: false
+ asserts:
+ - hasDocuments:
+ count: 0
+
+ - it: should create a metrics Service if `controller.metrics.enabled` is true and `controller.metrics.service.enabled` is true
+ set:
+ controller.metrics.enabled: true
+ controller.metrics.service.enabled: true
asserts:
- hasDocuments:
count: 1
diff --git a/charts/ingress-nginx/values.yaml b/charts/ingress-nginx/values.yaml
index 50a41f2f0..136fae4b2 100644
--- a/charts/ingress-nginx/values.yaml
+++ b/charts/ingress-nginx/values.yaml
@@ -844,6 +844,8 @@ controller:
# if this port is changed, change healthz-port: in extraArgs: accordingly
enabled: false
service:
+ # -- Enable the metrics service or not.
+ enabled: true
annotations: {}
# prometheus.io/scrape: "true"
# prometheus.io/port: "10254"
From e33ca05c7b54f81c983565338e0eff828ed49193 Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Tue, 1 Oct 2024 10:33:49 +0200
Subject: [PATCH 261/283] Images: Remove NGINX v1.21. (#12031)
---
.github/workflows/ci.yaml | 12 +-
.github/workflows/images.yaml | 11 +-
images/nginx-1.25/Makefile | 59 --
images/nginx-1.25/README.md | 47 --
images/nginx-1.25/TAG | 1 -
images/nginx-1.25/cloudbuild.yaml | 14 -
images/nginx-1.25/rootfs/Dockerfile | 74 ---
images/nginx-1.25/rootfs/build.sh | 619 ------------------
images/nginx/Makefile | 4 +-
images/nginx/README.md | 60 +-
images/nginx/TAG | 2 +-
images/nginx/rootfs/Dockerfile | 7 +-
images/nginx/rootfs/build.sh | 487 ++++++--------
.../rootfs/patches/00_drop-alias-root.patch | 0
.../01_nginx-1.25.3-win32_max_err_str.patch | 0
..._nginx-1.25.3-stream_balancer_export.patch | 0
...stream_proxy_get_next_upstream_tries.patch | 0
...x-1.25.3-stream_proxy_timeout_fields.patch | 0
...nx-1.25.3-stream_ssl_preread_no_skip.patch | 0
...6_nginx-1.25.3-resolver_conf_parsing.patch | 0
.../07_nginx-1.25.3-daemon_destroy_pool.patch | 0
...nginx-1.25.3-init_cycle_pool_release.patch | 0
...09_nginx-1.25.3-balancer_status_code.patch | 0
...0_nginx-1.25.3-delayed_posted_events.patch | 0
...ginx-1.25.3-privileged_agent_process.patch | 0
...privileged_agent_process_connections.patch | 0
...privileged_agent_process_thread_pool.patch | 0
...-1.25.3-single_process_graceful_exit.patch | 0
.../15_nginx-1.25.3-intercept_error_log.patch | 0
.../16_nginx-1.25.3-upstream_pipelining.patch | 0
.../17_nginx-1.25.3-no_error_pages.patch | 0
.../patches/18_nginx-1.25.3-no_Werror.patch | 0
...19_nginx-1.25.3-log_escape_non_ascii.patch | 0
...20_nginx-1.25.3-proxy_host_port_vars.patch | 0
.../21_nginx-1.25.3-cache_manager_exit.patch | 0
...22_nginx-1.25.3-larger_max_error_str.patch | 0
.../23_nginx-1.25.3-pcre_conf_opt.patch | 0
....25.3-always_enable_cc_feature_tests.patch | 0
.../25_nginx-1.25.3-ssl_cert_cb_yield.patch | 0
.../26_nginx-1.25.3-ssl_sess_cb_yield.patch | 0
...inx-1.25.3-ssl_client_hello_cb_yield.patch | 0
...nginx-1.25.3-upstream_timeout_fields.patch | 0
...inx-1.25.3-safe_resolver_ipv6_option.patch | 0
.../30_nginx-1.25.3-socket_cloexec.patch | 0
...nx-1.25.3-reuseport_close_unused_fds.patch | 0
.../rootfs/patches/drop-alias-root.patch | 144 ----
.../nginx-1.21.4-balancer_status_code.patch | 72 --
.../nginx-1.21.4-cache_manager_exit.patch | 19 -
.../nginx-1.21.4-delayed_posted_events.patch | 98 ---
.../patches/nginx-1.21.4-hash_overflow.patch | 20 -
.../rootfs/patches/nginx-1.21.4-http2.patch | 57 --
...nginx-1.21.4-init_cycle_pool_release.patch | 59 --
.../nginx-1.21.4-larger_max_error_str.patch | 13 -
.../patches/nginx-1.21.4-no_Werror.patch | 36 -
.../nginx-1.21.4-proxy_host_port_vars.patch | 19 -
.../nginx-1.21.4-resolver_conf_parsing.patch | 263 --------
...nx-1.21.4-reuseport_close_unused_fds.patch | 38 --
...-1.21.4-single_process_graceful_exit.patch | 75 ---
.../patches/nginx-1.21.4-socket_cloexec.patch | 185 ------
.../nginx-1.21.4-ssl_cert_cb_yield.patch | 64 --
.../nginx-1.21.4-ssl_sess_cb_yield.patch | 41 --
...stream_proxy_get_next_upstream_tries.patch | 31 -
...nx-1.21.4-stream_ssl_preread_no_skip.patch | 13 -
.../nginx-1.21.4-upstream_pipelining.patch | 23 -
...nginx-1.21.4-upstream_timeout_fields.patch | 112 ----
65 files changed, 244 insertions(+), 2535 deletions(-)
delete mode 100644 images/nginx-1.25/Makefile
delete mode 100644 images/nginx-1.25/README.md
delete mode 100644 images/nginx-1.25/TAG
delete mode 100644 images/nginx-1.25/cloudbuild.yaml
delete mode 100644 images/nginx-1.25/rootfs/Dockerfile
delete mode 100755 images/nginx-1.25/rootfs/build.sh
rename images/{nginx-1.25 => nginx}/rootfs/patches/00_drop-alias-root.patch (100%)
rename images/{nginx-1.25 => nginx}/rootfs/patches/01_nginx-1.25.3-win32_max_err_str.patch (100%)
rename images/{nginx-1.25 => nginx}/rootfs/patches/02_nginx-1.25.3-stream_balancer_export.patch (100%)
rename images/{nginx-1.25 => nginx}/rootfs/patches/03_nginx-1.25.3-stream_proxy_get_next_upstream_tries.patch (100%)
rename images/{nginx-1.25 => nginx}/rootfs/patches/04_nginx-1.25.3-stream_proxy_timeout_fields.patch (100%)
rename images/{nginx-1.25 => nginx}/rootfs/patches/05_nginx-1.25.3-stream_ssl_preread_no_skip.patch (100%)
rename images/{nginx-1.25 => nginx}/rootfs/patches/06_nginx-1.25.3-resolver_conf_parsing.patch (100%)
rename images/{nginx-1.25 => nginx}/rootfs/patches/07_nginx-1.25.3-daemon_destroy_pool.patch (100%)
rename images/{nginx-1.25 => nginx}/rootfs/patches/08_nginx-1.25.3-init_cycle_pool_release.patch (100%)
rename images/{nginx-1.25 => nginx}/rootfs/patches/09_nginx-1.25.3-balancer_status_code.patch (100%)
rename images/{nginx-1.25 => nginx}/rootfs/patches/10_nginx-1.25.3-delayed_posted_events.patch (100%)
rename images/{nginx-1.25 => nginx}/rootfs/patches/11_nginx-1.25.3-privileged_agent_process.patch (100%)
rename images/{nginx-1.25 => nginx}/rootfs/patches/12_nginx-1.25.3-privileged_agent_process_connections.patch (100%)
rename images/{nginx-1.25 => nginx}/rootfs/patches/13_nginx-1.25.3-privileged_agent_process_thread_pool.patch (100%)
rename images/{nginx-1.25 => nginx}/rootfs/patches/14_nginx-1.25.3-single_process_graceful_exit.patch (100%)
rename images/{nginx-1.25 => nginx}/rootfs/patches/15_nginx-1.25.3-intercept_error_log.patch (100%)
rename images/{nginx-1.25 => nginx}/rootfs/patches/16_nginx-1.25.3-upstream_pipelining.patch (100%)
rename images/{nginx-1.25 => nginx}/rootfs/patches/17_nginx-1.25.3-no_error_pages.patch (100%)
rename images/{nginx-1.25 => nginx}/rootfs/patches/18_nginx-1.25.3-no_Werror.patch (100%)
rename images/{nginx-1.25 => nginx}/rootfs/patches/19_nginx-1.25.3-log_escape_non_ascii.patch (100%)
rename images/{nginx-1.25 => nginx}/rootfs/patches/20_nginx-1.25.3-proxy_host_port_vars.patch (100%)
rename images/{nginx-1.25 => nginx}/rootfs/patches/21_nginx-1.25.3-cache_manager_exit.patch (100%)
rename images/{nginx-1.25 => nginx}/rootfs/patches/22_nginx-1.25.3-larger_max_error_str.patch (100%)
rename images/{nginx-1.25 => nginx}/rootfs/patches/23_nginx-1.25.3-pcre_conf_opt.patch (100%)
rename images/{nginx-1.25 => nginx}/rootfs/patches/24_nginx-1.25.3-always_enable_cc_feature_tests.patch (100%)
rename images/{nginx-1.25 => nginx}/rootfs/patches/25_nginx-1.25.3-ssl_cert_cb_yield.patch (100%)
rename images/{nginx-1.25 => nginx}/rootfs/patches/26_nginx-1.25.3-ssl_sess_cb_yield.patch (100%)
rename images/{nginx-1.25 => nginx}/rootfs/patches/27_nginx-1.25.3-ssl_client_hello_cb_yield.patch (100%)
rename images/{nginx-1.25 => nginx}/rootfs/patches/28_nginx-1.25.3-upstream_timeout_fields.patch (100%)
rename images/{nginx-1.25 => nginx}/rootfs/patches/29_nginx-1.25.3-safe_resolver_ipv6_option.patch (100%)
rename images/{nginx-1.25 => nginx}/rootfs/patches/30_nginx-1.25.3-socket_cloexec.patch (100%)
rename images/{nginx-1.25 => nginx}/rootfs/patches/31_nginx-1.25.3-reuseport_close_unused_fds.patch (100%)
delete mode 100644 images/nginx/rootfs/patches/drop-alias-root.patch
delete mode 100644 images/nginx/rootfs/patches/nginx-1.21.4-balancer_status_code.patch
delete mode 100644 images/nginx/rootfs/patches/nginx-1.21.4-cache_manager_exit.patch
delete mode 100644 images/nginx/rootfs/patches/nginx-1.21.4-delayed_posted_events.patch
delete mode 100644 images/nginx/rootfs/patches/nginx-1.21.4-hash_overflow.patch
delete mode 100644 images/nginx/rootfs/patches/nginx-1.21.4-http2.patch
delete mode 100644 images/nginx/rootfs/patches/nginx-1.21.4-init_cycle_pool_release.patch
delete mode 100644 images/nginx/rootfs/patches/nginx-1.21.4-larger_max_error_str.patch
delete mode 100644 images/nginx/rootfs/patches/nginx-1.21.4-no_Werror.patch
delete mode 100644 images/nginx/rootfs/patches/nginx-1.21.4-proxy_host_port_vars.patch
delete mode 100644 images/nginx/rootfs/patches/nginx-1.21.4-resolver_conf_parsing.patch
delete mode 100644 images/nginx/rootfs/patches/nginx-1.21.4-reuseport_close_unused_fds.patch
delete mode 100644 images/nginx/rootfs/patches/nginx-1.21.4-single_process_graceful_exit.patch
delete mode 100644 images/nginx/rootfs/patches/nginx-1.21.4-socket_cloexec.patch
delete mode 100644 images/nginx/rootfs/patches/nginx-1.21.4-ssl_cert_cb_yield.patch
delete mode 100644 images/nginx/rootfs/patches/nginx-1.21.4-ssl_sess_cb_yield.patch
delete mode 100644 images/nginx/rootfs/patches/nginx-1.21.4-stream_proxy_get_next_upstream_tries.patch
delete mode 100644 images/nginx/rootfs/patches/nginx-1.21.4-stream_ssl_preread_no_skip.patch
delete mode 100644 images/nginx/rootfs/patches/nginx-1.21.4-upstream_pipelining.patch
delete mode 100644 images/nginx/rootfs/patches/nginx-1.21.4-upstream_timeout_fields.patch
diff --git a/.github/workflows/ci.yaml b/.github/workflows/ci.yaml
index 56a28f3d0..526acfb2f 100644
--- a/.github/workflows/ci.yaml
+++ b/.github/workflows/ci.yaml
@@ -9,7 +9,7 @@ on:
- 'deploy/**'
- '**.md'
- 'images/**' # Images changes should be tested on their own workflow
- - '!images/nginx-1.25/**'
+ - '!images/nginx/**'
push:
branches:
@@ -68,7 +68,7 @@ jobs:
- 'NGINX_BASE'
baseimage:
- 'NGINX_BASE'
- - 'images/nginx-1.25/**'
+ - 'images/nginx/**'
docs:
- '**/*.md'
lua:
@@ -180,8 +180,8 @@ jobs:
if: |
needs.changes.outputs.baseimage == 'true'
run: |
- export TAG=$(cat images/nginx-1.25/TAG)
- cd images/nginx-1.25/rootfs && docker buildx build --platform=${{ env.PLATFORMS }} --load -t registry.k8s.io/ingress-nginx/nginx-1.25:${TAG} .
+ export TAG=$(cat images/nginx/TAG)
+ cd images/nginx/rootfs && docker buildx build --platform=${{ env.PLATFORMS }} --load -t registry.k8s.io/ingress-nginx/nginx:${TAG} .
- name: Build images
env:
@@ -190,8 +190,8 @@ jobs:
REGISTRY: ingress-controller
run: |
echo "building images..."
- export TAGNGINX=$(cat images/nginx-1.25/TAG)
- make BASE_IMAGE=registry.k8s.io/ingress-nginx/nginx-1.25:${TAGNGINX} clean-image build image image-chroot
+ export TAGNGINX=$(cat images/nginx/TAG)
+ make BASE_IMAGE=registry.k8s.io/ingress-nginx/nginx:${TAGNGINX} clean-image build image image-chroot
make -C test/e2e-image image
echo "creating images cache..."
diff --git a/.github/workflows/images.yaml b/.github/workflows/images.yaml
index 5dd089e59..85ad0aa88 100644
--- a/.github/workflows/images.yaml
+++ b/.github/workflows/images.yaml
@@ -36,7 +36,6 @@ jobs:
kube-webhook-certgen: ${{ steps.filter.outputs.kube-webhook-certgen }}
ext-auth-example-authsvc: ${{ steps.filter.outputs.ext-auth-example-authsvc }}
nginx: ${{ steps.filter.outputs.nginx }}
- nginx125: ${{ steps.filter.outputs.nginx125 }}
steps:
- name: Checkout
@@ -64,8 +63,6 @@ jobs:
- 'images/ext-auth-example-authsvc/**'
nginx:
- 'images/nginx/**'
- nginx125:
- - 'images/nginx-1.25/TAG'
#### TODO: Make the below jobs 'less dumb' and use the job name as parameter (the github.job context does not work here)
cfssl:
@@ -163,14 +160,14 @@ jobs:
run: |
cd images/ && make NAME=kube-webhook-certgen test test-e2e
- nginx125:
+ nginx:
permissions:
contents: write
packages: write
runs-on: ubuntu-latest
needs: changes
if: |
- (github.event_name == 'push' && github.ref == 'refs/heads/main' && needs.changes.outputs.nginx125 == 'true')
+ (github.event_name == 'push' && github.ref == 'refs/heads/main' && needs.changes.outputs.nginx == 'true')
env:
PLATFORMS: linux/amd64,linux/arm,linux/arm64,linux/s390x
steps:
@@ -191,5 +188,5 @@ jobs:
password: ${{ secrets.DOCKERHUB_TOKEN }}
- name: build-image
run: |
- export TAG=$(cat images/nginx-1.25/TAG)
- cd images/nginx-1.25/rootfs && docker buildx build --platform=${{ env.PLATFORMS }} --push -t ingressnginx/nginx-1.25:${TAG} .
+ export TAG=$(cat images/nginx/TAG)
+ cd images/nginx/rootfs && docker buildx build --platform=${{ env.PLATFORMS }} --push -t ingressnginx/nginx:${TAG} .
diff --git a/images/nginx-1.25/Makefile b/images/nginx-1.25/Makefile
deleted file mode 100644
index cdd3e2a3c..000000000
--- a/images/nginx-1.25/Makefile
+++ /dev/null
@@ -1,59 +0,0 @@
-# Copyright 2024 The Kubernetes Authors. All rights reserved.
-#
-# Licensed under the Apache License, Version 2.0 (the "License");
-# you may not use this file except in compliance with the License.
-# You may obtain a copy of the License at
-#
-# http://www.apache.org/licenses/LICENSE-2.0
-#
-# Unless required by applicable law or agreed to in writing, software
-# distributed under the License is distributed on an "AS IS" BASIS,
-# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-# See the License for the specific language governing permissions and
-# limitations under the License.
-
-.DEFAULT_GOAL:=build
-
-# set default shell
-SHELL=/bin/bash -o pipefail -o errexit
-
-DIR:=$(strip $(shell dirname $(realpath $(lastword $(MAKEFILE_LIST)))))
-INIT_BUILDX=$(DIR)/../../hack/init-buildx.sh
-
-# 0.0.0 shouldn't clobber any released builds
-SHORT_SHA ?=$(shell git rev-parse --short HEAD)
-TAG ?=$(shell cat TAG)
-
-REGISTRY ?= gcr.io/k8s-staging-ingress-nginx
-
-IMAGE = $(REGISTRY)/nginx-1.25
-
-# required to enable buildx
-export DOCKER_CLI_EXPERIMENTAL=enabled
-
-# build with buildx
-PLATFORMS?=linux/amd64,linux/arm,linux/arm64,linux/s390x
-OUTPUT=
-PROGRESS=plain
-build: ensure-buildx
- docker buildx build \
- --platform=${PLATFORMS} $(OUTPUT) \
- --progress=$(PROGRESS) \
- --pull \
- --tag $(IMAGE):$(TAG) rootfs
-
-# push the cross built image
-push: OUTPUT=--push
-push: build
-
-# enable buildx
-ensure-buildx:
-# this is required for cloudbuild
-ifeq ("$(wildcard $(INIT_BUILDX))","")
- @curl -sSL https://raw.githubusercontent.com/kubernetes/ingress-nginx/main/hack/init-buildx.sh | bash
-else
- @exec $(INIT_BUILDX)
-endif
- @echo "done"
-
-.PHONY: build push ensure-buildx
\ No newline at end of file
diff --git a/images/nginx-1.25/README.md b/images/nginx-1.25/README.md
deleted file mode 100644
index 35cccc100..000000000
--- a/images/nginx-1.25/README.md
+++ /dev/null
@@ -1,47 +0,0 @@
-NGINX 1.25 base image
-
-### HTTP/3 Support
-
-**HTTP/3 support is experimental and under development**
-
-[HTTP/3](https://datatracker.ietf.org/doc/html/rfc9114)\
-[QUIC](https://datatracker.ietf.org/doc/html/rfc9000)
-
-[According to the documentation, NGINX 1.25.0 or higher supports HTTP/3:](https://nginx.org/en/docs/quic.html)
-
-> Support for QUIC and HTTP/3 protocols is available since 1.25.0.
-
-But this requires adding a new flag during the build:
-
-> When configuring nginx, it is possible to enable QUIC and HTTP/3 using the --with-http_v3_module configuration parameter.
-
-[We have added this flag](https://github.com/kubernetes/ingress-nginx/pull/11470), but it is not enough to use HTTP/3 in ingress-nginx, this is the first step.
-
-The next steps will be:
-
-1. **Waiting for OpenSSL 3.4.**\
- The main problem is, that we still use OpenSSL (3.x) and it does not support the important mechanism of TLS 1.3 - [early_data](https://datatracker.ietf.org/doc/html/rfc8446#section-2.3):
-
- > Otherwise, the OpenSSL compatibility layer will be used that does not support early data.
-
- [And although another part of the documentation says that the directive is supported with OpenSSL:](https://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_early_data)
-
- > The directive is supported when using OpenSSL 1.1.1 or higher.
-
- But this is incomplete support, because OpenSSL does not support this feature, and [it has only client side support:](https://github.com/openssl/openssl)
-
- > ... the QUIC (currently client side only) version 1 protocol
-
- [And also there are some issues even with client side](https://github.com/openssl/openssl/discussions/23339)
-
- Due to this, we currently have incomplete HTTP/3 support, without important security and performance features.\
- But the good news is that [OpenSSL plans to add server-side support in 3.4](https://github.com/openssl/web/blob/master/roadmap.md):
-
- > Server-side QUIC support
-
- [Overview of SSL libraries(HAProxy Documentation)](https://github.com/haproxy/wiki/wiki/SSL-Libraries-Support-Status#tldr)
-
-2. **Adding [parameters](https://nginx.org/en/docs/http/ngx_http_v3_module.html) to the configmap to configure HTTP/3 and quic(enableHTTP3, enableHTTP/0.9, maxCurrentStream, and so on).**
-3. **Adding options to the nginx config template(`listen 443 quic` to server blocks and `add_header Alt-Svc 'h3=":8443"; ma=86400';` to location blocks).**
-4. **Opening the https port for UDP in the container(because QUIC uses UDP).**
-5. **Adding tests.**
diff --git a/images/nginx-1.25/TAG b/images/nginx-1.25/TAG
deleted file mode 100644
index f25246219..000000000
--- a/images/nginx-1.25/TAG
+++ /dev/null
@@ -1 +0,0 @@
-v0.0.12
diff --git a/images/nginx-1.25/cloudbuild.yaml b/images/nginx-1.25/cloudbuild.yaml
deleted file mode 100644
index d8bb1f2a9..000000000
--- a/images/nginx-1.25/cloudbuild.yaml
+++ /dev/null
@@ -1,14 +0,0 @@
-options:
- # Increase machine type for multi-arch builds.
- machineType: E2_HIGHCPU_32
- # Ignore Prow provided substitutions.
- substitution_option: ALLOW_LOOSE
-steps:
- - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
- env:
- - REGISTRY=gcr.io/k8s-staging-ingress-nginx
- entrypoint: bash
- args:
- - -c
- - gcloud auth configure-docker && cd images/nginx-1.25 && make push
-timeout: 7200s
diff --git a/images/nginx-1.25/rootfs/Dockerfile b/images/nginx-1.25/rootfs/Dockerfile
deleted file mode 100644
index 1d2b6b623..000000000
--- a/images/nginx-1.25/rootfs/Dockerfile
+++ /dev/null
@@ -1,74 +0,0 @@
-# Copyright 2024 The Kubernetes Authors. All rights reserved.
-#
-# Licensed under the Apache License, Version 2.0 (the "License");
-# you may not use this file except in compliance with the License.
-# You may obtain a copy of the License at
-#
-# http://www.apache.org/licenses/LICENSE-2.0
-#
-# Unless required by applicable law or agreed to in writing, software
-# distributed under the License is distributed on an "AS IS" BASIS,
-# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-# See the License for the specific language governing permissions and
-# limitations under the License.
-FROM alpine:3.20 as builder
-
-COPY . /
-
-RUN apk update \
- && apk upgrade \
- && apk add -U bash --no-cache \
- && /build.sh
-
-# Use a multi-stage build
-FROM alpine:3.20
-
-ENV PATH=$PATH:/usr/local/luajit/bin:/usr/local/nginx/sbin:/usr/local/nginx/bin
-
-ENV LUA_PATH="/usr/local/share/luajit-2.1.0-beta3/?.lua;/usr/local/share/lua/5.1/?.lua;/usr/local/lib/lua/?.lua;;"
-ENV LUA_CPATH="/usr/local/lib/lua/?/?.so;/usr/local/lib/lua/?.so;;"
-
-COPY --from=builder /usr/local /usr/local
-COPY --from=builder /usr/lib/libopentelemetry* /usr/local/lib
-COPY --from=builder /opt /opt
-COPY --from=builder /etc/nginx /etc/nginx
-
-RUN apk update \
- && apk upgrade \
- && apk add -U --no-cache \
- bash \
- openssl \
- pcre \
- zlib \
- ca-certificates \
- patch \
- yajl \
- lmdb \
- libxml2 \
- libmaxminddb \
- yaml-cpp \
- dumb-init \
- tzdata \
- grpc-cpp \
- libprotobuf \
- && ln -s /usr/local/nginx/sbin/nginx /sbin/nginx \
- && adduser -S -D -H -u 101 -h /usr/local/nginx \
- -s /sbin/nologin -G www-data -g www-data www-data \
- && bash -eu -c ' \
- writeDirs=( \
- /var/log/nginx \
- /var/lib/nginx/body \
- /var/lib/nginx/fastcgi \
- /var/lib/nginx/proxy \
- /var/lib/nginx/scgi \
- /var/lib/nginx/uwsgi \
- /var/log/audit \
- ); \
- for dir in "${writeDirs[@]}"; do \
- mkdir -p ${dir}; \
- chown -R www-data.www-data ${dir}; \
- done'
-
-EXPOSE 80 443
-
-CMD ["nginx", "-g", "daemon off;"]
diff --git a/images/nginx-1.25/rootfs/build.sh b/images/nginx-1.25/rootfs/build.sh
deleted file mode 100755
index 3baf775fc..000000000
--- a/images/nginx-1.25/rootfs/build.sh
+++ /dev/null
@@ -1,619 +0,0 @@
-#!/bin/bash
-
-# Copyright 2023 The Kubernetes Authors.
-#
-# Licensed under the Apache License, Version 2.0 (the "License");
-# you may not use this file except in compliance with the License.
-# You may obtain a copy of the License at
-#
-# http://www.apache.org/licenses/LICENSE-2.0
-#
-# Unless required by applicable law or agreed to in writing, software
-# distributed under the License is distributed on an "AS IS" BASIS,
-# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-# See the License for the specific language governing permissions and
-# limitations under the License.
-
-set -o errexit
-set -o nounset
-set -o pipefail
-
-export NGINX_VERSION=1.25.5
-
-# Check for recent changes: https://github.com/vision5/ngx_devel_kit/compare/v0.3.3...master
-export NDK_VERSION=v0.3.3
-
-# Check for recent changes: https://github.com/openresty/set-misc-nginx-module/compare/v0.33...master
-export SETMISC_VERSION=796f5a3e518748eb29a93bd450324e0ad45b704e
-
-# Check for recent changes: https://github.com/openresty/headers-more-nginx-module/compare/v0.37...master
-export MORE_HEADERS_VERSION=v0.37
-
-# Check for recent changes: https://github.com/atomx/nginx-http-auth-digest/compare/v1.0.0...atomx:master
-export NGINX_DIGEST_AUTH=v1.0.0
-
-# Check for recent changes: https://github.com/yaoweibin/ngx_http_substitutions_filter_module/compare/v0.6.4...master
-export NGINX_SUBSTITUTIONS=e12e965ac1837ca709709f9a26f572a54d83430e
-
-# Check for recent changes: https://github.com/SpiderLabs/ModSecurity-nginx/compare/v1.0.3...master
-export MODSECURITY_VERSION=v1.0.3
-
-# Check for recent changes: https://github.com/SpiderLabs/ModSecurity/compare/v3.0.8...v3/master
-export MODSECURITY_LIB_VERSION=v3.0.12
-
-# Check for recent changes: https://github.com/coreruleset/coreruleset/compare/v3.3.5...v4.0/main
-export OWASP_MODSECURITY_CRS_VERSION=v4.4.0
-
-# Check for recent changes: https://github.com/openresty/lua-nginx-module/compare/v0.10.26``...master
-export LUA_NGX_VERSION=v0.10.26
-
-# Check for recent changes: https://github.com/openresty/stream-lua-nginx-module/compare/bea8a0c0de94cede71554f53818ac0267d675d63...master
-export LUA_STREAM_NGX_VERSION=bea8a0c0de94cede71554f53818ac0267d675d63
-
-# Check for recent changes: https://github.com/openresty/lua-upstream-nginx-module/compare/8aa93ead98ba2060d4efd594ae33a35d153589bf...master
-export LUA_UPSTREAM_VERSION=542be0893543a4e42d89f6dd85372972f5ff2a36
-
-# Check for recent changes: https://github.com/openresty/lua-cjson/compare/2.1.0.13...openresty:master
-export LUA_CJSON_VERSION=2.1.0.13
-
-# Check for recent changes: https://github.com/leev/ngx_http_geoip2_module/compare/a607a41a8115fecfc05b5c283c81532a3d605425...master
-export GEOIP2_VERSION=a607a41a8115fecfc05b5c283c81532a3d605425
-
-# Check for recent changes: https://github.com/openresty/luajit2/compare/v2.1-20240314...v2.1-agentzh
-export LUAJIT_VERSION=v2.1-20240314
-
-# Check for recent changes: https://github.com/openresty/lua-resty-balancer/compare/1cd4363c0a239afe4765ec607dcfbbb4e5900eea...master
-export LUA_RESTY_BALANCER=1cd4363c0a239afe4765ec607dcfbbb4e5900eea
-
-# Check for recent changes: https://github.com/openresty/lua-resty-lrucache/compare/99e7578465b40f36f596d099b82eab404f2b42ed...master
-export LUA_RESTY_CACHE=99e7578465b40f36f596d099b82eab404f2b42ed
-
-# Check for recent changes: https://github.com/openresty/lua-resty-core/compare/v0.1.27...master
-export LUA_RESTY_CORE=v0.1.28
-
-# Check for recent changes: https://github.com/cloudflare/lua-resty-cookie/compare/f418d77082eaef48331302e84330488fdc810ef4...master
-export LUA_RESTY_COOKIE_VERSION=f418d77082eaef48331302e84330488fdc810ef4
-
-# Check for recent changes: https://github.com/openresty/lua-resty-dns/compare/8bb53516e2933e61c317db740a9b7c2048847c2f...master
-export LUA_RESTY_DNS=8bb53516e2933e61c317db740a9b7c2048847c2f
-
-# Check for recent changes: https://github.com/ledgetech/lua-resty-http/compare/v0.17.1...master
-export LUA_RESTY_HTTP=v0.17.1
-
-# Check for recent changes: https://github.com/openresty/lua-resty-lock/compare/v0.09...master
-export LUA_RESTY_LOCK=405d0bf4cbfa74d742c6ed3158d442221e6212a9
-
-# Check for recent changes: https://github.com/openresty/lua-resty-upload/compare/v0.11...master
-export LUA_RESTY_UPLOAD_VERSION=979372cce011f3176af3c9aff53fd0e992c4bfd3
-
-# Check for recent changes: https://github.com/openresty/lua-resty-string/compare/v0.15...master
-export LUA_RESTY_STRING_VERSION=6f1bc21d86daef804df3cc34d6427ef68da26844
-
-# Check for recent changes: https://github.com/openresty/lua-resty-memcached/compare/v0.17...master
-export LUA_RESTY_MEMCACHED_VERSION=2f02b68bf65fa2332cce070674a93a69a6c7239b
-
-# Check for recent changes: https://github.com/openresty/lua-resty-redis/compare/v0.30...master
-export LUA_RESTY_REDIS_VERSION=8641b9f1b6f75cca50c90cf8ca5c502ad8950aa8
-
-# Check for recent changes: https://github.com/api7/lua-resty-ipmatcher/compare/v0.6.1...master
-export LUA_RESTY_IPMATCHER_VERSION=3e93c53eb8c9884efe939ef070486a0e507cc5be
-
-# Check for recent changes: https://github.com/microsoft/mimalloc/compare/v2.1.7...master
-export MIMALOC_VERSION=v2.1.7
-
-# Check on https://github.com/open-telemetry/opentelemetry-cpp
-export OPENTELEMETRY_CPP_VERSION="v1.11.0"
-# Check on https://github.com/open-telemetry/opentelemetry-proto
-export OPENTELEMETRY_PROTO_VERSION="v1.1.0"
-
-export BUILD_PATH=/tmp/build
-
-ARCH=$(uname -m)
-
-get_src()
-{
- hash="$1"
- url="$2"
- dest="${3-}"
- ARGS=""
- f=$(basename "$url")
-
- echo "Downloading $url"
-
- curl -sSL "$url" -o "$f"
- # TODO: Reenable checksum verification but make it smarter
- # echo "$hash $f" | sha256sum -c - || exit 10
- if [ ! -z "$dest" ]; then
- mkdir ${BUILD_PATH}/${dest}
- ARGS="-C ${BUILD_PATH}/${dest} --strip-components=1"
- fi
- tar xvzf "$f" $ARGS
- rm -rf "$f"
-}
-
-# install required packages to build
-# Dependencies from "ninja" and below are OTEL dependencies
-apk add \
- bash \
- gcc \
- clang \
- libc-dev \
- make \
- automake \
- openssl-dev \
- pcre-dev \
- zlib-dev \
- linux-headers \
- libxslt-dev \
- gd-dev \
- perl-dev \
- libedit-dev \
- mercurial \
- alpine-sdk \
- findutils \
- curl \
- ca-certificates \
- patch \
- libaio-dev \
- openssl \
- cmake \
- util-linux \
- lmdb-tools \
- wget \
- curl-dev \
- libprotobuf \
- git g++ pkgconf flex bison doxygen yajl-dev lmdb-dev libtool autoconf libxml2 libxml2-dev \
- python3 \
- libmaxminddb-dev \
- bc \
- unzip \
- dos2unix \
- yaml-cpp \
- coreutils \
- ninja \
- gtest-dev \
- git \
- build-base \
- pkgconfig \
- c-ares-dev \
- re2-dev \
- grpc-dev \
- protobuf-dev
-
-# apk add -X http://dl-cdn.alpinelinux.org/alpine/edge/testing opentelemetry-cpp-dev
-
-# There is some bug with some platforms and git, so force HTTP/1.1
-git config --global http.version HTTP/1.1
-git config --global http.postBuffer 157286400
-
-mkdir -p /etc/nginx
-
-mkdir --verbose -p "$BUILD_PATH"
-cd "$BUILD_PATH"
-
-# download, verify and extract the source files
-get_src 66dc7081488811e9f925719e34d1b4504c2801c81dee2920e5452a86b11405ae \
- "https://nginx.org/download/nginx-$NGINX_VERSION.tar.gz"
-
-get_src aa961eafb8317e0eb8da37eb6e2c9ff42267edd18b56947384e719b85188f58b \
- "https://github.com/vision5/ngx_devel_kit/archive/$NDK_VERSION.tar.gz" "ngx_devel_kit"
-
-get_src abc123 \
- "https://github.com/open-telemetry/opentelemetry-cpp/archive/$OPENTELEMETRY_CPP_VERSION.tar.gz" "opentelemetry-cpp"
-
-get_src abc123 \
- "https://github.com/open-telemetry/opentelemetry-proto/archive/$OPENTELEMETRY_PROTO_VERSION.tar.gz" "opentelemetry-proto"
-
-get_src cd5e2cc834bcfa30149e7511f2b5a2183baf0b70dc091af717a89a64e44a2985 \
- "https://github.com/openresty/set-misc-nginx-module/archive/$SETMISC_VERSION.tar.gz" "set-misc-nginx-module"
-
-get_src 0c0d2ced2ce895b3f45eb2b230cd90508ab2a773299f153de14a43e44c1209b3 \
- "https://github.com/openresty/headers-more-nginx-module/archive/$MORE_HEADERS_VERSION.tar.gz" "headers-more-nginx-module"
-
-get_src f09851e6309560a8ff3e901548405066c83f1f6ff88aa7171e0763bd9514762b \
- "https://github.com/atomx/nginx-http-auth-digest/archive/$NGINX_DIGEST_AUTH.tar.gz" "nginx-http-auth-digest"
-
-get_src a98b48947359166326d58700ccdc27256d2648218072da138ab6b47de47fbd8f \
- "https://github.com/yaoweibin/ngx_http_substitutions_filter_module/archive/$NGINX_SUBSTITUTIONS.tar.gz" "ngx_http_substitutions_filter_module"
-
-get_src 32a42256616cc674dca24c8654397390adff15b888b77eb74e0687f023c8751b \
- "https://github.com/SpiderLabs/ModSecurity-nginx/archive/$MODSECURITY_VERSION.tar.gz" "ModSecurity-nginx"
-
-get_src bc764db42830aeaf74755754b900253c233ad57498debe7a441cee2c6f4b07c2 \
- "https://github.com/openresty/lua-nginx-module/archive/$LUA_NGX_VERSION.tar.gz" "lua-nginx-module"
-
-get_src 01b715754a8248cc7228e0c8f97f7488ae429d90208de0481394e35d24cef32f \
- "https://github.com/openresty/stream-lua-nginx-module/archive/$LUA_STREAM_NGX_VERSION.tar.gz" "stream-lua-nginx-module"
-
-get_src a92c9ee6682567605ece55d4eed5d1d54446ba6fba748cff0a2482aea5713d5f \
- "https://github.com/openresty/lua-upstream-nginx-module/archive/$LUA_UPSTREAM_VERSION.tar.gz" "lua-upstream-nginx-module"
-
-get_src 77bbcbb24c3c78f51560017288f3118d995fe71240aa379f5818ff6b166712ff \
- "https://github.com/openresty/luajit2/archive/$LUAJIT_VERSION.tar.gz" "luajit2"
-
-get_src b6c9c09fd43eb34a71e706ad780b2ead26549a9a9f59280fe558f5b7b980b7c6 \
- "https://github.com/leev/ngx_http_geoip2_module/archive/$GEOIP2_VERSION.tar.gz" "ngx_http_geoip2_module"
-
-get_src deb4ab1ffb9f3d962c4b4a2c4bdff692b86a209e3835ae71ebdf3b97189e40a9 \
- "https://github.com/openresty/lua-resty-upload/archive/$LUA_RESTY_UPLOAD_VERSION.tar.gz" "lua-resty-upload"
-
-get_src bdbf271003d95aa91cab0a92f24dca129e99b33f79c13ebfcdbbcbb558129491 \
- "https://github.com/openresty/lua-resty-string/archive/$LUA_RESTY_STRING_VERSION.tar.gz" "lua-resty-string"
-
-get_src 16d72ed133f0c6df376a327386c3ef4e9406cf51003a700737c3805770ade7c5 \
- "https://github.com/openresty/lua-resty-balancer/archive/$LUA_RESTY_BALANCER.tar.gz" "lua-resty-balancer"
-
-get_src 39baab9e2b31cc48cecf896cea40ef6e80559054fd8a6e440cc804a858ea84d4 \
- "https://github.com/openresty/lua-resty-core/archive/$LUA_RESTY_CORE.tar.gz" "lua-resty-core"
-
-get_src a77b9de160d81712f2f442e1de8b78a5a7ef0d08f13430ff619f79235db974d4 \
- "https://github.com/openresty/lua-cjson/archive/$LUA_CJSON_VERSION.tar.gz" "lua-cjson"
-
-get_src 5ed48c36231e2622b001308622d46a0077525ac2f751e8cc0c9905914254baa4 \
- "https://github.com/cloudflare/lua-resty-cookie/archive/$LUA_RESTY_COOKIE_VERSION.tar.gz" "lua-resty-cookie"
-
-get_src 573184006b98ccee2594b0d134fa4d05e5d2afd5141cbad315051ccf7e9b6403 \
- "https://github.com/openresty/lua-resty-lrucache/archive/$LUA_RESTY_CACHE.tar.gz" "lua-resty-lrucache"
-
-get_src b4ddcd47db347e9adf5c1e1491a6279a6ae2a3aff3155ef77ea0a65c998a69c1 \
- "https://github.com/openresty/lua-resty-lock/archive/$LUA_RESTY_LOCK.tar.gz" "lua-resty-lock"
-
-get_src 70e9a01eb32ccade0d5116a25bcffde0445b94ad35035ce06b94ccd260ad1bf0 \
- "https://github.com/openresty/lua-resty-dns/archive/$LUA_RESTY_DNS.tar.gz" "lua-resty-dns"
-
-get_src 9fcb6db95bc37b6fce77d3b3dc740d593f9d90dce0369b405eb04844d56ac43f \
- "https://github.com/ledgetech/lua-resty-http/archive/$LUA_RESTY_HTTP.tar.gz" "lua-resty-http"
-
-get_src 02733575c4aed15f6cab662378e4b071c0a4a4d07940c4ef19a7319e9be943d4 \
- "https://github.com/openresty/lua-resty-memcached/archive/$LUA_RESTY_MEMCACHED_VERSION.tar.gz" "lua-resty-memcached"
-
-get_src c15aed1a01c88a3a6387d9af67a957dff670357f5fdb4ee182beb44635eef3f1 \
- "https://github.com/openresty/lua-resty-redis/archive/$LUA_RESTY_REDIS_VERSION.tar.gz" "lua-resty-redis"
-
-get_src efb767487ea3f6031577b9b224467ddbda2ad51a41c5867a47582d4ad85d609e \
- "https://github.com/api7/lua-resty-ipmatcher/archive/$LUA_RESTY_IPMATCHER_VERSION.tar.gz" "lua-resty-ipmatcher"
-
-get_src d74f86ada2329016068bc5a243268f1f555edd620b6a7d6ce89295e7d6cf18da \
- "https://github.com/microsoft/mimalloc/archive/${MIMALOC_VERSION}.tar.gz" "mimalloc"
-
-# improve compilation times
-CORES=$(($(grep -c ^processor /proc/cpuinfo) - 1))
-
-export MAKEFLAGS=-j${CORES}
-export CTEST_BUILD_FLAGS=${MAKEFLAGS}
-
-# Install luajit from openresty fork
-export LUAJIT_LIB=/usr/local/lib
-export LUA_LIB_DIR="$LUAJIT_LIB/lua"
-export LUAJIT_INC=/usr/local/include/luajit-2.1
-
-cd "$BUILD_PATH/luajit2"
-make CCDEBUG=-g
-make install
-
-ln -s /usr/local/bin/luajit /usr/local/bin/lua
-ln -s "$LUAJIT_INC" /usr/local/include/lua
-
-cd "$BUILD_PATH/opentelemetry-cpp"
-export CXXFLAGS="-DBENCHMARK_HAS_NO_INLINE_ASSEMBLY"
-cmake -B build -G Ninja -Wno-dev \
- -DOTELCPP_PROTO_PATH="${BUILD_PATH}/opentelemetry-proto/" \
- -DCMAKE_INSTALL_PREFIX=/usr \
- -DBUILD_SHARED_LIBS=ON \
- -DBUILD_TESTING="OFF" \
- -DBUILD_W3CTRACECONTEXT_TEST="OFF" \
- -DCMAKE_BUILD_TYPE=None \
- -DWITH_ABSEIL=ON \
- -DWITH_STL=ON \
- -DWITH_EXAMPLES=OFF \
- -DWITH_ZPAGES=OFF \
- -DWITH_OTLP_GRPC=ON \
- -DWITH_OTLP_HTTP=ON \
- -DWITH_ZIPKIN=ON \
- -DWITH_PROMETHEUS=OFF \
- -DWITH_ASYNC_EXPORT_PREVIEW=OFF \
- -DWITH_METRICS_EXEMPLAR_PREVIEW=OFF
- cmake --build build
- cmake --install build
-
-# Git tuning
-git config --global --add core.compression -1
-
-# Get Brotli source and deps
-cd "$BUILD_PATH"
-git clone --depth=100 https://github.com/google/ngx_brotli.git
-cd ngx_brotli
-# https://github.com/google/ngx_brotli/issues/156
-git reset --hard 63ca02abdcf79c9e788d2eedcc388d2335902e52
-git submodule init
-git submodule update
-
-cd "$BUILD_PATH"
-git clone --depth=1 https://github.com/ssdeep-project/ssdeep
-cd ssdeep/
-
-./bootstrap
-./configure
-
-make
-make install
-
-# build modsecurity library
-cd "$BUILD_PATH"
-git clone -n https://github.com/SpiderLabs/ModSecurity
-cd ModSecurity/
-git checkout $MODSECURITY_LIB_VERSION
-git submodule init
-git submodule update
-
-sh build.sh
-
-# https://github.com/SpiderLabs/ModSecurity/issues/1909#issuecomment-465926762
-sed -i '115i LUA_CFLAGS="${LUA_CFLAGS} -DWITH_LUA_JIT_2_1"' build/lua.m4
-sed -i '117i AC_SUBST(LUA_CFLAGS)' build/lua.m4
-
-./configure \
- --disable-doxygen-doc \
- --disable-doxygen-html \
- --disable-examples
-
-make
-make install
-
-mkdir -p /etc/nginx/modsecurity
-cp modsecurity.conf-recommended /etc/nginx/modsecurity/modsecurity.conf
-cp unicode.mapping /etc/nginx/modsecurity/unicode.mapping
-
-# Replace serial logging with concurrent
-sed -i 's|SecAuditLogType Serial|SecAuditLogType Concurrent|g' /etc/nginx/modsecurity/modsecurity.conf
-
-# Concurrent logging implies the log is stored in several files
-echo "SecAuditLogStorageDir /var/log/audit/" >> /etc/nginx/modsecurity/modsecurity.conf
-
-# Download owasp modsecurity crs
-cd /etc/nginx/
-
-git clone -b $OWASP_MODSECURITY_CRS_VERSION https://github.com/coreruleset/coreruleset
-mv coreruleset owasp-modsecurity-crs
-cd owasp-modsecurity-crs
-
-mv crs-setup.conf.example crs-setup.conf
-mv rules/REQUEST-900-EXCLUSION-RULES-BEFORE-CRS.conf.example rules/REQUEST-900-EXCLUSION-RULES-BEFORE-CRS.conf
-mv rules/RESPONSE-999-EXCLUSION-RULES-AFTER-CRS.conf.example rules/RESPONSE-999-EXCLUSION-RULES-AFTER-CRS.conf
-cd ..
-
-# OWASP CRS v4 rules
-echo "
-Include /etc/nginx/owasp-modsecurity-crs/crs-setup.conf
-Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-900-EXCLUSION-RULES-BEFORE-CRS.conf
-Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-901-INITIALIZATION.conf
-Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-905-COMMON-EXCEPTIONS.conf
-Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-911-METHOD-ENFORCEMENT.conf
-Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-913-SCANNER-DETECTION.conf
-Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf
-Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-921-PROTOCOL-ATTACK.conf
-Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-922-MULTIPART-ATTACK.conf
-Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf
-Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-931-APPLICATION-ATTACK-RFI.conf
-Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-932-APPLICATION-ATTACK-RCE.conf
-Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf
-Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-934-APPLICATION-ATTACK-GENERIC.conf
-Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-941-APPLICATION-ATTACK-XSS.conf
-Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf
-Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION.conf
-Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-944-APPLICATION-ATTACK-JAVA.conf
-Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-949-BLOCKING-EVALUATION.conf
-Include /etc/nginx/owasp-modsecurity-crs/rules/RESPONSE-950-DATA-LEAKAGES.conf
-Include /etc/nginx/owasp-modsecurity-crs/rules/RESPONSE-951-DATA-LEAKAGES-SQL.conf
-Include /etc/nginx/owasp-modsecurity-crs/rules/RESPONSE-952-DATA-LEAKAGES-JAVA.conf
-Include /etc/nginx/owasp-modsecurity-crs/rules/RESPONSE-953-DATA-LEAKAGES-PHP.conf
-Include /etc/nginx/owasp-modsecurity-crs/rules/RESPONSE-954-DATA-LEAKAGES-IIS.conf
-Include /etc/nginx/owasp-modsecurity-crs/rules/RESPONSE-955-WEB-SHELLS.conf
-Include /etc/nginx/owasp-modsecurity-crs/rules/RESPONSE-959-BLOCKING-EVALUATION.conf
-Include /etc/nginx/owasp-modsecurity-crs/rules/RESPONSE-980-CORRELATION.conf
-Include /etc/nginx/owasp-modsecurity-crs/rules/RESPONSE-999-EXCLUSION-RULES-AFTER-CRS.conf
-" > /etc/nginx/owasp-modsecurity-crs/nginx-modsecurity.conf
-
-# build nginx
-cd "$BUILD_PATH/nginx-$NGINX_VERSION"
-
-# apply nginx patches
-for PATCH in `ls /patches`;do
- echo "Patch: $PATCH"
- if [[ "$PATCH" == *.txt ]]; then
- patch -p0 < /patches/$PATCH
- else
- patch -p1 < /patches/$PATCH
- fi
-done
-
-WITH_FLAGS="--with-debug \
- --with-compat \
- --with-pcre-jit \
- --with-http_ssl_module \
- --with-http_stub_status_module \
- --with-http_realip_module \
- --with-http_auth_request_module \
- --with-http_addition_module \
- --with-http_gzip_static_module \
- --with-http_sub_module \
- --with-http_v2_module \
- --with-http_v3_module \
- --with-stream \
- --with-stream_ssl_module \
- --with-stream_realip_module \
- --with-stream_ssl_preread_module \
- --with-threads \
- --with-http_secure_link_module \
- --with-http_gunzip_module"
-
-# "Combining -flto with -g is currently experimental and expected to produce unexpected results."
-# https://gcc.gnu.org/onlinedocs/gcc/Optimize-Options.html
-CC_OPT="-g -O2 -fPIE -fstack-protector-strong \
- -Wformat \
- -Werror=format-security \
- -Wno-deprecated-declarations \
- -fno-strict-aliasing \
- -D_FORTIFY_SOURCE=2 \
- --param=ssp-buffer-size=4 \
- -DTCP_FASTOPEN=23 \
- -fPIC \
- -Wno-cast-function-type"
-
-LD_OPT="-fPIE -fPIC -pie -Wl,-z,relro -Wl,-z,now"
-
-if [[ ${ARCH} != "aarch64" ]]; then
- WITH_FLAGS+=" --with-file-aio"
-fi
-
-if [[ ${ARCH} == "x86_64" ]]; then
- CC_OPT+=' -m64 -mtune=generic'
-fi
-
-WITH_MODULES=" \
- --add-module=$BUILD_PATH/ngx_devel_kit \
- --add-module=$BUILD_PATH/set-misc-nginx-module \
- --add-module=$BUILD_PATH/headers-more-nginx-module \
- --add-module=$BUILD_PATH/ngx_http_substitutions_filter_module \
- --add-module=$BUILD_PATH/lua-nginx-module \
- --add-module=$BUILD_PATH/stream-lua-nginx-module \
- --add-module=$BUILD_PATH/lua-upstream-nginx-module \
- --add-dynamic-module=$BUILD_PATH/nginx-http-auth-digest \
- --add-dynamic-module=$BUILD_PATH/ModSecurity-nginx \
- --add-dynamic-module=$BUILD_PATH/ngx_http_geoip2_module \
- --add-dynamic-module=$BUILD_PATH/ngx_brotli"
-
-./configure \
- --prefix=/usr/local/nginx \
- --conf-path=/etc/nginx/nginx.conf \
- --modules-path=/etc/nginx/modules \
- --http-log-path=/var/log/nginx/access.log \
- --error-log-path=/var/log/nginx/error.log \
- --lock-path=/var/lock/nginx.lock \
- --pid-path=/run/nginx.pid \
- --http-client-body-temp-path=/var/lib/nginx/body \
- --http-fastcgi-temp-path=/var/lib/nginx/fastcgi \
- --http-proxy-temp-path=/var/lib/nginx/proxy \
- --http-scgi-temp-path=/var/lib/nginx/scgi \
- --http-uwsgi-temp-path=/var/lib/nginx/uwsgi \
- ${WITH_FLAGS} \
- --without-mail_pop3_module \
- --without-mail_smtp_module \
- --without-mail_imap_module \
- --without-http_uwsgi_module \
- --without-http_scgi_module \
- --with-cc-opt="${CC_OPT}" \
- --with-ld-opt="${LD_OPT}" \
- --user=www-data \
- --group=www-data \
- ${WITH_MODULES}
-
-make
-make modules
-make install
-
-export OPENTELEMETRY_CONTRIB_COMMIT=e11348bb400d5472bf1da5d6128bead66fa111ff
-cd "$BUILD_PATH"
-
-git clone https://github.com/open-telemetry/opentelemetry-cpp-contrib.git opentelemetry-cpp-contrib-${OPENTELEMETRY_CONTRIB_COMMIT}
-
-cd ${BUILD_PATH}/opentelemetry-cpp-contrib-${OPENTELEMETRY_CONTRIB_COMMIT}
-git reset --hard ${OPENTELEMETRY_CONTRIB_COMMIT}
-
-export OTEL_TEMP_INSTALL=/tmp/otel
-mkdir -p ${OTEL_TEMP_INSTALL}
-
-cd ${BUILD_PATH}/opentelemetry-cpp-contrib-${OPENTELEMETRY_CONTRIB_COMMIT}/instrumentation/nginx
-mkdir -p build
-cd build
-cmake -DCMAKE_BUILD_TYPE=Release \
- -G Ninja \
- -DCMAKE_CXX_STANDARD=17 \
- -DCMAKE_INSTALL_PREFIX=${OTEL_TEMP_INSTALL} \
- -DBUILD_SHARED_LIBS=ON \
- -DNGINX_VERSION=${NGINX_VERSION} \
- ..
-cmake --build . -j ${CORES} --target install
-
-mkdir -p /etc/nginx/modules
-cp ${OTEL_TEMP_INSTALL}/otel_ngx_module.so /etc/nginx/modules/otel_ngx_module.so
-
-
-cd "$BUILD_PATH/lua-resty-core"
-make install
-
-cd "$BUILD_PATH/lua-resty-balancer"
-make all
-make install
-
-export LUA_INCLUDE_DIR=/usr/local/include/luajit-2.1
-ln -s $LUA_INCLUDE_DIR /usr/include/lua5.1
-
-cd "$BUILD_PATH/lua-cjson"
-make all
-make install
-
-cd "$BUILD_PATH/lua-resty-cookie"
-make all
-make install
-
-cd "$BUILD_PATH/lua-resty-lrucache"
-make install
-
-cd "$BUILD_PATH/lua-resty-dns"
-make install
-
-cd "$BUILD_PATH/lua-resty-lock"
-make install
-
-# required for OCSP verification
-cd "$BUILD_PATH/lua-resty-http"
-make install
-
-cd "$BUILD_PATH/lua-resty-upload"
-make install
-
-cd "$BUILD_PATH/lua-resty-string"
-make install
-
-cd "$BUILD_PATH/lua-resty-memcached"
-make install
-
-cd "$BUILD_PATH/lua-resty-redis"
-make install
-
-cd "$BUILD_PATH/lua-resty-ipmatcher"
-INST_LUADIR=/usr/local/lib/lua make install
-
-cd "$BUILD_PATH/mimalloc"
-mkdir -p out/release
-cd out/release
-
-cmake ../..
-
-make
-make install
-
-# update image permissions
-writeDirs=( \
- /etc/nginx \
- /usr/local/nginx \
- /opt/modsecurity/var/log \
- /opt/modsecurity/var/upload \
- /opt/modsecurity/var/audit \
- /var/log/audit \
- /var/log/nginx \
-);
-
-adduser -S -D -H -u 101 -h /usr/local/nginx -s /sbin/nologin -G www-data -g www-data www-data
-
-for dir in "${writeDirs[@]}"; do
- mkdir -p ${dir};
- chown -R www-data.www-data ${dir};
-done
-
-rm -rf /etc/nginx/owasp-modsecurity-crs/.git
-rm -rf /etc/nginx/owasp-modsecurity-crs/tests
-
-# remove .a files
-find /usr/local -name "*.a" -print | xargs /bin/rm
diff --git a/images/nginx/Makefile b/images/nginx/Makefile
index b54a7739b..103ba217f 100644
--- a/images/nginx/Makefile
+++ b/images/nginx/Makefile
@@ -1,4 +1,4 @@
-# Copyright 2017 The Kubernetes Authors. All rights reserved.
+# Copyright 2024 The Kubernetes Authors. All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
@@ -22,7 +22,7 @@ INIT_BUILDX=$(DIR)/../../hack/init-buildx.sh
# 0.0.0 shouldn't clobber any released builds
SHORT_SHA ?=$(shell git rev-parse --short HEAD)
-TAG ?=v$(shell date +%Y%m%d)-$(SHORT_SHA)
+TAG ?=$(shell cat TAG)
REGISTRY ?= gcr.io/k8s-staging-ingress-nginx
diff --git a/images/nginx/README.md b/images/nginx/README.md
index da6994fb5..768077215 100644
--- a/images/nginx/README.md
+++ b/images/nginx/README.md
@@ -1,27 +1,47 @@
-NGINX base image using [alpine](https://www.alpinelinux.org/)
+NGINX base image
-This custom image contains:
+### HTTP/3 Support
-- [nginx-http-auth-digest](https://github.com/atomx/nginx-http-auth-digest)
-- [ngx_http_substitutions_filter_module](https://github.com/yaoweibin/ngx_http_substitutions_filter_module)
-- [OpenTelemetry-CPP](https://github.com/open-telemetry/opentelemetry-cpp)
-- [OpenTelemetry-CPP-Nginx](https://github.com/open-telemetry/opentelemetry-cpp-contrib/tree/main/instrumentation/nginx)
-- [nginx-opentracing](https://github.com/opentracing-contrib/nginx-opentracing)
-- [opentracing-cpp](https://github.com/opentracing/opentracing-cpp)
-- [zipkin-cpp-opentracing](https://github.com/rnburn/zipkin-cpp-opentracing)
-- [dd-opentracing-cpp](https://github.com/DataDog/dd-opentracing-cpp)
-- [ModSecurity-nginx](https://github.com/SpiderLabs/ModSecurity-nginx) (only supported in x86_64)
-- [brotli](https://github.com/google/brotli)
-- [geoip2](https://github.com/leev/ngx_http_geoip2_module)
+**HTTP/3 support is experimental and under development**
-**How to use this image:**
-This image provides a default configuration file with no backend servers.
+[HTTP/3](https://datatracker.ietf.org/doc/html/rfc9114)\
+[QUIC](https://datatracker.ietf.org/doc/html/rfc9000)
-_Using docker_
+[According to the documentation, NGINX 1.25.0 or higher supports HTTP/3:](https://nginx.org/en/docs/quic.html)
-NGINX base image we use is defined in NGINX_BASE file at the root of the project
+> Support for QUIC and HTTP/3 protocols is available since 1.25.0.
-```console
-docker run -v /some/nginx.conf:/etc/nginx/nginx.conf:ro $(cat ../../NGINX_BASE)
-```
+But this requires adding a new flag during the build:
+> When configuring nginx, it is possible to enable QUIC and HTTP/3 using the --with-http_v3_module configuration parameter.
+
+[We have added this flag](https://github.com/kubernetes/ingress-nginx/pull/11470), but it is not enough to use HTTP/3 in ingress-nginx, this is the first step.
+
+The next steps will be:
+
+1. **Waiting for OpenSSL 3.4.**\
+ The main problem is, that we still use OpenSSL (3.x) and it does not support the important mechanism of TLS 1.3 - [early_data](https://datatracker.ietf.org/doc/html/rfc8446#section-2.3):
+
+ > Otherwise, the OpenSSL compatibility layer will be used that does not support early data.
+
+ [And although another part of the documentation says that the directive is supported with OpenSSL:](https://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_early_data)
+
+ > The directive is supported when using OpenSSL 1.1.1 or higher.
+
+ But this is incomplete support, because OpenSSL does not support this feature, and [it has only client side support:](https://github.com/openssl/openssl)
+
+ > ... the QUIC (currently client side only) version 1 protocol
+
+ [And also there are some issues even with client side](https://github.com/openssl/openssl/discussions/23339)
+
+ Due to this, we currently have incomplete HTTP/3 support, without important security and performance features.\
+ But the good news is that [OpenSSL plans to add server-side support in 3.4](https://github.com/openssl/web/blob/master/roadmap.md):
+
+ > Server-side QUIC support
+
+ [Overview of SSL libraries(HAProxy Documentation)](https://github.com/haproxy/wiki/wiki/SSL-Libraries-Support-Status#tldr)
+
+2. **Adding [parameters](https://nginx.org/en/docs/http/ngx_http_v3_module.html) to the configmap to configure HTTP/3 and quic(enableHTTP3, enableHTTP/0.9, maxCurrentStream, and so on).**
+3. **Adding options to the nginx config template(`listen 443 quic` to server blocks and `add_header Alt-Svc 'h3=":8443"; ma=86400';` to location blocks).**
+4. **Opening the https port for UDP in the container(because QUIC uses UDP).**
+5. **Adding tests.**
diff --git a/images/nginx/TAG b/images/nginx/TAG
index 0ec25f750..f25246219 100644
--- a/images/nginx/TAG
+++ b/images/nginx/TAG
@@ -1 +1 @@
-v1.0.0
+v0.0.12
diff --git a/images/nginx/rootfs/Dockerfile b/images/nginx/rootfs/Dockerfile
index 245bb353b..1d2b6b623 100644
--- a/images/nginx/rootfs/Dockerfile
+++ b/images/nginx/rootfs/Dockerfile
@@ -1,4 +1,4 @@
-# Copyright 2015 The Kubernetes Authors. All rights reserved.
+# Copyright 2024 The Kubernetes Authors. All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
@@ -29,11 +29,10 @@ ENV LUA_PATH="/usr/local/share/luajit-2.1.0-beta3/?.lua;/usr/local/share/lua/5.1
ENV LUA_CPATH="/usr/local/lib/lua/?/?.so;/usr/local/lib/lua/?.so;;"
COPY --from=builder /usr/local /usr/local
+COPY --from=builder /usr/lib/libopentelemetry* /usr/local/lib
COPY --from=builder /opt /opt
COPY --from=builder /etc/nginx /etc/nginx
-LABEL org.opencontainers.image.source=https://github.com/kubernetes/ingress-nginx
-
RUN apk update \
&& apk upgrade \
&& apk add -U --no-cache \
@@ -50,6 +49,8 @@ RUN apk update \
yaml-cpp \
dumb-init \
tzdata \
+ grpc-cpp \
+ libprotobuf \
&& ln -s /usr/local/nginx/sbin/nginx /sbin/nginx \
&& adduser -S -D -H -u 101 -h /usr/local/nginx \
-s /sbin/nologin -G www-data -g www-data www-data \
diff --git a/images/nginx/rootfs/build.sh b/images/nginx/rootfs/build.sh
index cfd6493e3..3baf775fc 100755
--- a/images/nginx/rootfs/build.sh
+++ b/images/nginx/rootfs/build.sh
@@ -1,6 +1,6 @@
#!/bin/bash
-# Copyright 2015 The Kubernetes Authors.
+# Copyright 2023 The Kubernetes Authors.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
@@ -18,136 +18,121 @@ set -o errexit
set -o nounset
set -o pipefail
-export NGINX_VERSION=1.21.6
+export NGINX_VERSION=1.25.5
-# Check for recent changes: https://github.com/vision5/ngx_devel_kit/compare/v0.3.2...master
-export NDK_VERSION=0.3.2
+# Check for recent changes: https://github.com/vision5/ngx_devel_kit/compare/v0.3.3...master
+export NDK_VERSION=v0.3.3
# Check for recent changes: https://github.com/openresty/set-misc-nginx-module/compare/v0.33...master
-export SETMISC_VERSION=0.33
+export SETMISC_VERSION=796f5a3e518748eb29a93bd450324e0ad45b704e
# Check for recent changes: https://github.com/openresty/headers-more-nginx-module/compare/v0.37...master
-export MORE_HEADERS_VERSION=0.37
+export MORE_HEADERS_VERSION=v0.37
# Check for recent changes: https://github.com/atomx/nginx-http-auth-digest/compare/v1.0.0...atomx:master
-export NGINX_DIGEST_AUTH=1.0.0
+export NGINX_DIGEST_AUTH=v1.0.0
# Check for recent changes: https://github.com/yaoweibin/ngx_http_substitutions_filter_module/compare/v0.6.4...master
-export NGINX_SUBSTITUTIONS=b8a71eacc7f986ba091282ab8b1bbbc6ae1807e0
-
-# Check for recent changes: https://github.com/opentracing-contrib/nginx-opentracing/compare/v0.19.0...master
-export NGINX_OPENTRACING_VERSION=0.19.0
-
-#Check for recent changes: https://github.com/opentracing/opentracing-cpp/compare/v1.6.0...master
-export OPENTRACING_CPP_VERSION=f86b33f3d9e7322b1298ba62d5ffa7a9519c4c41
-
-# Check for recent changes: https://github.com/rnburn/zipkin-cpp-opentracing/compare/v0.5.2...master
-export ZIPKIN_CPP_VERSION=f69593138ff84ca2f6bc115992e18ca3d35f344a
-
-# Check for recent changes: https://github.com/jbeder/yaml-cpp/compare/yaml-cpp-0.7.0...master
-export YAML_CPP_VERSION=yaml-cpp-0.7.0
-
-# Check for recent changes: https://github.com/jaegertracing/jaeger-client-cpp/compare/v0.7.0...master
-export JAEGER_VERSION=0.7.0
-
-# Check for recent changes: https://github.com/msgpack/msgpack-c/compare/cpp-3.3.0...master
-export MSGPACK_VERSION=3.3.0
-
-# Check for recent changes: https://github.com/DataDog/dd-opentracing-cpp/compare/v1.3.7...master
-export DATADOG_CPP_VERSION=1.3.7
+export NGINX_SUBSTITUTIONS=e12e965ac1837ca709709f9a26f572a54d83430e
# Check for recent changes: https://github.com/SpiderLabs/ModSecurity-nginx/compare/v1.0.3...master
-export MODSECURITY_VERSION=1.0.3
+export MODSECURITY_VERSION=v1.0.3
-# Check for recent changes: https://github.com/SpiderLabs/ModSecurity/compare/v3.0.11...v3/master
-export MODSECURITY_LIB_VERSION=bbde9381cbccb49ea73f6194b08b478adc53f3bc
+# Check for recent changes: https://github.com/SpiderLabs/ModSecurity/compare/v3.0.8...v3/master
+export MODSECURITY_LIB_VERSION=v3.0.12
-# Check for recent changes: https://github.com/coreruleset/coreruleset/compare/v3.3.2...v3.3/master
-export OWASP_MODSECURITY_CRS_VERSION=v3.3.5
+# Check for recent changes: https://github.com/coreruleset/coreruleset/compare/v3.3.5...v4.0/main
+export OWASP_MODSECURITY_CRS_VERSION=v4.4.0
-# Check for recent changes: https://github.com/openresty/lua-nginx-module/compare/v0.10.25...master
-export LUA_NGX_VERSION=0.10.25
+# Check for recent changes: https://github.com/openresty/lua-nginx-module/compare/v0.10.26``...master
+export LUA_NGX_VERSION=v0.10.26
-# Check for recent changes: https://github.com/openresty/stream-lua-nginx-module/compare/v0.0.13...master
-export LUA_STREAM_NGX_VERSION=0.0.13
+# Check for recent changes: https://github.com/openresty/stream-lua-nginx-module/compare/bea8a0c0de94cede71554f53818ac0267d675d63...master
+export LUA_STREAM_NGX_VERSION=bea8a0c0de94cede71554f53818ac0267d675d63
# Check for recent changes: https://github.com/openresty/lua-upstream-nginx-module/compare/8aa93ead98ba2060d4efd594ae33a35d153589bf...master
-export LUA_UPSTREAM_VERSION=8aa93ead98ba2060d4efd594ae33a35d153589bf
+export LUA_UPSTREAM_VERSION=542be0893543a4e42d89f6dd85372972f5ff2a36
-# Check for recent changes: https://github.com/openresty/lua-cjson/compare/2.1.0.11...openresty:master
-export LUA_CJSON_VERSION=2.1.0.11
+# Check for recent changes: https://github.com/openresty/lua-cjson/compare/2.1.0.13...openresty:master
+export LUA_CJSON_VERSION=2.1.0.13
-# Check for recent changes: https://github.com/leev/ngx_http_geoip2_module/compare/3.4...master
+# Check for recent changes: https://github.com/leev/ngx_http_geoip2_module/compare/a607a41a8115fecfc05b5c283c81532a3d605425...master
export GEOIP2_VERSION=a607a41a8115fecfc05b5c283c81532a3d605425
-# Check for recent changes: https://github.com/openresty/luajit2/compare/v2.1-20230410...v2.1-agentzh
-export LUAJIT_VERSION=2.1-20230410
+# Check for recent changes: https://github.com/openresty/luajit2/compare/v2.1-20240314...v2.1-agentzh
+export LUAJIT_VERSION=v2.1-20240314
-# Check for recent changes: https://github.com/openresty/lua-resty-balancer/compare/v0.04...master
-export LUA_RESTY_BALANCER=0.04
+# Check for recent changes: https://github.com/openresty/lua-resty-balancer/compare/1cd4363c0a239afe4765ec607dcfbbb4e5900eea...master
+export LUA_RESTY_BALANCER=1cd4363c0a239afe4765ec607dcfbbb4e5900eea
-# Check for recent changes: https://github.com/openresty/lua-resty-lrucache/compare/v0.13...master
-export LUA_RESTY_CACHE=0.13
+# Check for recent changes: https://github.com/openresty/lua-resty-lrucache/compare/99e7578465b40f36f596d099b82eab404f2b42ed...master
+export LUA_RESTY_CACHE=99e7578465b40f36f596d099b82eab404f2b42ed
# Check for recent changes: https://github.com/openresty/lua-resty-core/compare/v0.1.27...master
-export LUA_RESTY_CORE=0.1.27
+export LUA_RESTY_CORE=v0.1.28
-# Check for recent changes: https://github.com/utix/lua-resty-cookie/compare/9533f47...master
-export LUA_RESTY_COOKIE_VERSION=9533f479371663107b515590fc9daf00d61ebf11
+# Check for recent changes: https://github.com/cloudflare/lua-resty-cookie/compare/f418d77082eaef48331302e84330488fdc810ef4...master
+export LUA_RESTY_COOKIE_VERSION=f418d77082eaef48331302e84330488fdc810ef4
-# Check for recent changes: https://github.com/openresty/lua-resty-dns/compare/v0.22...master
-export LUA_RESTY_DNS=0.22
+# Check for recent changes: https://github.com/openresty/lua-resty-dns/compare/8bb53516e2933e61c317db740a9b7c2048847c2f...master
+export LUA_RESTY_DNS=8bb53516e2933e61c317db740a9b7c2048847c2f
-# Check for recent changes: https://github.com/ledgetech/lua-resty-http/compare/v0.16.1...master
-export LUA_RESTY_HTTP=0ce55d6d15da140ecc5966fa848204c6fd9074e8
+# Check for recent changes: https://github.com/ledgetech/lua-resty-http/compare/v0.17.1...master
+export LUA_RESTY_HTTP=v0.17.1
# Check for recent changes: https://github.com/openresty/lua-resty-lock/compare/v0.09...master
-export LUA_RESTY_LOCK=0.09
+export LUA_RESTY_LOCK=405d0bf4cbfa74d742c6ed3158d442221e6212a9
# Check for recent changes: https://github.com/openresty/lua-resty-upload/compare/v0.11...master
-export LUA_RESTY_UPLOAD_VERSION=0.11
+export LUA_RESTY_UPLOAD_VERSION=979372cce011f3176af3c9aff53fd0e992c4bfd3
# Check for recent changes: https://github.com/openresty/lua-resty-string/compare/v0.15...master
-export LUA_RESTY_STRING_VERSION=0.15
+export LUA_RESTY_STRING_VERSION=6f1bc21d86daef804df3cc34d6427ef68da26844
# Check for recent changes: https://github.com/openresty/lua-resty-memcached/compare/v0.17...master
-export LUA_RESTY_MEMCACHED_VERSION=0.17
+export LUA_RESTY_MEMCACHED_VERSION=2f02b68bf65fa2332cce070674a93a69a6c7239b
# Check for recent changes: https://github.com/openresty/lua-resty-redis/compare/v0.30...master
-export LUA_RESTY_REDIS_VERSION=0.30
+export LUA_RESTY_REDIS_VERSION=8641b9f1b6f75cca50c90cf8ca5c502ad8950aa8
# Check for recent changes: https://github.com/api7/lua-resty-ipmatcher/compare/v0.6.1...master
-export LUA_RESTY_IPMATCHER_VERSION=0.6.1
+export LUA_RESTY_IPMATCHER_VERSION=3e93c53eb8c9884efe939ef070486a0e507cc5be
-# Check for recent changes: https://github.com/microsoft/mimalloc/compare/v1.7.6...master
-export MIMALOC_VERSION=1.7.6
+# Check for recent changes: https://github.com/microsoft/mimalloc/compare/v2.1.7...master
+export MIMALOC_VERSION=v2.1.7
+
+# Check on https://github.com/open-telemetry/opentelemetry-cpp
+export OPENTELEMETRY_CPP_VERSION="v1.11.0"
+# Check on https://github.com/open-telemetry/opentelemetry-proto
+export OPENTELEMETRY_PROTO_VERSION="v1.1.0"
export BUILD_PATH=/tmp/build
ARCH=$(uname -m)
-if [[ ${ARCH} == "s390x" ]]; then
- export LUAJIT_VERSION=9d5750d28478abfdcaefdfdc408f87752a21e431
- export LUA_RESTY_CORE=0.1.17
- export LUA_NGX_VERSION=0.10.15
- export LUA_STREAM_NGX_VERSION=0.0.7
-fi
-
get_src()
{
hash="$1"
url="$2"
+ dest="${3-}"
+ ARGS=""
f=$(basename "$url")
echo "Downloading $url"
curl -sSL "$url" -o "$f"
- echo "$hash $f" | sha256sum -c - || exit 10
- tar xzf "$f"
+ # TODO: Reenable checksum verification but make it smarter
+ # echo "$hash $f" | sha256sum -c - || exit 10
+ if [ ! -z "$dest" ]; then
+ mkdir ${BUILD_PATH}/${dest}
+ ARGS="-C ${BUILD_PATH}/${dest} --strip-components=1"
+ fi
+ tar xvzf "$f" $ARGS
rm -rf "$f"
}
# install required packages to build
+# Dependencies from "ninja" and below are OTEL dependencies
apk add \
bash \
gcc \
@@ -184,7 +169,22 @@ apk add \
unzip \
dos2unix \
yaml-cpp \
- coreutils
+ coreutils \
+ ninja \
+ gtest-dev \
+ git \
+ build-base \
+ pkgconfig \
+ c-ares-dev \
+ re2-dev \
+ grpc-dev \
+ protobuf-dev
+
+# apk add -X http://dl-cdn.alpinelinux.org/alpine/edge/testing opentelemetry-cpp-dev
+
+# There is some bug with some platforms and git, so force HTTP/1.1
+git config --global http.version HTTP/1.1
+git config --global http.postBuffer 157286400
mkdir -p /etc/nginx
@@ -196,271 +196,135 @@ get_src 66dc7081488811e9f925719e34d1b4504c2801c81dee2920e5452a86b11405ae \
"https://nginx.org/download/nginx-$NGINX_VERSION.tar.gz"
get_src aa961eafb8317e0eb8da37eb6e2c9ff42267edd18b56947384e719b85188f58b \
- "https://github.com/vision5/ngx_devel_kit/archive/v$NDK_VERSION.tar.gz"
+ "https://github.com/vision5/ngx_devel_kit/archive/$NDK_VERSION.tar.gz" "ngx_devel_kit"
+
+get_src abc123 \
+ "https://github.com/open-telemetry/opentelemetry-cpp/archive/$OPENTELEMETRY_CPP_VERSION.tar.gz" "opentelemetry-cpp"
+
+get_src abc123 \
+ "https://github.com/open-telemetry/opentelemetry-proto/archive/$OPENTELEMETRY_PROTO_VERSION.tar.gz" "opentelemetry-proto"
get_src cd5e2cc834bcfa30149e7511f2b5a2183baf0b70dc091af717a89a64e44a2985 \
- "https://github.com/openresty/set-misc-nginx-module/archive/v$SETMISC_VERSION.tar.gz"
+ "https://github.com/openresty/set-misc-nginx-module/archive/$SETMISC_VERSION.tar.gz" "set-misc-nginx-module"
-get_src cf6e169d6b350c06d0c730b0eaf4973394026ad40094cddd3b3a5b346577019d \
- "https://github.com/openresty/headers-more-nginx-module/archive/v$MORE_HEADERS_VERSION.tar.gz"
+get_src 0c0d2ced2ce895b3f45eb2b230cd90508ab2a773299f153de14a43e44c1209b3 \
+ "https://github.com/openresty/headers-more-nginx-module/archive/$MORE_HEADERS_VERSION.tar.gz" "headers-more-nginx-module"
get_src f09851e6309560a8ff3e901548405066c83f1f6ff88aa7171e0763bd9514762b \
- "https://github.com/atomx/nginx-http-auth-digest/archive/v$NGINX_DIGEST_AUTH.tar.gz"
+ "https://github.com/atomx/nginx-http-auth-digest/archive/$NGINX_DIGEST_AUTH.tar.gz" "nginx-http-auth-digest"
get_src a98b48947359166326d58700ccdc27256d2648218072da138ab6b47de47fbd8f \
- "https://github.com/yaoweibin/ngx_http_substitutions_filter_module/archive/$NGINX_SUBSTITUTIONS.tar.gz"
-
-get_src 6f97776ebdf019b105a755c7736b70bdbd7e575c7f0d39db5fe127873c7abf17 \
- "https://github.com/opentracing-contrib/nginx-opentracing/archive/v$NGINX_OPENTRACING_VERSION.tar.gz"
-
-get_src cbe625cba85291712253db5bc3870d60c709acfad9a8af5a302673d3d201e3ea \
- "https://github.com/opentracing/opentracing-cpp/archive/$OPENTRACING_CPP_VERSION.tar.gz"
-
-get_src 71de3d0658935db7ccea20e006b35e58ddc7e4c18878b9523f2addc2371e9270 \
- "https://github.com/rnburn/zipkin-cpp-opentracing/archive/$ZIPKIN_CPP_VERSION.tar.gz"
+ "https://github.com/yaoweibin/ngx_http_substitutions_filter_module/archive/$NGINX_SUBSTITUTIONS.tar.gz" "ngx_http_substitutions_filter_module"
get_src 32a42256616cc674dca24c8654397390adff15b888b77eb74e0687f023c8751b \
- "https://github.com/SpiderLabs/ModSecurity-nginx/archive/v$MODSECURITY_VERSION.tar.gz"
+ "https://github.com/SpiderLabs/ModSecurity-nginx/archive/$MODSECURITY_VERSION.tar.gz" "ModSecurity-nginx"
-get_src 43e6a9fcb146ad871515f0d0873947e5d497a1c9c60c58cb102a97b47208b7c3 \
- "https://github.com/jbeder/yaml-cpp/archive/$YAML_CPP_VERSION.tar.gz"
-
-get_src 3a3a03060bf5e3fef52c9a2de02e6035cb557f389453d8f3b0c1d3d570636994 \
- "https://github.com/jaegertracing/jaeger-client-cpp/archive/v$JAEGER_VERSION.tar.gz"
-
-get_src 754c3ace499a63e45b77ef4bcab4ee602c2c414f58403bce826b76ffc2f77d0b \
- "https://github.com/msgpack/msgpack-c/archive/cpp-$MSGPACK_VERSION.tar.gz"
-
-if [[ ${ARCH} == "s390x" ]]; then
-get_src 7d5f3439c8df56046d0564b5857fd8a30296ab1bd6df0f048aed7afb56a0a4c2 \
- "https://github.com/openresty/lua-nginx-module/archive/v$LUA_NGX_VERSION.tar.gz"
-get_src 99c47c75c159795c9faf76bbb9fa58e5a50b75286c86565ffcec8514b1c74bf9 \
- "https://github.com/openresty/stream-lua-nginx-module/archive/v$LUA_STREAM_NGX_VERSION.tar.gz"
-else
get_src bc764db42830aeaf74755754b900253c233ad57498debe7a441cee2c6f4b07c2 \
- "https://github.com/openresty/lua-nginx-module/archive/v$LUA_NGX_VERSION.tar.gz"
+ "https://github.com/openresty/lua-nginx-module/archive/$LUA_NGX_VERSION.tar.gz" "lua-nginx-module"
get_src 01b715754a8248cc7228e0c8f97f7488ae429d90208de0481394e35d24cef32f \
- "https://github.com/openresty/stream-lua-nginx-module/archive/v$LUA_STREAM_NGX_VERSION.tar.gz"
-
-fi
+ "https://github.com/openresty/stream-lua-nginx-module/archive/$LUA_STREAM_NGX_VERSION.tar.gz" "stream-lua-nginx-module"
get_src a92c9ee6682567605ece55d4eed5d1d54446ba6fba748cff0a2482aea5713d5f \
- "https://github.com/openresty/lua-upstream-nginx-module/archive/$LUA_UPSTREAM_VERSION.tar.gz"
+ "https://github.com/openresty/lua-upstream-nginx-module/archive/$LUA_UPSTREAM_VERSION.tar.gz" "lua-upstream-nginx-module"
-if [[ ${ARCH} == "s390x" ]]; then
-get_src 266ed1abb70a9806d97cb958537a44b67db6afb33d3b32292a2d68a2acedea75 \
- "https://github.com/openresty/luajit2/archive/$LUAJIT_VERSION.tar.gz"
-else
get_src 77bbcbb24c3c78f51560017288f3118d995fe71240aa379f5818ff6b166712ff \
- "https://github.com/openresty/luajit2/archive/v$LUAJIT_VERSION.tar.gz"
-fi
-
-get_src 8d39c6b23f941a2d11571daaccc04e69539a3fcbcc50a631837560d5861a7b96 \
- "https://github.com/DataDog/dd-opentracing-cpp/archive/v$DATADOG_CPP_VERSION.tar.gz"
+ "https://github.com/openresty/luajit2/archive/$LUAJIT_VERSION.tar.gz" "luajit2"
get_src b6c9c09fd43eb34a71e706ad780b2ead26549a9a9f59280fe558f5b7b980b7c6 \
- "https://github.com/leev/ngx_http_geoip2_module/archive/$GEOIP2_VERSION.tar.gz"
+ "https://github.com/leev/ngx_http_geoip2_module/archive/$GEOIP2_VERSION.tar.gz" "ngx_http_geoip2_module"
get_src deb4ab1ffb9f3d962c4b4a2c4bdff692b86a209e3835ae71ebdf3b97189e40a9 \
- "https://github.com/openresty/lua-resty-upload/archive/v$LUA_RESTY_UPLOAD_VERSION.tar.gz"
+ "https://github.com/openresty/lua-resty-upload/archive/$LUA_RESTY_UPLOAD_VERSION.tar.gz" "lua-resty-upload"
get_src bdbf271003d95aa91cab0a92f24dca129e99b33f79c13ebfcdbbcbb558129491 \
- "https://github.com/openresty/lua-resty-string/archive/v$LUA_RESTY_STRING_VERSION.tar.gz"
+ "https://github.com/openresty/lua-resty-string/archive/$LUA_RESTY_STRING_VERSION.tar.gz" "lua-resty-string"
get_src 16d72ed133f0c6df376a327386c3ef4e9406cf51003a700737c3805770ade7c5 \
- "https://github.com/openresty/lua-resty-balancer/archive/v$LUA_RESTY_BALANCER.tar.gz"
+ "https://github.com/openresty/lua-resty-balancer/archive/$LUA_RESTY_BALANCER.tar.gz" "lua-resty-balancer"
-if [[ ${ARCH} == "s390x" ]]; then
-get_src 8f5f76d2689a3f6b0782f0a009c56a65e4c7a4382be86422c9b3549fe95b0dc4 \
- "https://github.com/openresty/lua-resty-core/archive/v$LUA_RESTY_CORE.tar.gz"
-else
get_src 39baab9e2b31cc48cecf896cea40ef6e80559054fd8a6e440cc804a858ea84d4 \
- "https://github.com/openresty/lua-resty-core/archive/v$LUA_RESTY_CORE.tar.gz"
-fi
+ "https://github.com/openresty/lua-resty-core/archive/$LUA_RESTY_CORE.tar.gz" "lua-resty-core"
get_src a77b9de160d81712f2f442e1de8b78a5a7ef0d08f13430ff619f79235db974d4 \
- "https://github.com/openresty/lua-cjson/archive/$LUA_CJSON_VERSION.tar.gz"
+ "https://github.com/openresty/lua-cjson/archive/$LUA_CJSON_VERSION.tar.gz" "lua-cjson"
-get_src a404c790553617424d743b82a9f01feccd0d2930b306b370c665ca3b7c09ccb6 \
- "https://github.com/utix/lua-resty-cookie/archive/$LUA_RESTY_COOKIE_VERSION.tar.gz"
+get_src 5ed48c36231e2622b001308622d46a0077525ac2f751e8cc0c9905914254baa4 \
+ "https://github.com/cloudflare/lua-resty-cookie/archive/$LUA_RESTY_COOKIE_VERSION.tar.gz" "lua-resty-cookie"
get_src 573184006b98ccee2594b0d134fa4d05e5d2afd5141cbad315051ccf7e9b6403 \
- "https://github.com/openresty/lua-resty-lrucache/archive/v$LUA_RESTY_CACHE.tar.gz"
+ "https://github.com/openresty/lua-resty-lrucache/archive/$LUA_RESTY_CACHE.tar.gz" "lua-resty-lrucache"
get_src b4ddcd47db347e9adf5c1e1491a6279a6ae2a3aff3155ef77ea0a65c998a69c1 \
- "https://github.com/openresty/lua-resty-lock/archive/v$LUA_RESTY_LOCK.tar.gz"
+ "https://github.com/openresty/lua-resty-lock/archive/$LUA_RESTY_LOCK.tar.gz" "lua-resty-lock"
get_src 70e9a01eb32ccade0d5116a25bcffde0445b94ad35035ce06b94ccd260ad1bf0 \
- "https://github.com/openresty/lua-resty-dns/archive/v$LUA_RESTY_DNS.tar.gz"
+ "https://github.com/openresty/lua-resty-dns/archive/$LUA_RESTY_DNS.tar.gz" "lua-resty-dns"
get_src 9fcb6db95bc37b6fce77d3b3dc740d593f9d90dce0369b405eb04844d56ac43f \
- "https://github.com/ledgetech/lua-resty-http/archive/$LUA_RESTY_HTTP.tar.gz"
+ "https://github.com/ledgetech/lua-resty-http/archive/$LUA_RESTY_HTTP.tar.gz" "lua-resty-http"
get_src 02733575c4aed15f6cab662378e4b071c0a4a4d07940c4ef19a7319e9be943d4 \
- "https://github.com/openresty/lua-resty-memcached/archive/v$LUA_RESTY_MEMCACHED_VERSION.tar.gz"
+ "https://github.com/openresty/lua-resty-memcached/archive/$LUA_RESTY_MEMCACHED_VERSION.tar.gz" "lua-resty-memcached"
get_src c15aed1a01c88a3a6387d9af67a957dff670357f5fdb4ee182beb44635eef3f1 \
- "https://github.com/openresty/lua-resty-redis/archive/v$LUA_RESTY_REDIS_VERSION.tar.gz"
+ "https://github.com/openresty/lua-resty-redis/archive/$LUA_RESTY_REDIS_VERSION.tar.gz" "lua-resty-redis"
get_src efb767487ea3f6031577b9b224467ddbda2ad51a41c5867a47582d4ad85d609e \
- "https://github.com/api7/lua-resty-ipmatcher/archive/v$LUA_RESTY_IPMATCHER_VERSION.tar.gz"
+ "https://github.com/api7/lua-resty-ipmatcher/archive/$LUA_RESTY_IPMATCHER_VERSION.tar.gz" "lua-resty-ipmatcher"
get_src d74f86ada2329016068bc5a243268f1f555edd620b6a7d6ce89295e7d6cf18da \
- "https://github.com/microsoft/mimalloc/archive/refs/tags/v${MIMALOC_VERSION}.tar.gz"
+ "https://github.com/microsoft/mimalloc/archive/${MIMALOC_VERSION}.tar.gz" "mimalloc"
# improve compilation times
CORES=$(($(grep -c ^processor /proc/cpuinfo) - 1))
export MAKEFLAGS=-j${CORES}
export CTEST_BUILD_FLAGS=${MAKEFLAGS}
-export HUNTER_JOBS_NUMBER=${CORES}
-export HUNTER_USE_CACHE_SERVERS=true
# Install luajit from openresty fork
export LUAJIT_LIB=/usr/local/lib
export LUA_LIB_DIR="$LUAJIT_LIB/lua"
export LUAJIT_INC=/usr/local/include/luajit-2.1
-cd "$BUILD_PATH/luajit2-$LUAJIT_VERSION"
+cd "$BUILD_PATH/luajit2"
make CCDEBUG=-g
make install
ln -s /usr/local/bin/luajit /usr/local/bin/lua
ln -s "$LUAJIT_INC" /usr/local/include/lua
-cd "$BUILD_PATH"
+cd "$BUILD_PATH/opentelemetry-cpp"
+export CXXFLAGS="-DBENCHMARK_HAS_NO_INLINE_ASSEMBLY"
+cmake -B build -G Ninja -Wno-dev \
+ -DOTELCPP_PROTO_PATH="${BUILD_PATH}/opentelemetry-proto/" \
+ -DCMAKE_INSTALL_PREFIX=/usr \
+ -DBUILD_SHARED_LIBS=ON \
+ -DBUILD_TESTING="OFF" \
+ -DBUILD_W3CTRACECONTEXT_TEST="OFF" \
+ -DCMAKE_BUILD_TYPE=None \
+ -DWITH_ABSEIL=ON \
+ -DWITH_STL=ON \
+ -DWITH_EXAMPLES=OFF \
+ -DWITH_ZPAGES=OFF \
+ -DWITH_OTLP_GRPC=ON \
+ -DWITH_OTLP_HTTP=ON \
+ -DWITH_ZIPKIN=ON \
+ -DWITH_PROMETHEUS=OFF \
+ -DWITH_ASYNC_EXPORT_PREVIEW=OFF \
+ -DWITH_METRICS_EXEMPLAR_PREVIEW=OFF
+ cmake --build build
+ cmake --install build
# Git tuning
git config --global --add core.compression -1
-# build opentracing lib
-cd "$BUILD_PATH/opentracing-cpp-$OPENTRACING_CPP_VERSION"
-mkdir .build
-cd .build
-
-cmake -DCMAKE_BUILD_TYPE=Release \
- -DBUILD_TESTING=OFF \
- -DBUILD_SHARED_LIBS=OFF \
- -DBUILD_MOCKTRACER=OFF \
- -DBUILD_STATIC_LIBS=ON \
- -DCMAKE_POSITION_INDEPENDENT_CODE:BOOL=true \
- ..
-
-make
-make install
-
-# build yaml-cpp
-# TODO @timmysilv: remove this and jaeger sed calls once it is fixed in jaeger-client-cpp
-cd "$BUILD_PATH/yaml-cpp-$YAML_CPP_VERSION"
-mkdir .build
-cd .build
-
-cmake -DCMAKE_BUILD_TYPE=Release \
- -DCMAKE_POSITION_INDEPENDENT_CODE:BOOL=true \
- -DYAML_BUILD_SHARED_LIBS=ON \
- -DYAML_CPP_BUILD_TESTS=OFF \
- -DYAML_CPP_BUILD_TOOLS=OFF \
- ..
-
-make
-make install
-
-# build jaeger lib
-cd "$BUILD_PATH/jaeger-client-cpp-$JAEGER_VERSION"
-sed -i 's/-Werror/-Wno-psabi/' CMakeLists.txt
-# use the above built yaml-cpp instead until a new version of jaeger-client-cpp fixes the yaml-cpp issue
-# tl;dr new hunter is needed for new yaml-cpp, but new hunter has a conflict with old Thrift and new Boost
-sed -i 's/hunter_add_package(yaml-cpp)/#hunter_add_package(yaml-cpp)/' CMakeLists.txt
-sed -i 's/yaml-cpp::yaml-cpp/yaml-cpp/' CMakeLists.txt
-
-cat < export.map
-{
- global:
- OpenTracingMakeTracerFactory;
- local: *;
-};
-EOF
-
-mkdir .build
-cd .build
-
-cmake -DCMAKE_BUILD_TYPE=Release \
- -DBUILD_TESTING=OFF \
- -DJAEGERTRACING_BUILD_EXAMPLES=OFF \
- -DJAEGERTRACING_BUILD_CROSSDOCK=OFF \
- -DJAEGERTRACING_COVERAGE=OFF \
- -DJAEGERTRACING_PLUGIN=ON \
- -DHUNTER_CONFIGURATION_TYPES=Release \
- -DBUILD_SHARED_LIBS=OFF \
- -DJAEGERTRACING_WITH_YAML_CPP=ON \
- -DCMAKE_POSITION_INDEPENDENT_CODE:BOOL=true \
- ..
-
-make
-make install
-
-export HUNTER_INSTALL_DIR=$(cat _3rdParty/Hunter/install-root-dir) \
-
-mv libjaegertracing_plugin.so /usr/local/lib/libjaegertracing_plugin.so
-
-
-# build zipkin lib
-cd "$BUILD_PATH/zipkin-cpp-opentracing-$ZIPKIN_CPP_VERSION"
-
-cat < export.map
-{
- global:
- OpenTracingMakeTracerFactory;
- local: *;
-};
-EOF
-
-mkdir .build
-cd .build
-
-cmake -DCMAKE_BUILD_TYPE=Release \
- -DBUILD_SHARED_LIBS=OFF \
- -DBUILD_PLUGIN=ON \
- -DBUILD_TESTING=OFF \
- -DCMAKE_POSITION_INDEPENDENT_CODE:BOOL=true \
- ..
-
-make
-make install
-
-# build msgpack lib
-cd "$BUILD_PATH/msgpack-c-cpp-$MSGPACK_VERSION"
-
-mkdir .build
-cd .build
-cmake -DCMAKE_BUILD_TYPE=Release \
- -DBUILD_SHARED_LIBS=OFF \
- -DMSGPACK_BUILD_EXAMPLES=OFF \
- -DCMAKE_POSITION_INDEPENDENT_CODE:BOOL=true \
- ..
-
-make
-make install
-
-# build datadog lib
-cd "$BUILD_PATH/dd-opentracing-cpp-$DATADOG_CPP_VERSION"
-
-mkdir .build
-cd .build
-
-cmake -DCMAKE_BUILD_TYPE=Release \
- -DBUILD_TESTING=OFF \
- -DCMAKE_POSITION_INDEPENDENT_CODE:BOOL=true \
- ..
-
-make
-make install
-
# Get Brotli source and deps
cd "$BUILD_PATH"
-git clone --depth=1 https://github.com/google/ngx_brotli.git
+git clone --depth=100 https://github.com/google/ngx_brotli.git
cd ngx_brotli
+# https://github.com/google/ngx_brotli/issues/156
+git reset --hard 63ca02abdcf79c9e788d2eedcc388d2335902e52
git submodule init
git submodule update
@@ -518,17 +382,13 @@ mv rules/REQUEST-900-EXCLUSION-RULES-BEFORE-CRS.conf.example rules/REQUEST-900-E
mv rules/RESPONSE-999-EXCLUSION-RULES-AFTER-CRS.conf.example rules/RESPONSE-999-EXCLUSION-RULES-AFTER-CRS.conf
cd ..
-# OWASP CRS v3 rules
+# OWASP CRS v4 rules
echo "
Include /etc/nginx/owasp-modsecurity-crs/crs-setup.conf
Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-900-EXCLUSION-RULES-BEFORE-CRS.conf
Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-901-INITIALIZATION.conf
-Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-903.9001-DRUPAL-EXCLUSION-RULES.conf
-Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-903.9002-WORDPRESS-EXCLUSION-RULES.conf
Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-905-COMMON-EXCEPTIONS.conf
-Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-910-IP-REPUTATION.conf
Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-911-METHOD-ENFORCEMENT.conf
-Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-912-DOS-PROTECTION.conf
Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-913-SCANNER-DETECTION.conf
Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf
Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-921-PROTOCOL-ATTACK.conf
@@ -537,7 +397,7 @@ Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-930-APPLICATION-ATTACK-LF
Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-931-APPLICATION-ATTACK-RFI.conf
Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-932-APPLICATION-ATTACK-RCE.conf
Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf
-Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-934-APPLICATION-ATTACK-NODEJS.conf
+Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-934-APPLICATION-ATTACK-GENERIC.conf
Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-941-APPLICATION-ATTACK-XSS.conf
Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf
Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION.conf
@@ -548,6 +408,7 @@ Include /etc/nginx/owasp-modsecurity-crs/rules/RESPONSE-951-DATA-LEAKAGES-SQL.co
Include /etc/nginx/owasp-modsecurity-crs/rules/RESPONSE-952-DATA-LEAKAGES-JAVA.conf
Include /etc/nginx/owasp-modsecurity-crs/rules/RESPONSE-953-DATA-LEAKAGES-PHP.conf
Include /etc/nginx/owasp-modsecurity-crs/rules/RESPONSE-954-DATA-LEAKAGES-IIS.conf
+Include /etc/nginx/owasp-modsecurity-crs/rules/RESPONSE-955-WEB-SHELLS.conf
Include /etc/nginx/owasp-modsecurity-crs/rules/RESPONSE-959-BLOCKING-EVALUATION.conf
Include /etc/nginx/owasp-modsecurity-crs/rules/RESPONSE-980-CORRELATION.conf
Include /etc/nginx/owasp-modsecurity-crs/rules/RESPONSE-999-EXCLUSION-RULES-AFTER-CRS.conf
@@ -577,6 +438,7 @@ WITH_FLAGS="--with-debug \
--with-http_gzip_static_module \
--with-http_sub_module \
--with-http_v2_module \
+ --with-http_v3_module \
--with-stream \
--with-stream_ssl_module \
--with-stream_realip_module \
@@ -596,10 +458,9 @@ CC_OPT="-g -O2 -fPIE -fstack-protector-strong \
--param=ssp-buffer-size=4 \
-DTCP_FASTOPEN=23 \
-fPIC \
- -I$HUNTER_INSTALL_DIR/include \
-Wno-cast-function-type"
-LD_OPT="-fPIE -fPIC -pie -Wl,-z,relro -Wl,-z,now -L$HUNTER_INSTALL_DIR/lib"
+LD_OPT="-fPIE -fPIC -pie -Wl,-z,relro -Wl,-z,now"
if [[ ${ARCH} != "aarch64" ]]; then
WITH_FLAGS+=" --with-file-aio"
@@ -610,17 +471,16 @@ if [[ ${ARCH} == "x86_64" ]]; then
fi
WITH_MODULES=" \
- --add-module=$BUILD_PATH/ngx_devel_kit-$NDK_VERSION \
- --add-module=$BUILD_PATH/set-misc-nginx-module-$SETMISC_VERSION \
- --add-module=$BUILD_PATH/headers-more-nginx-module-$MORE_HEADERS_VERSION \
- --add-module=$BUILD_PATH/ngx_http_substitutions_filter_module-$NGINX_SUBSTITUTIONS \
- --add-module=$BUILD_PATH/lua-nginx-module-$LUA_NGX_VERSION \
- --add-module=$BUILD_PATH/stream-lua-nginx-module-$LUA_STREAM_NGX_VERSION \
- --add-module=$BUILD_PATH/lua-upstream-nginx-module-$LUA_UPSTREAM_VERSION \
- --add-dynamic-module=$BUILD_PATH/nginx-http-auth-digest-$NGINX_DIGEST_AUTH \
- --add-dynamic-module=$BUILD_PATH/nginx-opentracing-$NGINX_OPENTRACING_VERSION/opentracing \
- --add-dynamic-module=$BUILD_PATH/ModSecurity-nginx-$MODSECURITY_VERSION \
- --add-dynamic-module=$BUILD_PATH/ngx_http_geoip2_module-${GEOIP2_VERSION} \
+ --add-module=$BUILD_PATH/ngx_devel_kit \
+ --add-module=$BUILD_PATH/set-misc-nginx-module \
+ --add-module=$BUILD_PATH/headers-more-nginx-module \
+ --add-module=$BUILD_PATH/ngx_http_substitutions_filter_module \
+ --add-module=$BUILD_PATH/lua-nginx-module \
+ --add-module=$BUILD_PATH/stream-lua-nginx-module \
+ --add-module=$BUILD_PATH/lua-upstream-nginx-module \
+ --add-dynamic-module=$BUILD_PATH/nginx-http-auth-digest \
+ --add-dynamic-module=$BUILD_PATH/ModSecurity-nginx \
+ --add-dynamic-module=$BUILD_PATH/ngx_http_geoip2_module \
--add-dynamic-module=$BUILD_PATH/ngx_brotli"
./configure \
@@ -652,53 +512,80 @@ make
make modules
make install
-cd "$BUILD_PATH/lua-resty-core-$LUA_RESTY_CORE"
+export OPENTELEMETRY_CONTRIB_COMMIT=e11348bb400d5472bf1da5d6128bead66fa111ff
+cd "$BUILD_PATH"
+
+git clone https://github.com/open-telemetry/opentelemetry-cpp-contrib.git opentelemetry-cpp-contrib-${OPENTELEMETRY_CONTRIB_COMMIT}
+
+cd ${BUILD_PATH}/opentelemetry-cpp-contrib-${OPENTELEMETRY_CONTRIB_COMMIT}
+git reset --hard ${OPENTELEMETRY_CONTRIB_COMMIT}
+
+export OTEL_TEMP_INSTALL=/tmp/otel
+mkdir -p ${OTEL_TEMP_INSTALL}
+
+cd ${BUILD_PATH}/opentelemetry-cpp-contrib-${OPENTELEMETRY_CONTRIB_COMMIT}/instrumentation/nginx
+mkdir -p build
+cd build
+cmake -DCMAKE_BUILD_TYPE=Release \
+ -G Ninja \
+ -DCMAKE_CXX_STANDARD=17 \
+ -DCMAKE_INSTALL_PREFIX=${OTEL_TEMP_INSTALL} \
+ -DBUILD_SHARED_LIBS=ON \
+ -DNGINX_VERSION=${NGINX_VERSION} \
+ ..
+cmake --build . -j ${CORES} --target install
+
+mkdir -p /etc/nginx/modules
+cp ${OTEL_TEMP_INSTALL}/otel_ngx_module.so /etc/nginx/modules/otel_ngx_module.so
+
+
+cd "$BUILD_PATH/lua-resty-core"
make install
-cd "$BUILD_PATH/lua-resty-balancer-$LUA_RESTY_BALANCER"
+cd "$BUILD_PATH/lua-resty-balancer"
make all
make install
export LUA_INCLUDE_DIR=/usr/local/include/luajit-2.1
ln -s $LUA_INCLUDE_DIR /usr/include/lua5.1
-cd "$BUILD_PATH/lua-cjson-$LUA_CJSON_VERSION"
+cd "$BUILD_PATH/lua-cjson"
make all
make install
-cd "$BUILD_PATH/lua-resty-cookie-$LUA_RESTY_COOKIE_VERSION"
+cd "$BUILD_PATH/lua-resty-cookie"
make all
make install
-cd "$BUILD_PATH/lua-resty-lrucache-$LUA_RESTY_CACHE"
+cd "$BUILD_PATH/lua-resty-lrucache"
make install
-cd "$BUILD_PATH/lua-resty-dns-$LUA_RESTY_DNS"
+cd "$BUILD_PATH/lua-resty-dns"
make install
-cd "$BUILD_PATH/lua-resty-lock-$LUA_RESTY_LOCK"
+cd "$BUILD_PATH/lua-resty-lock"
make install
# required for OCSP verification
-cd "$BUILD_PATH/lua-resty-http-$LUA_RESTY_HTTP"
+cd "$BUILD_PATH/lua-resty-http"
make install
-cd "$BUILD_PATH/lua-resty-upload-$LUA_RESTY_UPLOAD_VERSION"
+cd "$BUILD_PATH/lua-resty-upload"
make install
-cd "$BUILD_PATH/lua-resty-string-$LUA_RESTY_STRING_VERSION"
+cd "$BUILD_PATH/lua-resty-string"
make install
-cd "$BUILD_PATH/lua-resty-memcached-$LUA_RESTY_MEMCACHED_VERSION"
+cd "$BUILD_PATH/lua-resty-memcached"
make install
-cd "$BUILD_PATH/lua-resty-redis-$LUA_RESTY_REDIS_VERSION"
+cd "$BUILD_PATH/lua-resty-redis"
make install
-cd "$BUILD_PATH/lua-resty-ipmatcher-$LUA_RESTY_IPMATCHER_VERSION"
+cd "$BUILD_PATH/lua-resty-ipmatcher"
INST_LUADIR=/usr/local/lib/lua make install
-cd "$BUILD_PATH/mimalloc-$MIMALOC_VERSION"
+cd "$BUILD_PATH/mimalloc"
mkdir -p out/release
cd out/release
diff --git a/images/nginx-1.25/rootfs/patches/00_drop-alias-root.patch b/images/nginx/rootfs/patches/00_drop-alias-root.patch
similarity index 100%
rename from images/nginx-1.25/rootfs/patches/00_drop-alias-root.patch
rename to images/nginx/rootfs/patches/00_drop-alias-root.patch
diff --git a/images/nginx-1.25/rootfs/patches/01_nginx-1.25.3-win32_max_err_str.patch b/images/nginx/rootfs/patches/01_nginx-1.25.3-win32_max_err_str.patch
similarity index 100%
rename from images/nginx-1.25/rootfs/patches/01_nginx-1.25.3-win32_max_err_str.patch
rename to images/nginx/rootfs/patches/01_nginx-1.25.3-win32_max_err_str.patch
diff --git a/images/nginx-1.25/rootfs/patches/02_nginx-1.25.3-stream_balancer_export.patch b/images/nginx/rootfs/patches/02_nginx-1.25.3-stream_balancer_export.patch
similarity index 100%
rename from images/nginx-1.25/rootfs/patches/02_nginx-1.25.3-stream_balancer_export.patch
rename to images/nginx/rootfs/patches/02_nginx-1.25.3-stream_balancer_export.patch
diff --git a/images/nginx-1.25/rootfs/patches/03_nginx-1.25.3-stream_proxy_get_next_upstream_tries.patch b/images/nginx/rootfs/patches/03_nginx-1.25.3-stream_proxy_get_next_upstream_tries.patch
similarity index 100%
rename from images/nginx-1.25/rootfs/patches/03_nginx-1.25.3-stream_proxy_get_next_upstream_tries.patch
rename to images/nginx/rootfs/patches/03_nginx-1.25.3-stream_proxy_get_next_upstream_tries.patch
diff --git a/images/nginx-1.25/rootfs/patches/04_nginx-1.25.3-stream_proxy_timeout_fields.patch b/images/nginx/rootfs/patches/04_nginx-1.25.3-stream_proxy_timeout_fields.patch
similarity index 100%
rename from images/nginx-1.25/rootfs/patches/04_nginx-1.25.3-stream_proxy_timeout_fields.patch
rename to images/nginx/rootfs/patches/04_nginx-1.25.3-stream_proxy_timeout_fields.patch
diff --git a/images/nginx-1.25/rootfs/patches/05_nginx-1.25.3-stream_ssl_preread_no_skip.patch b/images/nginx/rootfs/patches/05_nginx-1.25.3-stream_ssl_preread_no_skip.patch
similarity index 100%
rename from images/nginx-1.25/rootfs/patches/05_nginx-1.25.3-stream_ssl_preread_no_skip.patch
rename to images/nginx/rootfs/patches/05_nginx-1.25.3-stream_ssl_preread_no_skip.patch
diff --git a/images/nginx-1.25/rootfs/patches/06_nginx-1.25.3-resolver_conf_parsing.patch b/images/nginx/rootfs/patches/06_nginx-1.25.3-resolver_conf_parsing.patch
similarity index 100%
rename from images/nginx-1.25/rootfs/patches/06_nginx-1.25.3-resolver_conf_parsing.patch
rename to images/nginx/rootfs/patches/06_nginx-1.25.3-resolver_conf_parsing.patch
diff --git a/images/nginx-1.25/rootfs/patches/07_nginx-1.25.3-daemon_destroy_pool.patch b/images/nginx/rootfs/patches/07_nginx-1.25.3-daemon_destroy_pool.patch
similarity index 100%
rename from images/nginx-1.25/rootfs/patches/07_nginx-1.25.3-daemon_destroy_pool.patch
rename to images/nginx/rootfs/patches/07_nginx-1.25.3-daemon_destroy_pool.patch
diff --git a/images/nginx-1.25/rootfs/patches/08_nginx-1.25.3-init_cycle_pool_release.patch b/images/nginx/rootfs/patches/08_nginx-1.25.3-init_cycle_pool_release.patch
similarity index 100%
rename from images/nginx-1.25/rootfs/patches/08_nginx-1.25.3-init_cycle_pool_release.patch
rename to images/nginx/rootfs/patches/08_nginx-1.25.3-init_cycle_pool_release.patch
diff --git a/images/nginx-1.25/rootfs/patches/09_nginx-1.25.3-balancer_status_code.patch b/images/nginx/rootfs/patches/09_nginx-1.25.3-balancer_status_code.patch
similarity index 100%
rename from images/nginx-1.25/rootfs/patches/09_nginx-1.25.3-balancer_status_code.patch
rename to images/nginx/rootfs/patches/09_nginx-1.25.3-balancer_status_code.patch
diff --git a/images/nginx-1.25/rootfs/patches/10_nginx-1.25.3-delayed_posted_events.patch b/images/nginx/rootfs/patches/10_nginx-1.25.3-delayed_posted_events.patch
similarity index 100%
rename from images/nginx-1.25/rootfs/patches/10_nginx-1.25.3-delayed_posted_events.patch
rename to images/nginx/rootfs/patches/10_nginx-1.25.3-delayed_posted_events.patch
diff --git a/images/nginx-1.25/rootfs/patches/11_nginx-1.25.3-privileged_agent_process.patch b/images/nginx/rootfs/patches/11_nginx-1.25.3-privileged_agent_process.patch
similarity index 100%
rename from images/nginx-1.25/rootfs/patches/11_nginx-1.25.3-privileged_agent_process.patch
rename to images/nginx/rootfs/patches/11_nginx-1.25.3-privileged_agent_process.patch
diff --git a/images/nginx-1.25/rootfs/patches/12_nginx-1.25.3-privileged_agent_process_connections.patch b/images/nginx/rootfs/patches/12_nginx-1.25.3-privileged_agent_process_connections.patch
similarity index 100%
rename from images/nginx-1.25/rootfs/patches/12_nginx-1.25.3-privileged_agent_process_connections.patch
rename to images/nginx/rootfs/patches/12_nginx-1.25.3-privileged_agent_process_connections.patch
diff --git a/images/nginx-1.25/rootfs/patches/13_nginx-1.25.3-privileged_agent_process_thread_pool.patch b/images/nginx/rootfs/patches/13_nginx-1.25.3-privileged_agent_process_thread_pool.patch
similarity index 100%
rename from images/nginx-1.25/rootfs/patches/13_nginx-1.25.3-privileged_agent_process_thread_pool.patch
rename to images/nginx/rootfs/patches/13_nginx-1.25.3-privileged_agent_process_thread_pool.patch
diff --git a/images/nginx-1.25/rootfs/patches/14_nginx-1.25.3-single_process_graceful_exit.patch b/images/nginx/rootfs/patches/14_nginx-1.25.3-single_process_graceful_exit.patch
similarity index 100%
rename from images/nginx-1.25/rootfs/patches/14_nginx-1.25.3-single_process_graceful_exit.patch
rename to images/nginx/rootfs/patches/14_nginx-1.25.3-single_process_graceful_exit.patch
diff --git a/images/nginx-1.25/rootfs/patches/15_nginx-1.25.3-intercept_error_log.patch b/images/nginx/rootfs/patches/15_nginx-1.25.3-intercept_error_log.patch
similarity index 100%
rename from images/nginx-1.25/rootfs/patches/15_nginx-1.25.3-intercept_error_log.patch
rename to images/nginx/rootfs/patches/15_nginx-1.25.3-intercept_error_log.patch
diff --git a/images/nginx-1.25/rootfs/patches/16_nginx-1.25.3-upstream_pipelining.patch b/images/nginx/rootfs/patches/16_nginx-1.25.3-upstream_pipelining.patch
similarity index 100%
rename from images/nginx-1.25/rootfs/patches/16_nginx-1.25.3-upstream_pipelining.patch
rename to images/nginx/rootfs/patches/16_nginx-1.25.3-upstream_pipelining.patch
diff --git a/images/nginx-1.25/rootfs/patches/17_nginx-1.25.3-no_error_pages.patch b/images/nginx/rootfs/patches/17_nginx-1.25.3-no_error_pages.patch
similarity index 100%
rename from images/nginx-1.25/rootfs/patches/17_nginx-1.25.3-no_error_pages.patch
rename to images/nginx/rootfs/patches/17_nginx-1.25.3-no_error_pages.patch
diff --git a/images/nginx-1.25/rootfs/patches/18_nginx-1.25.3-no_Werror.patch b/images/nginx/rootfs/patches/18_nginx-1.25.3-no_Werror.patch
similarity index 100%
rename from images/nginx-1.25/rootfs/patches/18_nginx-1.25.3-no_Werror.patch
rename to images/nginx/rootfs/patches/18_nginx-1.25.3-no_Werror.patch
diff --git a/images/nginx-1.25/rootfs/patches/19_nginx-1.25.3-log_escape_non_ascii.patch b/images/nginx/rootfs/patches/19_nginx-1.25.3-log_escape_non_ascii.patch
similarity index 100%
rename from images/nginx-1.25/rootfs/patches/19_nginx-1.25.3-log_escape_non_ascii.patch
rename to images/nginx/rootfs/patches/19_nginx-1.25.3-log_escape_non_ascii.patch
diff --git a/images/nginx-1.25/rootfs/patches/20_nginx-1.25.3-proxy_host_port_vars.patch b/images/nginx/rootfs/patches/20_nginx-1.25.3-proxy_host_port_vars.patch
similarity index 100%
rename from images/nginx-1.25/rootfs/patches/20_nginx-1.25.3-proxy_host_port_vars.patch
rename to images/nginx/rootfs/patches/20_nginx-1.25.3-proxy_host_port_vars.patch
diff --git a/images/nginx-1.25/rootfs/patches/21_nginx-1.25.3-cache_manager_exit.patch b/images/nginx/rootfs/patches/21_nginx-1.25.3-cache_manager_exit.patch
similarity index 100%
rename from images/nginx-1.25/rootfs/patches/21_nginx-1.25.3-cache_manager_exit.patch
rename to images/nginx/rootfs/patches/21_nginx-1.25.3-cache_manager_exit.patch
diff --git a/images/nginx-1.25/rootfs/patches/22_nginx-1.25.3-larger_max_error_str.patch b/images/nginx/rootfs/patches/22_nginx-1.25.3-larger_max_error_str.patch
similarity index 100%
rename from images/nginx-1.25/rootfs/patches/22_nginx-1.25.3-larger_max_error_str.patch
rename to images/nginx/rootfs/patches/22_nginx-1.25.3-larger_max_error_str.patch
diff --git a/images/nginx-1.25/rootfs/patches/23_nginx-1.25.3-pcre_conf_opt.patch b/images/nginx/rootfs/patches/23_nginx-1.25.3-pcre_conf_opt.patch
similarity index 100%
rename from images/nginx-1.25/rootfs/patches/23_nginx-1.25.3-pcre_conf_opt.patch
rename to images/nginx/rootfs/patches/23_nginx-1.25.3-pcre_conf_opt.patch
diff --git a/images/nginx-1.25/rootfs/patches/24_nginx-1.25.3-always_enable_cc_feature_tests.patch b/images/nginx/rootfs/patches/24_nginx-1.25.3-always_enable_cc_feature_tests.patch
similarity index 100%
rename from images/nginx-1.25/rootfs/patches/24_nginx-1.25.3-always_enable_cc_feature_tests.patch
rename to images/nginx/rootfs/patches/24_nginx-1.25.3-always_enable_cc_feature_tests.patch
diff --git a/images/nginx-1.25/rootfs/patches/25_nginx-1.25.3-ssl_cert_cb_yield.patch b/images/nginx/rootfs/patches/25_nginx-1.25.3-ssl_cert_cb_yield.patch
similarity index 100%
rename from images/nginx-1.25/rootfs/patches/25_nginx-1.25.3-ssl_cert_cb_yield.patch
rename to images/nginx/rootfs/patches/25_nginx-1.25.3-ssl_cert_cb_yield.patch
diff --git a/images/nginx-1.25/rootfs/patches/26_nginx-1.25.3-ssl_sess_cb_yield.patch b/images/nginx/rootfs/patches/26_nginx-1.25.3-ssl_sess_cb_yield.patch
similarity index 100%
rename from images/nginx-1.25/rootfs/patches/26_nginx-1.25.3-ssl_sess_cb_yield.patch
rename to images/nginx/rootfs/patches/26_nginx-1.25.3-ssl_sess_cb_yield.patch
diff --git a/images/nginx-1.25/rootfs/patches/27_nginx-1.25.3-ssl_client_hello_cb_yield.patch b/images/nginx/rootfs/patches/27_nginx-1.25.3-ssl_client_hello_cb_yield.patch
similarity index 100%
rename from images/nginx-1.25/rootfs/patches/27_nginx-1.25.3-ssl_client_hello_cb_yield.patch
rename to images/nginx/rootfs/patches/27_nginx-1.25.3-ssl_client_hello_cb_yield.patch
diff --git a/images/nginx-1.25/rootfs/patches/28_nginx-1.25.3-upstream_timeout_fields.patch b/images/nginx/rootfs/patches/28_nginx-1.25.3-upstream_timeout_fields.patch
similarity index 100%
rename from images/nginx-1.25/rootfs/patches/28_nginx-1.25.3-upstream_timeout_fields.patch
rename to images/nginx/rootfs/patches/28_nginx-1.25.3-upstream_timeout_fields.patch
diff --git a/images/nginx-1.25/rootfs/patches/29_nginx-1.25.3-safe_resolver_ipv6_option.patch b/images/nginx/rootfs/patches/29_nginx-1.25.3-safe_resolver_ipv6_option.patch
similarity index 100%
rename from images/nginx-1.25/rootfs/patches/29_nginx-1.25.3-safe_resolver_ipv6_option.patch
rename to images/nginx/rootfs/patches/29_nginx-1.25.3-safe_resolver_ipv6_option.patch
diff --git a/images/nginx-1.25/rootfs/patches/30_nginx-1.25.3-socket_cloexec.patch b/images/nginx/rootfs/patches/30_nginx-1.25.3-socket_cloexec.patch
similarity index 100%
rename from images/nginx-1.25/rootfs/patches/30_nginx-1.25.3-socket_cloexec.patch
rename to images/nginx/rootfs/patches/30_nginx-1.25.3-socket_cloexec.patch
diff --git a/images/nginx-1.25/rootfs/patches/31_nginx-1.25.3-reuseport_close_unused_fds.patch b/images/nginx/rootfs/patches/31_nginx-1.25.3-reuseport_close_unused_fds.patch
similarity index 100%
rename from images/nginx-1.25/rootfs/patches/31_nginx-1.25.3-reuseport_close_unused_fds.patch
rename to images/nginx/rootfs/patches/31_nginx-1.25.3-reuseport_close_unused_fds.patch
diff --git a/images/nginx/rootfs/patches/drop-alias-root.patch b/images/nginx/rootfs/patches/drop-alias-root.patch
deleted file mode 100644
index a92e08bd0..000000000
--- a/images/nginx/rootfs/patches/drop-alias-root.patch
+++ /dev/null
@@ -1,144 +0,0 @@
-:100644 100644 c7463dcd 00000000 M src/http/ngx_http_core_module.c
-diff --git a/src/http/ngx_http_core_module.c b/src/http/ngx_http_core_module.c
-index c7463dcd..e2e45931 100644
---- a/src/http/ngx_http_core_module.c
-+++ b/src/http/ngx_http_core_module.c
-@@ -55,7 +55,6 @@ static char *ngx_http_core_listen(ngx_conf_t *cf, ngx_command_t *cmd,
- void *conf);
- static char *ngx_http_core_server_name(ngx_conf_t *cf, ngx_command_t *cmd,
- void *conf);
--static char *ngx_http_core_root(ngx_conf_t *cf, ngx_command_t *cmd, void *conf);
- static char *ngx_http_core_limit_except(ngx_conf_t *cf, ngx_command_t *cmd,
- void *conf);
- static char *ngx_http_core_set_aio(ngx_conf_t *cf, ngx_command_t *cmd,
-@@ -323,21 +322,6 @@ static ngx_command_t ngx_http_core_commands[] = {
- offsetof(ngx_http_core_loc_conf_t, default_type),
- NULL },
-
-- { ngx_string("root"),
-- NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_HTTP_LIF_CONF
-- |NGX_CONF_TAKE1,
-- ngx_http_core_root,
-- NGX_HTTP_LOC_CONF_OFFSET,
-- 0,
-- NULL },
--
-- { ngx_string("alias"),
-- NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1,
-- ngx_http_core_root,
-- NGX_HTTP_LOC_CONF_OFFSET,
-- 0,
-- NULL },
--
- { ngx_string("limit_except"),
- NGX_HTTP_LOC_CONF|NGX_CONF_BLOCK|NGX_CONF_1MORE,
- ngx_http_core_limit_except,
-@@ -4312,108 +4296,6 @@ ngx_http_core_server_name(ngx_conf_t *cf, ngx_command_t *cmd, void *conf)
- }
-
-
--static char *
--ngx_http_core_root(ngx_conf_t *cf, ngx_command_t *cmd, void *conf)
--{
-- ngx_http_core_loc_conf_t *clcf = conf;
--
-- ngx_str_t *value;
-- ngx_int_t alias;
-- ngx_uint_t n;
-- ngx_http_script_compile_t sc;
--
-- alias = (cmd->name.len == sizeof("alias") - 1) ? 1 : 0;
--
-- if (clcf->root.data) {
--
-- if ((clcf->alias != 0) == alias) {
-- return "is duplicate";
-- }
--
-- ngx_conf_log_error(NGX_LOG_EMERG, cf, 0,
-- "\"%V\" directive is duplicate, "
-- "\"%s\" directive was specified earlier",
-- &cmd->name, clcf->alias ? "alias" : "root");
--
-- return NGX_CONF_ERROR;
-- }
--
-- if (clcf->named && alias) {
-- ngx_conf_log_error(NGX_LOG_EMERG, cf, 0,
-- "the \"alias\" directive cannot be used "
-- "inside the named location");
--
-- return NGX_CONF_ERROR;
-- }
--
-- value = cf->args->elts;
--
-- if (ngx_strstr(value[1].data, "$document_root")
-- || ngx_strstr(value[1].data, "${document_root}"))
-- {
-- ngx_conf_log_error(NGX_LOG_EMERG, cf, 0,
-- "the $document_root variable cannot be used "
-- "in the \"%V\" directive",
-- &cmd->name);
--
-- return NGX_CONF_ERROR;
-- }
--
-- if (ngx_strstr(value[1].data, "$realpath_root")
-- || ngx_strstr(value[1].data, "${realpath_root}"))
-- {
-- ngx_conf_log_error(NGX_LOG_EMERG, cf, 0,
-- "the $realpath_root variable cannot be used "
-- "in the \"%V\" directive",
-- &cmd->name);
--
-- return NGX_CONF_ERROR;
-- }
--
-- clcf->alias = alias ? clcf->name.len : 0;
-- clcf->root = value[1];
--
-- if (!alias && clcf->root.len > 0
-- && clcf->root.data[clcf->root.len - 1] == '/')
-- {
-- clcf->root.len--;
-- }
--
-- if (clcf->root.data[0] != '$') {
-- if (ngx_conf_full_name(cf->cycle, &clcf->root, 0) != NGX_OK) {
-- return NGX_CONF_ERROR;
-- }
-- }
--
-- n = ngx_http_script_variables_count(&clcf->root);
--
-- ngx_memzero(&sc, sizeof(ngx_http_script_compile_t));
-- sc.variables = n;
--
--#if (NGX_PCRE)
-- if (alias && clcf->regex) {
-- clcf->alias = NGX_MAX_SIZE_T_VALUE;
-- n = 1;
-- }
--#endif
--
-- if (n) {
-- sc.cf = cf;
-- sc.source = &clcf->root;
-- sc.lengths = &clcf->root_lengths;
-- sc.values = &clcf->root_values;
-- sc.complete_lengths = 1;
-- sc.complete_values = 1;
--
-- if (ngx_http_script_compile(&sc) != NGX_OK) {
-- return NGX_CONF_ERROR;
-- }
-- }
--
-- return NGX_CONF_OK;
--}
--
--
- static ngx_http_method_name_t ngx_methods_names[] = {
- { (u_char *) "GET", (uint32_t) ~NGX_HTTP_GET },
- { (u_char *) "HEAD", (uint32_t) ~NGX_HTTP_HEAD },
diff --git a/images/nginx/rootfs/patches/nginx-1.21.4-balancer_status_code.patch b/images/nginx/rootfs/patches/nginx-1.21.4-balancer_status_code.patch
deleted file mode 100644
index c4d87e2fb..000000000
--- a/images/nginx/rootfs/patches/nginx-1.21.4-balancer_status_code.patch
+++ /dev/null
@@ -1,72 +0,0 @@
-diff --git a/src/http/ngx_http_upstream.c b/src/http/ngx_http_upstream.c
-index f8d5707d..6efe0047 100644
---- a/src/http/ngx_http_upstream.c
-+++ b/src/http/ngx_http_upstream.c
-@@ -1515,6 +1515,11 @@ ngx_http_upstream_connect(ngx_http_request_t *r, ngx_http_upstream_t *u)
- return;
- }
-
-+ if (rc >= NGX_HTTP_SPECIAL_RESPONSE) {
-+ ngx_http_upstream_finalize_request(r, u, rc);
-+ return;
-+ }
-+
- u->state->peer = u->peer.name;
-
- if (rc == NGX_BUSY) {
-diff --git a/src/http/ngx_http_upstream.h b/src/http/ngx_http_upstream.h
-index 3e714e5b..dfbb25e0 100644
---- a/src/http/ngx_http_upstream.h
-+++ b/src/http/ngx_http_upstream.h
-@@ -427,4 +427,9 @@ extern ngx_conf_bitmask_t ngx_http_upstream_cache_method_mask[];
- extern ngx_conf_bitmask_t ngx_http_upstream_ignore_headers_masks[];
-
-
-+#ifndef HAVE_BALANCER_STATUS_CODE_PATCH
-+#define HAVE_BALANCER_STATUS_CODE_PATCH
-+#endif
-+
-+
- #endif /* _NGX_HTTP_UPSTREAM_H_INCLUDED_ */
-diff --git a/src/stream/ngx_stream.h b/src/stream/ngx_stream.h
-index 09d24593..d8b4b584 100644
---- a/src/stream/ngx_stream.h
-+++ b/src/stream/ngx_stream.h
-@@ -27,6 +27,7 @@ typedef struct ngx_stream_session_s ngx_stream_session_t;
-
-
- #define NGX_STREAM_OK 200
-+#define NGX_STREAM_SPECIAL_RESPONSE 300
- #define NGX_STREAM_BAD_REQUEST 400
- #define NGX_STREAM_FORBIDDEN 403
- #define NGX_STREAM_INTERNAL_SERVER_ERROR 500
-diff --git a/src/stream/ngx_stream_proxy_module.c b/src/stream/ngx_stream_proxy_module.c
-index 818d7329..329dcdc6 100644
---- a/src/stream/ngx_stream_proxy_module.c
-+++ b/src/stream/ngx_stream_proxy_module.c
-@@ -691,6 +691,11 @@ ngx_stream_proxy_connect(ngx_stream_session_t *s)
- return;
- }
-
-+ if (rc >= NGX_STREAM_SPECIAL_RESPONSE) {
-+ ngx_stream_proxy_finalize(s, rc);
-+ return;
-+ }
-+
- u->state->peer = u->peer.name;
-
- if (rc == NGX_BUSY) {
-diff --git a/src/stream/ngx_stream_upstream.h b/src/stream/ngx_stream_upstream.h
-index 73947f46..21bc0ad7 100644
---- a/src/stream/ngx_stream_upstream.h
-+++ b/src/stream/ngx_stream_upstream.h
-@@ -151,4 +151,9 @@ ngx_stream_upstream_srv_conf_t *ngx_stream_upstream_add(ngx_conf_t *cf,
- extern ngx_module_t ngx_stream_upstream_module;
-
-
-+#ifndef HAVE_BALANCER_STATUS_CODE_PATCH
-+#define HAVE_BALANCER_STATUS_CODE_PATCH
-+#endif
-+
-+
- #endif /* _NGX_STREAM_UPSTREAM_H_INCLUDED_ */
diff --git a/images/nginx/rootfs/patches/nginx-1.21.4-cache_manager_exit.patch b/images/nginx/rootfs/patches/nginx-1.21.4-cache_manager_exit.patch
deleted file mode 100644
index 91ee63a26..000000000
--- a/images/nginx/rootfs/patches/nginx-1.21.4-cache_manager_exit.patch
+++ /dev/null
@@ -1,19 +0,0 @@
-# HG changeset patch
-# User Yichun Zhang
-# Date 1383598130 28800
-# Node ID f64218e1ac963337d84092536f588b8e0d99bbaa
-# Parent dea321e5c0216efccbb23e84bbce7cf3e28f130c
-Cache: gracefully exit the cache manager process.
-
-diff -r dea321e5c021 -r f64218e1ac96 src/os/unix/ngx_process_cycle.c
---- a/src/os/unix/ngx_process_cycle.c Thu Oct 31 18:23:49 2013 +0400
-+++ b/src/os/unix/ngx_process_cycle.c Mon Nov 04 12:48:50 2013 -0800
-@@ -1134,7 +1134,7 @@
-
- if (ngx_terminate || ngx_quit) {
- ngx_log_error(NGX_LOG_NOTICE, cycle->log, 0, "exiting");
-- exit(0);
-+ ngx_worker_process_exit(cycle);
- }
-
- if (ngx_reopen) {
diff --git a/images/nginx/rootfs/patches/nginx-1.21.4-delayed_posted_events.patch b/images/nginx/rootfs/patches/nginx-1.21.4-delayed_posted_events.patch
deleted file mode 100644
index 687584324..000000000
--- a/images/nginx/rootfs/patches/nginx-1.21.4-delayed_posted_events.patch
+++ /dev/null
@@ -1,98 +0,0 @@
-diff --git a/src/event/ngx_event.c b/src/event/ngx_event.c
-index 57af8132..4853945f 100644
---- a/src/event/ngx_event.c
-+++ b/src/event/ngx_event.c
-@@ -196,6 +196,9 @@ ngx_process_events_and_timers(ngx_cycle_t *cycle)
- ngx_uint_t flags;
- ngx_msec_t timer, delta;
-
-+ ngx_queue_t *q;
-+ ngx_event_t *ev;
-+
- if (ngx_timer_resolution) {
- timer = NGX_TIMER_INFINITE;
- flags = 0;
-@@ -215,6 +218,13 @@ ngx_process_events_and_timers(ngx_cycle_t *cycle)
- #endif
- }
-
-+ if (!ngx_queue_empty(&ngx_posted_delayed_events)) {
-+ ngx_log_debug0(NGX_LOG_DEBUG_EVENT, cycle->log, 0,
-+ "posted delayed event queue not empty"
-+ " making poll timeout 0");
-+ timer = 0;
-+ }
-+
- if (ngx_use_accept_mutex) {
- if (ngx_accept_disabled > 0) {
- ngx_accept_disabled--;
-@@ -257,6 +267,35 @@ ngx_process_events_and_timers(ngx_cycle_t *cycle)
- }
-
- ngx_event_process_posted(cycle, &ngx_posted_events);
-+
-+ while (!ngx_queue_empty(&ngx_posted_delayed_events)) {
-+ q = ngx_queue_head(&ngx_posted_delayed_events);
-+
-+ ev = ngx_queue_data(q, ngx_event_t, queue);
-+ if (ev->delayed) {
-+ /* start of newly inserted nodes */
-+ for (/* void */;
-+ q != ngx_queue_sentinel(&ngx_posted_delayed_events);
-+ q = ngx_queue_next(q))
-+ {
-+ ev = ngx_queue_data(q, ngx_event_t, queue);
-+ ev->delayed = 0;
-+
-+ ngx_log_debug1(NGX_LOG_DEBUG_EVENT, cycle->log, 0,
-+ "skipping delayed posted event %p,"
-+ " till next iteration", ev);
-+ }
-+
-+ break;
-+ }
-+
-+ ngx_log_debug1(NGX_LOG_DEBUG_EVENT, cycle->log, 0,
-+ "delayed posted event %p", ev);
-+
-+ ngx_delete_posted_event(ev);
-+
-+ ev->handler(ev);
-+ }
- }
-
-
-@@ -600,6 +639,7 @@ ngx_event_process_init(ngx_cycle_t *cycle)
-
- ngx_queue_init(&ngx_posted_accept_events);
- ngx_queue_init(&ngx_posted_events);
-+ ngx_queue_init(&ngx_posted_delayed_events);
-
- if (ngx_event_timer_init(cycle->log) == NGX_ERROR) {
- return NGX_ERROR;
-diff --git a/src/event/ngx_event_posted.c b/src/event/ngx_event_posted.c
-index d851f3d1..b6cea009 100644
---- a/src/event/ngx_event_posted.c
-+++ b/src/event/ngx_event_posted.c
-@@ -12,6 +12,7 @@
-
- ngx_queue_t ngx_posted_accept_events;
- ngx_queue_t ngx_posted_events;
-+ngx_queue_t ngx_posted_delayed_events;
-
-
- void
-diff --git a/src/event/ngx_event_posted.h b/src/event/ngx_event_posted.h
-index 145d30fe..6c388553 100644
---- a/src/event/ngx_event_posted.h
-+++ b/src/event/ngx_event_posted.h
-@@ -43,6 +43,9 @@ void ngx_event_process_posted(ngx_cycle_t *cycle, ngx_queue_t *posted);
-
- extern ngx_queue_t ngx_posted_accept_events;
- extern ngx_queue_t ngx_posted_events;
-+extern ngx_queue_t ngx_posted_delayed_events;
-+
-+#define HAVE_POSTED_DELAYED_EVENTS_PATCH
-
-
- #endif /* _NGX_EVENT_POSTED_H_INCLUDED_ */
diff --git a/images/nginx/rootfs/patches/nginx-1.21.4-hash_overflow.patch b/images/nginx/rootfs/patches/nginx-1.21.4-hash_overflow.patch
deleted file mode 100644
index 449d214ba..000000000
--- a/images/nginx/rootfs/patches/nginx-1.21.4-hash_overflow.patch
+++ /dev/null
@@ -1,20 +0,0 @@
-# HG changeset patch
-# User Yichun Zhang
-# Date 1412276417 25200
-# Thu Oct 02 12:00:17 2014 -0700
-# Node ID 4032b992f23b054c1a2cfb0be879330d2c6708e5
-# Parent 1ff0f68d9376e3d184d65814a6372856bf65cfcd
-Hash: buffer overflow might happen when exceeding the pre-configured limits.
-
-diff -r 1ff0f68d9376 -r 4032b992f23b src/core/ngx_hash.c
---- a/src/core/ngx_hash.c Tue Sep 30 15:50:28 2014 -0700
-+++ b/src/core/ngx_hash.c Thu Oct 02 12:00:17 2014 -0700
-@@ -312,6 +312,8 @@ ngx_hash_init(ngx_hash_init_t *hinit, ng
- continue;
- }
-
-+ size--;
-+
- ngx_log_error(NGX_LOG_WARN, hinit->pool->log, 0,
- "could not build optimal %s, you should increase "
- "either %s_max_size: %i or %s_bucket_size: %i; "
diff --git a/images/nginx/rootfs/patches/nginx-1.21.4-http2.patch b/images/nginx/rootfs/patches/nginx-1.21.4-http2.patch
deleted file mode 100644
index 3b9d57736..000000000
--- a/images/nginx/rootfs/patches/nginx-1.21.4-http2.patch
+++ /dev/null
@@ -1,57 +0,0 @@
-#commit 6ceef192e7af1c507826ac38a2d43f08bf265fb9
-#repository: https://github.com/nginx/nginx
-#Author: Maxim Dounin
-#Date: Tue Oct 10 15:13:39 2023 +0300
-diff --git a/src/http/v2/ngx_http_v2.c b/src/http/v2/ngx_http_v2.c
-index 7c05ff1e7..410a8be24 100644
---- a/src/http/v2/ngx_http_v2.c
-+++ b/src/http/v2/ngx_http_v2.c
-@@ -347,6 +347,7 @@ ngx_http_v2_read_handler(ngx_event_t *rev)
- ngx_log_debug0(NGX_LOG_DEBUG_HTTP, c->log, 0, "http2 read handler");
-
- h2c->blocked = 1;
-+ h2c->new_streams = 0;
-
- if (c->close) {
- c->close = 0;
-@@ -1284,6 +1285,14 @@ ngx_http_v2_state_headers(ngx_http_v2_connection_t *h2c, u_char *pos,
- goto rst_stream;
- }
-
-+ if (h2c->new_streams++ >= 2 * h2scf->concurrent_streams) {
-+ ngx_log_error(NGX_LOG_INFO, h2c->connection->log, 0,
-+ "client sent too many streams at once");
-+
-+ status = NGX_HTTP_V2_REFUSED_STREAM;
-+ goto rst_stream;
-+ }
-+
- if (!h2c->settings_ack
- && !(h2c->state.flags & NGX_HTTP_V2_END_STREAM_FLAG)
- && h2scf->preread_size < NGX_HTTP_V2_DEFAULT_WINDOW)
-@@ -1349,6 +1358,12 @@ ngx_http_v2_state_headers(ngx_http_v2_connection_t *h2c, u_char *pos,
-
- rst_stream:
-
-+ if (h2c->refused_streams++ > ngx_max(h2scf->concurrent_streams, 100)) {
-+ ngx_log_error(NGX_LOG_INFO, h2c->connection->log, 0,
-+ "client sent too many refused streams");
-+ return ngx_http_v2_connection_error(h2c, NGX_HTTP_V2_NO_ERROR);
-+ }
-+
- if (ngx_http_v2_send_rst_stream(h2c, h2c->state.sid, status) != NGX_OK) {
- return ngx_http_v2_connection_error(h2c, NGX_HTTP_V2_INTERNAL_ERROR);
- }
-diff --git a/src/http/v2/ngx_http_v2.h b/src/http/v2/ngx_http_v2.h
-index cb9014ccf..6751b3026 100644
---- a/src/http/v2/ngx_http_v2.h
-+++ b/src/http/v2/ngx_http_v2.h
-@@ -131,6 +131,8 @@ struct ngx_http_v2_connection_s {
- ngx_uint_t processing;
- ngx_uint_t frames;
- ngx_uint_t idle;
-+ ngx_uint_t new_streams;
-+ ngx_uint_t refused_streams;
- ngx_uint_t priority_limit;
-
- size_t send_window;
\ No newline at end of file
diff --git a/images/nginx/rootfs/patches/nginx-1.21.4-init_cycle_pool_release.patch b/images/nginx/rootfs/patches/nginx-1.21.4-init_cycle_pool_release.patch
deleted file mode 100644
index 9cfa4f7cb..000000000
--- a/images/nginx/rootfs/patches/nginx-1.21.4-init_cycle_pool_release.patch
+++ /dev/null
@@ -1,59 +0,0 @@
-diff -rup nginx-1.21.4/src/core/nginx.c nginx-1.21.4-patched/src/core/nginx.c
---- nginx-1.21.4/src/core/nginx.c 2017-12-17 00:00:38.136470108 -0800
-+++ nginx-1.21.4-patched/src/core/nginx.c 2017-12-16 23:59:51.680958322 -0800
-@@ -186,6 +186,7 @@ static u_char *ngx_prefix;
- static u_char *ngx_conf_file;
- static u_char *ngx_conf_params;
- static char *ngx_signal;
-+ngx_pool_t *saved_init_cycle_pool = NULL;
-
-
- static char **ngx_os_environ;
-@@ -253,6 +254,8 @@ main(int argc, char *const *argv)
- return 1;
- }
-
-+ saved_init_cycle_pool = init_cycle.pool;
-+
- if (ngx_save_argv(&init_cycle, argc, argv) != NGX_OK) {
- return 1;
- }
-diff -rup nginx-1.21.4/src/core/ngx_core.h nginx-1.21.4-patched/src/core/ngx_core.h
---- nginx-1.21.4/src/core/ngx_core.h 2017-10-10 08:22:51.000000000 -0700
-+++ nginx-1.21.4-patched/src/core/ngx_core.h 2017-12-16 23:59:51.679958370 -0800
-@@ -108,4 +108,6 @@ void ngx_cpuinfo(void);
- #define NGX_DISABLE_SYMLINKS_NOTOWNER 2
- #endif
-
-+extern ngx_pool_t *saved_init_cycle_pool;
-+
- #endif /* _NGX_CORE_H_INCLUDED_ */
-diff -rup nginx-1.21.4/src/core/ngx_cycle.c nginx-1.21.4-patched/src/core/ngx_cycle.c
---- nginx-1.21.4/src/core/ngx_cycle.c 2017-10-10 08:22:51.000000000 -0700
-+++ nginx-1.21.4-patched/src/core/ngx_cycle.c 2017-12-16 23:59:51.678958419 -0800
-@@ -748,6 +748,10 @@ old_shm_zone_done:
-
- if (ngx_process == NGX_PROCESS_MASTER || ngx_is_init_cycle(old_cycle)) {
-
-+ if (ngx_is_init_cycle(old_cycle)) {
-+ saved_init_cycle_pool = NULL;
-+ }
-+
- ngx_destroy_pool(old_cycle->pool);
- cycle->old_cycle = NULL;
-
-diff -rup nginx-1.21.4/src/os/unix/ngx_process_cycle.c nginx-1.21.4-patched/src/os/unix/ngx_process_cycle.c
---- nginx-1.21.4/src/os/unix/ngx_process_cycle.c 2017-12-17 00:00:38.142469762 -0800
-+++ nginx-1.21.4-patched/src/os/unix/ngx_process_cycle.c 2017-12-16 23:59:51.691957791 -0800
-@@ -687,6 +692,11 @@ ngx_master_process_exit(ngx_cycle_t *cyc
- ngx_exit_cycle.files_n = ngx_cycle->files_n;
- ngx_cycle = &ngx_exit_cycle;
-
-+ if (saved_init_cycle_pool != NULL && saved_init_cycle_pool != cycle->pool) {
-+ ngx_destroy_pool(saved_init_cycle_pool);
-+ saved_init_cycle_pool = NULL;
-+ }
-+
- ngx_destroy_pool(cycle->pool);
-
- exit(0);
diff --git a/images/nginx/rootfs/patches/nginx-1.21.4-larger_max_error_str.patch b/images/nginx/rootfs/patches/nginx-1.21.4-larger_max_error_str.patch
deleted file mode 100644
index c89032c9f..000000000
--- a/images/nginx/rootfs/patches/nginx-1.21.4-larger_max_error_str.patch
+++ /dev/null
@@ -1,13 +0,0 @@
---- nginx-1.21.4/src/core/ngx_log.h 2013-10-08 05:07:14.000000000 -0700
-+++ nginx-1.21.4-patched/src/core/ngx_log.h 2013-12-05 20:35:35.996236720 -0800
-@@ -64,7 +64,9 @@ struct ngx_log_s {
- };
-
-
--#define NGX_MAX_ERROR_STR 2048
-+#ifndef NGX_MAX_ERROR_STR
-+#define NGX_MAX_ERROR_STR 4096
-+#endif
-
-
- /*********************************/
diff --git a/images/nginx/rootfs/patches/nginx-1.21.4-no_Werror.patch b/images/nginx/rootfs/patches/nginx-1.21.4-no_Werror.patch
deleted file mode 100644
index f4d6fd0e5..000000000
--- a/images/nginx/rootfs/patches/nginx-1.21.4-no_Werror.patch
+++ /dev/null
@@ -1,36 +0,0 @@
-diff -urp nginx-1.21.4/auto/cc/clang nginx-1.21.4-patched/auto/cc/clang
---- nginx-1.21.4/auto/cc/clang 2014-03-04 03:39:24.000000000 -0800
-+++ nginx-1.21.4-patched/auto/cc/clang 2014-03-13 20:54:26.241413360 -0700
-@@ -89,7 +89,7 @@ CFLAGS="$CFLAGS -Wconditional-uninitiali
- CFLAGS="$CFLAGS -Wno-unused-parameter"
-
- # stop on warning
--CFLAGS="$CFLAGS -Werror"
-+#CFLAGS="$CFLAGS -Werror"
-
- # debug
- CFLAGS="$CFLAGS -g"
-diff -urp nginx-1.21.4/auto/cc/gcc nginx-1.21.4-patched/auto/cc/gcc
---- nginx-1.21.4/auto/cc/gcc 2014-03-04 03:39:24.000000000 -0800
-+++ nginx-1.21.4-patched/auto/cc/gcc 2014-03-13 20:54:13.301355329 -0700
-@@ -168,7 +168,7 @@ esac
-
-
- # stop on warning
--CFLAGS="$CFLAGS -Werror"
-+#CFLAGS="$CFLAGS -Werror"
-
- # debug
- CFLAGS="$CFLAGS -g"
-diff -urp nginx-1.21.4/auto/cc/icc nginx-1.21.4-patched/auto/cc/icc
---- nginx-1.21.4/auto/cc/icc 2014-03-04 03:39:24.000000000 -0800
-+++ nginx-1.21.4-patched/auto/cc/icc 2014-03-13 20:54:13.301355329 -0700
-@@ -115,7 +115,7 @@ case "$NGX_ICC_VER" in
- esac
-
- # stop on warning
--CFLAGS="$CFLAGS -Werror"
-+#CFLAGS="$CFLAGS -Werror"
-
- # debug
- CFLAGS="$CFLAGS -g"
diff --git a/images/nginx/rootfs/patches/nginx-1.21.4-proxy_host_port_vars.patch b/images/nginx/rootfs/patches/nginx-1.21.4-proxy_host_port_vars.patch
deleted file mode 100644
index 01cebd65a..000000000
--- a/images/nginx/rootfs/patches/nginx-1.21.4-proxy_host_port_vars.patch
+++ /dev/null
@@ -1,19 +0,0 @@
---- nginx-1.21.4/src/http/modules/ngx_http_proxy_module.c 2017-07-16 14:02:51.000000000 +0800
-+++ nginx-1.21.4-patched/src/http/modules/ngx_http_proxy_module.c 2017-07-16 14:02:51.000000000 +0800
-@@ -793,13 +793,13 @@ static ngx_keyval_t ngx_http_proxy_cach
- static ngx_http_variable_t ngx_http_proxy_vars[] = {
-
- { ngx_string("proxy_host"), NULL, ngx_http_proxy_host_variable, 0,
-- NGX_HTTP_VAR_CHANGEABLE|NGX_HTTP_VAR_NOCACHEABLE|NGX_HTTP_VAR_NOHASH, 0 },
-+ NGX_HTTP_VAR_CHANGEABLE|NGX_HTTP_VAR_NOCACHEABLE, 0 },
-
- { ngx_string("proxy_port"), NULL, ngx_http_proxy_port_variable, 0,
-- NGX_HTTP_VAR_CHANGEABLE|NGX_HTTP_VAR_NOCACHEABLE|NGX_HTTP_VAR_NOHASH, 0 },
-+ NGX_HTTP_VAR_CHANGEABLE|NGX_HTTP_VAR_NOCACHEABLE, 0 },
-
- { ngx_string("proxy_add_x_forwarded_for"), NULL,
-- ngx_http_proxy_add_x_forwarded_for_variable, 0, NGX_HTTP_VAR_NOHASH, 0 },
-+ ngx_http_proxy_add_x_forwarded_for_variable, 0, 0, 0 },
-
- #if 0
- { ngx_string("proxy_add_via"), NULL, NULL, 0, NGX_HTTP_VAR_NOHASH, 0 },
diff --git a/images/nginx/rootfs/patches/nginx-1.21.4-resolver_conf_parsing.patch b/images/nginx/rootfs/patches/nginx-1.21.4-resolver_conf_parsing.patch
deleted file mode 100644
index 8638cdf2a..000000000
--- a/images/nginx/rootfs/patches/nginx-1.21.4-resolver_conf_parsing.patch
+++ /dev/null
@@ -1,263 +0,0 @@
-diff --git a/src/core/ngx_resolver.c b/src/core/ngx_resolver.c
-index cd55520c..dade1846 100644
---- a/src/core/ngx_resolver.c
-+++ b/src/core/ngx_resolver.c
-@@ -9,12 +9,26 @@
- #include
- #include
-
-+#if !(NGX_WIN32)
-+#include
-+#endif
-+
-
- #define NGX_RESOLVER_UDP_SIZE 4096
-
- #define NGX_RESOLVER_TCP_RSIZE (2 + 65535)
- #define NGX_RESOLVER_TCP_WSIZE 8192
-
-+#if !(NGX_WIN32)
-+/*
-+ * note that 2KB should be more than enough for majority of the
-+ * resolv.conf files out there. it also acts as a safety guard to prevent
-+ * abuse.
-+ */
-+#define NGX_RESOLVER_FILE_BUF_SIZE 2048
-+#define NGX_RESOLVER_FILE_NAME "/etc/resolv.conf"
-+#endif
-+
-
- typedef struct {
- u_char ident_hi;
-@@ -131,6 +145,191 @@ static ngx_resolver_node_t *ngx_resolver_lookup_addr6(ngx_resolver_t *r,
- #endif
-
-
-+#if !(NGX_WIN32)
-+static ngx_int_t
-+ngx_resolver_read_resolv_conf(ngx_conf_t *cf, ngx_resolver_t *r, u_char *path,
-+ size_t path_len)
-+{
-+ ngx_url_t u;
-+ ngx_resolver_connection_t *rec;
-+ ngx_fd_t fd;
-+ ngx_file_t file;
-+ u_char buf[NGX_RESOLVER_FILE_BUF_SIZE];
-+ u_char ipv6_buf[NGX_INET6_ADDRSTRLEN];
-+ ngx_uint_t address = 0, j, total = 0;
-+ ssize_t n, i;
-+ enum {
-+ sw_nameserver,
-+ sw_spaces,
-+ sw_address,
-+ sw_skip
-+ } state;
-+
-+ file.name.data = path;
-+ file.name.len = path_len;
-+
-+ if (ngx_conf_full_name(cf->cycle, &file.name, 1) != NGX_OK) {
-+ return NGX_ERROR;
-+ }
-+
-+ fd = ngx_open_file(file.name.data, NGX_FILE_RDONLY,
-+ NGX_FILE_OPEN, 0);
-+
-+ if (fd == NGX_INVALID_FILE) {
-+ ngx_conf_log_error(NGX_LOG_EMERG, cf, ngx_errno,
-+ ngx_open_file_n " \"%s\" failed", file.name.data);
-+
-+ return NGX_ERROR;
-+ }
-+
-+ ngx_memzero(&file, sizeof(ngx_file_t));
-+
-+ file.fd = fd;
-+ file.log = cf->log;
-+
-+ state = sw_nameserver;
-+
-+ n = ngx_read_file(&file, buf, NGX_RESOLVER_FILE_BUF_SIZE, 0);
-+
-+ if (n == NGX_ERROR) {
-+ ngx_conf_log_error(NGX_LOG_ALERT, cf, ngx_errno,
-+ ngx_read_file_n " \"%s\" failed", file.name.data);
-+ }
-+
-+ if (ngx_close_file(file.fd) == NGX_FILE_ERROR) {
-+ ngx_conf_log_error(NGX_LOG_ALERT, cf, ngx_errno,
-+ ngx_close_file_n " \"%s\" failed", file.name.data);
-+ }
-+
-+ if (n == NGX_ERROR) {
-+ return NGX_ERROR;
-+ }
-+
-+ if (n == 0) {
-+ return NGX_OK;
-+ }
-+
-+ for (i = 0; i < n && total < MAXNS; /* void */) {
-+ if (buf[i] == '#' || buf[i] == ';') {
-+ state = sw_skip;
-+ }
-+
-+ switch (state) {
-+
-+ case sw_nameserver:
-+
-+ if ((size_t) n - i >= sizeof("nameserver") - 1
-+ && ngx_memcmp(buf + i, "nameserver",
-+ sizeof("nameserver") - 1) == 0)
-+ {
-+ state = sw_spaces;
-+ i += sizeof("nameserver") - 1;
-+
-+ continue;
-+ }
-+
-+ break;
-+
-+ case sw_spaces:
-+ if (buf[i] != '\t' && buf[i] != ' ') {
-+ address = i;
-+ state = sw_address;
-+ }
-+
-+ break;
-+
-+ case sw_address:
-+
-+ if (buf[i] == CR || buf[i] == LF || i == n - 1) {
-+ ngx_memzero(&u, sizeof(ngx_url_t));
-+
-+ u.url.data = buf + address;
-+
-+ if (i == n - 1 && buf[i] != CR && buf[i] != LF) {
-+ u.url.len = n - address;
-+
-+ } else {
-+ u.url.len = i - address;
-+ }
-+
-+ u.default_port = 53;
-+
-+ /* IPv6? */
-+ if (ngx_strlchr(u.url.data, u.url.data + u.url.len,
-+ ':') != NULL)
-+ {
-+ if (u.url.len + 2 > sizeof(ipv6_buf)) {
-+ ngx_conf_log_error(NGX_LOG_EMERG, cf, 0,
-+ "IPv6 resolver address is too long:"
-+ " \"%V\"", &u.url);
-+
-+ return NGX_ERROR;
-+ }
-+
-+ ipv6_buf[0] = '[';
-+ ngx_memcpy(ipv6_buf + 1, u.url.data, u.url.len);
-+ ipv6_buf[u.url.len + 1] = ']';
-+
-+ u.url.data = ipv6_buf;
-+ u.url.len = u.url.len + 2;
-+ }
-+
-+ if (ngx_parse_url(cf->pool, &u) != NGX_OK) {
-+ if (u.err) {
-+ ngx_conf_log_error(NGX_LOG_EMERG, cf, 0,
-+ "%s in resolver \"%V\"",
-+ u.err, &u.url);
-+ }
-+
-+ return NGX_ERROR;
-+ }
-+
-+ rec = ngx_array_push_n(&r->connections, u.naddrs);
-+ if (rec == NULL) {
-+ return NGX_ERROR;
-+ }
-+
-+ ngx_memzero(rec, u.naddrs * sizeof(ngx_resolver_connection_t));
-+
-+ for (j = 0; j < u.naddrs; j++) {
-+ rec[j].sockaddr = u.addrs[j].sockaddr;
-+ rec[j].socklen = u.addrs[j].socklen;
-+ rec[j].server = u.addrs[j].name;
-+ rec[j].resolver = r;
-+ }
-+
-+ total++;
-+
-+#if (NGX_DEBUG)
-+ /*
-+ * logs with level below NGX_LOG_NOTICE will not be printed
-+ * in this early phase
-+ */
-+ ngx_conf_log_error(NGX_LOG_NOTICE, cf, 0,
-+ "parsed a resolver: \"%V\"", &u.url);
-+#endif
-+
-+ state = sw_nameserver;
-+ }
-+
-+ break;
-+
-+ case sw_skip:
-+ if (buf[i] == CR || buf[i] == LF) {
-+ state = sw_nameserver;
-+ }
-+
-+ break;
-+ }
-+
-+ i++;
-+ }
-+
-+ return NGX_OK;
-+}
-+#endif
-+
-+
- ngx_resolver_t *
- ngx_resolver_create(ngx_conf_t *cf, ngx_str_t *names, ngx_uint_t n)
- {
-@@ -246,6 +445,39 @@ ngx_resolver_create(ngx_conf_t *cf, ngx_str_t *names, ngx_uint_t n)
- }
- #endif
-
-+#if !(NGX_WIN32)
-+ if (ngx_strncmp(names[i].data, "local=", 6) == 0) {
-+
-+ if (ngx_strcmp(&names[i].data[6], "on") == 0) {
-+ if (ngx_resolver_read_resolv_conf(cf, r,
-+ (u_char *)
-+ NGX_RESOLVER_FILE_NAME,
-+ sizeof(NGX_RESOLVER_FILE_NAME)
-+ - 1)
-+ != NGX_OK)
-+ {
-+ ngx_conf_log_error(NGX_LOG_EMERG, cf, 0,
-+ "unable to parse local resolver");
-+ return NULL;
-+ }
-+
-+ } else if (ngx_strcmp(&names[i].data[6], "off") != 0) {
-+ if (ngx_resolver_read_resolv_conf(cf, r,
-+ &names[i].data[6],
-+ names[i].len - 6)
-+ != NGX_OK)
-+ {
-+ ngx_conf_log_error(NGX_LOG_EMERG, cf, 0,
-+ "unable to parse local resolver");
-+ return NULL;
-+ }
-+
-+ }
-+
-+ continue;
-+ }
-+#endif
-+
- ngx_memzero(&u, sizeof(ngx_url_t));
-
- u.url = names[i];
diff --git a/images/nginx/rootfs/patches/nginx-1.21.4-reuseport_close_unused_fds.patch b/images/nginx/rootfs/patches/nginx-1.21.4-reuseport_close_unused_fds.patch
deleted file mode 100644
index ff4a36fd2..000000000
--- a/images/nginx/rootfs/patches/nginx-1.21.4-reuseport_close_unused_fds.patch
+++ /dev/null
@@ -1,38 +0,0 @@
-diff --git a/src/core/ngx_connection.c b/src/core/ngx_connection.c
---- a/src/core/ngx_connection.c
-+++ b/src/core/ngx_connection.c
-@@ -1118,6 +1118,12 @@ ngx_close_listening_sockets(ngx_cycle_t *cycle)
- ls = cycle->listening.elts;
- for (i = 0; i < cycle->listening.nelts; i++) {
-
-+#if (NGX_HAVE_REUSEPORT)
-+ if (ls[i].fd == (ngx_socket_t) -1) {
-+ continue;
-+ }
-+#endif
-+
- c = ls[i].connection;
-
- if (c) {
-diff --git a/src/event/ngx_event.c b/src/event/ngx_event.c
---- a/src/event/ngx_event.c
-+++ b/src/event/ngx_event.c
-@@ -775,6 +775,18 @@ ngx_event_process_init(ngx_cycle_t *cycle)
-
- #if (NGX_HAVE_REUSEPORT)
- if (ls[i].reuseport && ls[i].worker != ngx_worker) {
-+ ngx_log_debug2(NGX_LOG_DEBUG_CORE, cycle->log, 0,
-+ "closing unused fd:%d listening on %V",
-+ ls[i].fd, &ls[i].addr_text);
-+
-+ if (ngx_close_socket(ls[i].fd) == -1) {
-+ ngx_log_error(NGX_LOG_EMERG, cycle->log, ngx_socket_errno,
-+ ngx_close_socket_n " %V failed",
-+ &ls[i].addr_text);
-+ }
-+
-+ ls[i].fd = (ngx_socket_t) -1;
-+
- continue;
- }
- #endif
diff --git a/images/nginx/rootfs/patches/nginx-1.21.4-single_process_graceful_exit.patch b/images/nginx/rootfs/patches/nginx-1.21.4-single_process_graceful_exit.patch
deleted file mode 100644
index 2754fc2fe..000000000
--- a/images/nginx/rootfs/patches/nginx-1.21.4-single_process_graceful_exit.patch
+++ /dev/null
@@ -1,75 +0,0 @@
-diff --git a/src/os/unix/ngx_process.c b/src/os/unix/ngx_process.c
-index 15680237..12a8c687 100644
---- a/src/os/unix/ngx_process.c
-+++ b/src/os/unix/ngx_process.c
-@@ -362,8 +362,15 @@ ngx_signal_handler(int signo, siginfo_t *siginfo, void *ucontext)
- break;
-
- case ngx_signal_value(NGX_RECONFIGURE_SIGNAL):
-- ngx_reconfigure = 1;
-- action = ", reconfiguring";
-+ if (ngx_process == NGX_PROCESS_SINGLE) {
-+ ngx_terminate = 1;
-+ action = ", exiting";
-+
-+ } else {
-+ ngx_reconfigure = 1;
-+ action = ", reconfiguring";
-+ }
-+
- break;
-
- case ngx_signal_value(NGX_REOPEN_SIGNAL):
-diff --git a/src/os/unix/ngx_process_cycle.c b/src/os/unix/ngx_process_cycle.c
-index 5817a2c2..f3d58e97 100644
---- a/src/os/unix/ngx_process_cycle.c
-+++ b/src/os/unix/ngx_process_cycle.c
-@@ -305,11 +305,26 @@ ngx_single_process_cycle(ngx_cycle_t *cycle)
- }
-
- for ( ;; ) {
-+ if (ngx_exiting) {
-+ if (ngx_event_no_timers_left() == NGX_OK) {
-+ ngx_log_error(NGX_LOG_NOTICE, cycle->log, 0, "exiting");
-+
-+ for (i = 0; cycle->modules[i]; i++) {
-+ if (cycle->modules[i]->exit_process) {
-+ cycle->modules[i]->exit_process(cycle);
-+ }
-+ }
-+
-+ ngx_master_process_exit(cycle);
-+ }
-+ }
-+
- ngx_log_debug0(NGX_LOG_DEBUG_EVENT, cycle->log, 0, "worker cycle");
-
- ngx_process_events_and_timers(cycle);
-
-- if (ngx_terminate || ngx_quit) {
-+ if (ngx_terminate) {
-+ ngx_log_error(NGX_LOG_NOTICE, cycle->log, 0, "exiting");
-
- for (i = 0; cycle->modules[i]; i++) {
- if (cycle->modules[i]->exit_process) {
-@@ -320,6 +335,20 @@ ngx_single_process_cycle(ngx_cycle_t *cycle)
- ngx_master_process_exit(cycle);
- }
-
-+ if (ngx_quit) {
-+ ngx_quit = 0;
-+ ngx_log_error(NGX_LOG_NOTICE, cycle->log, 0,
-+ "gracefully shutting down");
-+ ngx_setproctitle("process is shutting down");
-+
-+ if (!ngx_exiting) {
-+ ngx_exiting = 1;
-+ ngx_set_shutdown_timer(cycle);
-+ ngx_close_listening_sockets(cycle);
-+ ngx_close_idle_connections(cycle);
-+ }
-+ }
-+
- if (ngx_reconfigure) {
- ngx_reconfigure = 0;
- ngx_log_error(NGX_LOG_NOTICE, cycle->log, 0, "reconfiguring");
diff --git a/images/nginx/rootfs/patches/nginx-1.21.4-socket_cloexec.patch b/images/nginx/rootfs/patches/nginx-1.21.4-socket_cloexec.patch
deleted file mode 100644
index 8ffe4c167..000000000
--- a/images/nginx/rootfs/patches/nginx-1.21.4-socket_cloexec.patch
+++ /dev/null
@@ -1,185 +0,0 @@
-diff --git a/auto/unix b/auto/unix
-index 10835f6c..b5b33bb3 100644
---- a/auto/unix
-+++ b/auto/unix
-@@ -990,3 +990,27 @@ ngx_feature_test='struct addrinfo *res;
- if (getaddrinfo("localhost", NULL, NULL, &res) != 0) return 1;
- freeaddrinfo(res)'
- . auto/feature
-+
-+ngx_feature="SOCK_CLOEXEC support"
-+ngx_feature_name="NGX_HAVE_SOCKET_CLOEXEC"
-+ngx_feature_run=no
-+ngx_feature_incs="#include
-+ #include "
-+ngx_feature_path=
-+ngx_feature_libs=
-+ngx_feature_test="int fd;
-+ fd = socket(AF_INET, SOCK_STREAM | SOCK_CLOEXEC, 0);"
-+. auto/feature
-+
-+ngx_feature="FD_CLOEXEC support"
-+ngx_feature_name="NGX_HAVE_FD_CLOEXEC"
-+ngx_feature_run=no
-+ngx_feature_incs="#include
-+ #include
-+ #include "
-+ngx_feature_path=
-+ngx_feature_libs=
-+ngx_feature_test="int fd;
-+ fd = socket(AF_INET, SOCK_STREAM, 0);
-+ fcntl(fd, F_SETFD, FD_CLOEXEC);"
-+. auto/feature
-diff --git a/src/core/ngx_resolver.c b/src/core/ngx_resolver.c
-index cd55520c..438e0806 100644
---- a/src/core/ngx_resolver.c
-+++ b/src/core/ngx_resolver.c
-@@ -4466,8 +4466,14 @@ ngx_tcp_connect(ngx_resolver_connection_t *rec)
- ngx_event_t *rev, *wev;
- ngx_connection_t *c;
-
-+#if (NGX_HAVE_SOCKET_CLOEXEC)
-+ s = ngx_socket(rec->sockaddr->sa_family, SOCK_STREAM | SOCK_CLOEXEC, 0);
-+
-+#else
- s = ngx_socket(rec->sockaddr->sa_family, SOCK_STREAM, 0);
-
-+#endif
-+
- ngx_log_debug1(NGX_LOG_DEBUG_EVENT, &rec->log, 0, "TCP socket %d", s);
-
- if (s == (ngx_socket_t) -1) {
-@@ -4494,6 +4500,15 @@ ngx_tcp_connect(ngx_resolver_connection_t *rec)
- goto failed;
- }
-
-+#if (NGX_HAVE_FD_CLOEXEC)
-+ if (ngx_cloexec(s) == -1) {
-+ ngx_log_error(NGX_LOG_ALERT, &rec->log, ngx_socket_errno,
-+ ngx_cloexec_n " failed");
-+
-+ goto failed;
-+ }
-+#endif
-+
- rev = c->read;
- wev = c->write;
-
-diff --git a/src/event/ngx_event.h b/src/event/ngx_event.h
-index 19fec68..8c2f01a 100644
---- a/src/event/ngx_event.h
-+++ b/src/event/ngx_event.h
-@@ -73,6 +73,9 @@ struct ngx_event_s {
- /* to test on worker exit */
- unsigned channel:1;
- unsigned resolver:1;
-+#if (HAVE_SOCKET_CLOEXEC_PATCH)
-+ unsigned skip_socket_leak_check:1;
-+#endif
-
- unsigned cancelable:1;
-
-diff --git a/src/event/ngx_event_accept.c b/src/event/ngx_event_accept.c
-index 77563709..5827b9d0 100644
---- a/src/event/ngx_event_accept.c
-+++ b/src/event/ngx_event_accept.c
-@@ -62,7 +62,9 @@ ngx_event_accept(ngx_event_t *ev)
-
- #if (NGX_HAVE_ACCEPT4)
- if (use_accept4) {
-- s = accept4(lc->fd, &sa.sockaddr, &socklen, SOCK_NONBLOCK);
-+ s = accept4(lc->fd, &sa.sockaddr, &socklen,
-+ SOCK_NONBLOCK | SOCK_CLOEXEC);
-+
- } else {
- s = accept(lc->fd, &sa.sockaddr, &socklen);
- }
-@@ -202,6 +204,16 @@ ngx_event_accept(ngx_event_t *ev)
- ngx_close_accepted_connection(c);
- return;
- }
-+
-+#if (NGX_HAVE_FD_CLOEXEC)
-+ if (ngx_cloexec(s) == -1) {
-+ ngx_log_error(NGX_LOG_ALERT, ev->log, ngx_socket_errno,
-+ ngx_cloexec_n " failed");
-+ ngx_close_accepted_connection(c);
-+ return;
-+ }
-+#endif
-+
- }
- }
-
-diff --git a/src/event/ngx_event_connect.c b/src/event/ngx_event_connect.c
-index c5bb8068..cf33b1d2 100644
---- a/src/event/ngx_event_connect.c
-+++ b/src/event/ngx_event_connect.c
-@@ -38,8 +38,15 @@ ngx_event_connect_peer(ngx_peer_connection_t *pc)
-
- type = (pc->type ? pc->type : SOCK_STREAM);
-
-+#if (NGX_HAVE_SOCKET_CLOEXEC)
-+ s = ngx_socket(pc->sockaddr->sa_family, type | SOCK_CLOEXEC, 0);
-+
-+#else
- s = ngx_socket(pc->sockaddr->sa_family, type, 0);
-
-+#endif
-+
-+
- ngx_log_debug2(NGX_LOG_DEBUG_EVENT, pc->log, 0, "%s socket %d",
- (type == SOCK_STREAM) ? "stream" : "dgram", s);
-
-@@ -80,6 +87,15 @@ ngx_event_connect_peer(ngx_peer_connection_t *pc)
- goto failed;
- }
-
-+#if (NGX_HAVE_FD_CLOEXEC)
-+ if (ngx_cloexec(s) == -1) {
-+ ngx_log_error(NGX_LOG_ALERT, pc->log, ngx_socket_errno,
-+ ngx_cloexec_n " failed");
-+
-+ goto failed;
-+ }
-+#endif
-+
- if (pc->local) {
-
- #if (NGX_HAVE_TRANSPARENT_PROXY)
-diff --git a/src/os/unix/ngx_process_cycle.c b/src/os/unix/ngx_process_cycle.c
-index c4376a5..48e8fa8 100644
---- a/src/os/unix/ngx_process_cycle.c
-+++ b/src/os/unix/ngx_process_cycle.c
-@@ -960,6 +1029,9 @@ ngx_worker_process_exit(ngx_cycle_t *cycle)
- for (i = 0; i < cycle->connection_n; i++) {
- if (c[i].fd != -1
- && c[i].read
-+#if (HAVE_SOCKET_CLOEXEC_PATCH)
-+ && !c[i].read->skip_socket_leak_check
-+#endif
- && !c[i].read->accept
- && !c[i].read->channel
- && !c[i].read->resolver)
-diff --git a/src/os/unix/ngx_socket.h b/src/os/unix/ngx_socket.h
-index fcc51533..d1eebf47 100644
---- a/src/os/unix/ngx_socket.h
-+++ b/src/os/unix/ngx_socket.h
-@@ -38,6 +38,17 @@ int ngx_blocking(ngx_socket_t s);
-
- #endif
-
-+#if (NGX_HAVE_FD_CLOEXEC)
-+
-+#define ngx_cloexec(s) fcntl(s, F_SETFD, FD_CLOEXEC)
-+#define ngx_cloexec_n "fcntl(FD_CLOEXEC)"
-+
-+/* at least FD_CLOEXEC is required to ensure connection fd is closed
-+ * after execve */
-+#define HAVE_SOCKET_CLOEXEC_PATCH 1
-+
-+#endif
-+
- int ngx_tcp_nopush(ngx_socket_t s);
- int ngx_tcp_push(ngx_socket_t s);
-
diff --git a/images/nginx/rootfs/patches/nginx-1.21.4-ssl_cert_cb_yield.patch b/images/nginx/rootfs/patches/nginx-1.21.4-ssl_cert_cb_yield.patch
deleted file mode 100644
index 89773c05e..000000000
--- a/images/nginx/rootfs/patches/nginx-1.21.4-ssl_cert_cb_yield.patch
+++ /dev/null
@@ -1,64 +0,0 @@
-# HG changeset patch
-# User Yichun Zhang
-# Date 1451762084 28800
-# Sat Jan 02 11:14:44 2016 -0800
-# Node ID 449f0461859c16e95bdb18e8be6b94401545d3dd
-# Parent 78b4e10b4367b31367aad3c83c9c3acdd42397c4
-SSL: handled SSL_CTX_set_cert_cb() callback yielding.
-
-OpenSSL 1.0.2+ introduces SSL_CTX_set_cert_cb() to allow custom
-callbacks to serve the SSL certificiates and private keys dynamically
-and lazily. The callbacks may yield for nonblocking I/O or sleeping.
-Here we added support for such usage in NGINX 3rd-party modules
-(like ngx_lua) in NGINX's event handlers for downstream SSL
-connections.
-
-diff -r 78b4e10b4367 -r 449f0461859c src/event/ngx_event_openssl.c
---- a/src/event/ngx_event_openssl.c Thu Dec 17 16:39:15 2015 +0300
-+++ b/src/event/ngx_event_openssl.c Sat Jan 02 11:14:44 2016 -0800
-@@ -1445,6 +1445,23 @@ ngx_ssl_handshake(ngx_connection_t *c)
- return NGX_AGAIN;
- }
-
-+#if OPENSSL_VERSION_NUMBER >= 0x10002000L
-+ if (sslerr == SSL_ERROR_WANT_X509_LOOKUP) {
-+ c->read->handler = ngx_ssl_handshake_handler;
-+ c->write->handler = ngx_ssl_handshake_handler;
-+
-+ if (ngx_handle_read_event(c->read, 0) != NGX_OK) {
-+ return NGX_ERROR;
-+ }
-+
-+ if (ngx_handle_write_event(c->write, 0) != NGX_OK) {
-+ return NGX_ERROR;
-+ }
-+
-+ return NGX_AGAIN;
-+ }
-+#endif
-+
- err = (sslerr == SSL_ERROR_SYSCALL) ? ngx_errno : 0;
-
- c->ssl->no_wait_shutdown = 1;
-@@ -1558,6 +1575,21 @@ ngx_ssl_try_early_data(ngx_connection_t *c)
- return NGX_AGAIN;
- }
-
-+ if (sslerr == SSL_ERROR_WANT_X509_LOOKUP) {
-+ c->read->handler = ngx_ssl_handshake_handler;
-+ c->write->handler = ngx_ssl_handshake_handler;
-+
-+ if (ngx_handle_read_event(c->read, 0) != NGX_OK) {
-+ return NGX_ERROR;
-+ }
-+
-+ if (ngx_handle_write_event(c->write, 0) != NGX_OK) {
-+ return NGX_ERROR;
-+ }
-+
-+ return NGX_AGAIN;
-+ }
-+
- err = (sslerr == SSL_ERROR_SYSCALL) ? ngx_errno : 0;
-
- c->ssl->no_wait_shutdown = 1;
diff --git a/images/nginx/rootfs/patches/nginx-1.21.4-ssl_sess_cb_yield.patch b/images/nginx/rootfs/patches/nginx-1.21.4-ssl_sess_cb_yield.patch
deleted file mode 100644
index ac5fe65eb..000000000
--- a/images/nginx/rootfs/patches/nginx-1.21.4-ssl_sess_cb_yield.patch
+++ /dev/null
@@ -1,41 +0,0 @@
-diff --git a/src/event/ngx_event_openssl.c b/src/event/ngx_event_openssl.c
---- a/src/event/ngx_event_openssl.c
-+++ b/src/event/ngx_event_openssl.c
-@@ -1446,7 +1446,12 @@ ngx_ssl_handshake(ngx_connection_t *c)
- }
-
- #if OPENSSL_VERSION_NUMBER >= 0x10002000L
-- if (sslerr == SSL_ERROR_WANT_X509_LOOKUP) {
-+ if (sslerr == SSL_ERROR_WANT_X509_LOOKUP
-+# ifdef SSL_ERROR_PENDING_SESSION
-+ || sslerr == SSL_ERROR_PENDING_SESSION
-+# endif
-+ )
-+ {
- c->read->handler = ngx_ssl_handshake_handler;
- c->write->handler = ngx_ssl_handshake_handler;
-
-@@ -1575,6 +1580,23 @@ ngx_ssl_try_early_data(ngx_connection_t *c)
- return NGX_AGAIN;
- }
-
-+#ifdef SSL_ERROR_PENDING_SESSION
-+ if (sslerr == SSL_ERROR_PENDING_SESSION) {
-+ c->read->handler = ngx_ssl_handshake_handler;
-+ c->write->handler = ngx_ssl_handshake_handler;
-+
-+ if (ngx_handle_read_event(c->read, 0) != NGX_OK) {
-+ return NGX_ERROR;
-+ }
-+
-+ if (ngx_handle_write_event(c->write, 0) != NGX_OK) {
-+ return NGX_ERROR;
-+ }
-+
-+ return NGX_AGAIN;
-+ }
-+#endif
-+
- err = (sslerr == SSL_ERROR_SYSCALL) ? ngx_errno : 0;
-
- c->ssl->no_wait_shutdown = 1;
diff --git a/images/nginx/rootfs/patches/nginx-1.21.4-stream_proxy_get_next_upstream_tries.patch b/images/nginx/rootfs/patches/nginx-1.21.4-stream_proxy_get_next_upstream_tries.patch
deleted file mode 100644
index cb881f070..000000000
--- a/images/nginx/rootfs/patches/nginx-1.21.4-stream_proxy_get_next_upstream_tries.patch
+++ /dev/null
@@ -1,31 +0,0 @@
-diff --git a/src/stream/ngx_stream.h b/src/stream/ngx_stream.h
-index 09d2459..de92724 100644
---- a/src/stream/ngx_stream.h
-+++ b/src/stream/ngx_stream.h
-@@ -303,4 +303,7 @@ typedef ngx_int_t (*ngx_stream_filter_pt)(ngx_stream_session_t *s,
- extern ngx_stream_filter_pt ngx_stream_top_filter;
-
-
-+#define HAS_NGX_STREAM_PROXY_GET_NEXT_UPSTREAM_TRIES_PATCH 1
-+
-+
- #endif /* _NGX_STREAM_H_INCLUDED_ */
-diff --git a/src/stream/ngx_stream_proxy_module.c b/src/stream/ngx_stream_proxy_module.c
-index 0afde1c..3254ce1 100644
---- a/src/stream/ngx_stream_proxy_module.c
-+++ b/src/stream/ngx_stream_proxy_module.c
-@@ -2156,3 +2156,14 @@ ngx_stream_proxy_bind(ngx_conf_t *cf, ngx_command_t *cmd, void *conf)
-
- return NGX_CONF_OK;
- }
-+
-+
-+ngx_uint_t
-+ngx_stream_proxy_get_next_upstream_tries(ngx_stream_session_t *s)
-+{
-+ ngx_stream_proxy_srv_conf_t *pscf;
-+
-+ pscf = ngx_stream_get_module_srv_conf(s, ngx_stream_proxy_module);
-+
-+ return pscf->next_upstream_tries;
-+}
diff --git a/images/nginx/rootfs/patches/nginx-1.21.4-stream_ssl_preread_no_skip.patch b/images/nginx/rootfs/patches/nginx-1.21.4-stream_ssl_preread_no_skip.patch
deleted file mode 100644
index e45e9f69a..000000000
--- a/images/nginx/rootfs/patches/nginx-1.21.4-stream_ssl_preread_no_skip.patch
+++ /dev/null
@@ -1,13 +0,0 @@
-diff --git a/src/stream/ngx_stream_ssl_preread_module.c b/src/stream/ngx_stream_ssl_preread_module.c
-index e3d11fd9..3717b5fe 100644
---- a/src/stream/ngx_stream_ssl_preread_module.c
-+++ b/src/stream/ngx_stream_ssl_preread_module.c
-@@ -159,7 +159,7 @@ ngx_stream_ssl_preread_handler(ngx_stream_session_t *s)
-
- rc = ngx_stream_ssl_preread_parse_record(ctx, p, p + len);
- if (rc != NGX_AGAIN) {
-- return rc;
-+ return rc == NGX_OK ? NGX_DECLINED : rc;
- }
-
- p += len;
diff --git a/images/nginx/rootfs/patches/nginx-1.21.4-upstream_pipelining.patch b/images/nginx/rootfs/patches/nginx-1.21.4-upstream_pipelining.patch
deleted file mode 100644
index aed80365a..000000000
--- a/images/nginx/rootfs/patches/nginx-1.21.4-upstream_pipelining.patch
+++ /dev/null
@@ -1,23 +0,0 @@
-commit f9907b72a76a21ac5413187b83177a919475c75f
-Author: Yichun Zhang (agentzh)
-Date: Wed Feb 10 16:05:08 2016 -0800
-
- bugfix: upstream: keep sending request data after the first write attempt.
-
- See
- http://mailman.nginx.org/pipermail/nginx-devel/2012-March/002040.html
- for more details on the issue.
-
-diff --git a/src/http/ngx_http_upstream.c b/src/http/ngx_http_upstream.c
-index 69019417..92b7c97f 100644
---- a/src/http/ngx_http_upstream.c
-+++ b/src/http/ngx_http_upstream.c
-@@ -2239,7 +2239,7 @@ ngx_http_upstream_send_request_handler(ngx_http_request_t *r,
-
- #endif
-
-- if (u->header_sent && !u->conf->preserve_output) {
-+ if (u->request_body_sent && !u->conf->preserve_output) {
- u->write_event_handler = ngx_http_upstream_dummy_handler;
-
- (void) ngx_handle_write_event(c->write, 0);
diff --git a/images/nginx/rootfs/patches/nginx-1.21.4-upstream_timeout_fields.patch b/images/nginx/rootfs/patches/nginx-1.21.4-upstream_timeout_fields.patch
deleted file mode 100644
index 2314ddf80..000000000
--- a/images/nginx/rootfs/patches/nginx-1.21.4-upstream_timeout_fields.patch
+++ /dev/null
@@ -1,112 +0,0 @@
-diff --git a/src/http/ngx_http_upstream.c b/src/http/ngx_http_upstream.c
-index 69019417..2265d8f7 100644
---- a/src/http/ngx_http_upstream.c
-+++ b/src/http/ngx_http_upstream.c
-@@ -509,12 +509,19 @@ void
- ngx_http_upstream_init(ngx_http_request_t *r)
- {
- ngx_connection_t *c;
-+ ngx_http_upstream_t *u;
-
- c = r->connection;
-
- ngx_log_debug1(NGX_LOG_DEBUG_HTTP, c->log, 0,
- "http init upstream, client timer: %d", c->read->timer_set);
-
-+ u = r->upstream;
-+
-+ u->connect_timeout = u->conf->connect_timeout;
-+ u->send_timeout = u->conf->send_timeout;
-+ u->read_timeout = u->conf->read_timeout;
-+
- #if (NGX_HTTP_V2)
- if (r->stream) {
- ngx_http_upstream_init_request(r);
-@@ -1626,7 +1633,7 @@ ngx_http_upstream_connect(ngx_http_request_t *r, ngx_http_upstream_t *u)
- u->request_body_blocked = 0;
-
- if (rc == NGX_AGAIN) {
-- ngx_add_timer(c->write, u->conf->connect_timeout);
-+ ngx_add_timer(c->write, u->connect_timeout);
- return;
- }
-
-@@ -1704,7 +1711,7 @@ ngx_http_upstream_ssl_init_connection(ngx_http_request_t *r,
- if (rc == NGX_AGAIN) {
-
- if (!c->write->timer_set) {
-- ngx_add_timer(c->write, u->conf->connect_timeout);
-+ ngx_add_timer(c->write, u->connect_timeout);
- }
-
- c->ssl->handler = ngx_http_upstream_ssl_handshake_handler;
-@@ -2022,7 +2029,7 @@ ngx_http_upstream_send_request(ngx_http_request_t *r, ngx_http_upstream_t *u,
-
- if (rc == NGX_AGAIN) {
- if (!c->write->ready || u->request_body_blocked) {
-- ngx_add_timer(c->write, u->conf->send_timeout);
-+ ngx_add_timer(c->write, u->send_timeout);
-
- } else if (c->write->timer_set) {
- ngx_del_timer(c->write);
-@@ -2084,7 +2091,7 @@ ngx_http_upstream_send_request(ngx_http_request_t *r, ngx_http_upstream_t *u,
- return;
- }
-
-- ngx_add_timer(c->read, u->conf->read_timeout);
-+ ngx_add_timer(c->read, u->read_timeout);
-
- if (c->read->ready) {
- ngx_http_upstream_process_header(r, u);
-@@ -3213,7 +3220,7 @@ ngx_http_upstream_send_response(ngx_http_request_t *r, ngx_http_upstream_t *u)
- p->cyclic_temp_file = 0;
- }
-
-- p->read_timeout = u->conf->read_timeout;
-+ p->read_timeout = u->read_timeout;
- p->send_timeout = clcf->send_timeout;
- p->send_lowat = clcf->send_lowat;
-
-@@ -3458,7 +3465,7 @@ ngx_http_upstream_process_upgraded(ngx_http_request_t *r,
- }
-
- if (upstream->write->active && !upstream->write->ready) {
-- ngx_add_timer(upstream->write, u->conf->send_timeout);
-+ ngx_add_timer(upstream->write, u->send_timeout);
-
- } else if (upstream->write->timer_set) {
- ngx_del_timer(upstream->write);
-@@ -3470,7 +3477,7 @@ ngx_http_upstream_process_upgraded(ngx_http_request_t *r,
- }
-
- if (upstream->read->active && !upstream->read->ready) {
-- ngx_add_timer(upstream->read, u->conf->read_timeout);
-+ ngx_add_timer(upstream->read, u->read_timeout);
-
- } else if (upstream->read->timer_set) {
- ngx_del_timer(upstream->read);
-@@ -3664,7 +3671,7 @@ ngx_http_upstream_process_non_buffered_request(ngx_http_request_t *r,
- }
-
- if (upstream->read->active && !upstream->read->ready) {
-- ngx_add_timer(upstream->read, u->conf->read_timeout);
-+ ngx_add_timer(upstream->read, u->read_timeout);
-
- } else if (upstream->read->timer_set) {
- ngx_del_timer(upstream->read);
-diff --git a/src/http/ngx_http_upstream.h b/src/http/ngx_http_upstream.h
-index c2f4dc0b..b9eef118 100644
---- a/src/http/ngx_http_upstream.h
-+++ b/src/http/ngx_http_upstream.h
-@@ -333,6 +333,11 @@ struct ngx_http_upstream_s {
- ngx_array_t *caches;
- #endif
-
-+#define HAVE_NGX_UPSTREAM_TIMEOUT_FIELDS 1
-+ ngx_msec_t connect_timeout;
-+ ngx_msec_t send_timeout;
-+ ngx_msec_t read_timeout;
-+
- ngx_http_upstream_headers_in_t headers_in;
-
- ngx_http_upstream_resolved_t *resolved;
From 551c9ab8273752297dd8ef639dcfc8da98077ed1 Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Tue, 1 Oct 2024 17:42:12 +0200
Subject: [PATCH 262/283] Images: Trigger NGINX build. (#12063)
---
images/nginx/TAG | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/images/nginx/TAG b/images/nginx/TAG
index f25246219..0ec25f750 100644
--- a/images/nginx/TAG
+++ b/images/nginx/TAG
@@ -1 +1 @@
-v0.0.12
+v1.0.0
From 9f49f80f63671f135e536d5de2db09fab70c5640 Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Tue, 1 Oct 2024 22:22:16 +0200
Subject: [PATCH 263/283] Images: Bump `NGINX_BASE` to v1.0.0. (#12066)
---
NGINX_BASE | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/NGINX_BASE b/NGINX_BASE
index 5e32265fa..ea1e443b0 100644
--- a/NGINX_BASE
+++ b/NGINX_BASE
@@ -1 +1 @@
-registry.k8s.io/ingress-nginx/nginx-1.25:v0.0.12@sha256:2d471b3a34dc43d10c3f3d7f2a6e8a2ecf7654a4197e56374261c1c708b16365
+registry.k8s.io/ingress-nginx/nginx:v1.0.0@sha256:11ee0d0e3d063f1468f9a82958d57fa0718614fe10b676941f4dea0aef091faf
From e7d64dbb70cc905cec9ba8a3dab59e1e5ac7ddbc Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Tue, 1 Oct 2024 22:33:48 +0100
Subject: [PATCH 264/283] Bump k8s.io/cli-runtime from 0.30.0 to 0.31.1
(#12061)
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 8 +++-----
go.sum | 16 ++++++----------
2 files changed, 9 insertions(+), 15 deletions(-)
diff --git a/go.mod b/go.mod
index 6bdaead75..ec9533437 100644
--- a/go.mod
+++ b/go.mod
@@ -35,7 +35,7 @@ require (
k8s.io/apiextensions-apiserver v0.31.1
k8s.io/apimachinery v0.31.1
k8s.io/apiserver v0.31.1
- k8s.io/cli-runtime v0.30.0
+ k8s.io/cli-runtime v0.31.1
k8s.io/client-go v0.31.1
k8s.io/code-generator v0.31.1
k8s.io/component-base v0.31.1
@@ -64,7 +64,6 @@ require (
github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc // indirect
github.com/eapache/queue v1.1.0 // indirect
github.com/emicklei/go-restful/v3 v3.12.0 // indirect
- github.com/evanphx/json-patch v5.9.0+incompatible // indirect
github.com/evanphx/json-patch/v5 v5.9.0 // indirect
github.com/fullsailor/pkcs7 v0.0.0-20190404230743-d7302db945fa // indirect
github.com/go-errors/errors v1.5.1 // indirect
@@ -124,7 +123,6 @@ require (
golang.org/x/tools v0.24.0 // indirect
google.golang.org/genproto/googleapis/rpc v0.0.0-20240814211410-ddb44dafa142 // indirect
google.golang.org/protobuf v1.34.2 // indirect
- gopkg.in/evanphx/json-patch.v5 v5.9.0 // indirect
gopkg.in/go-playground/assert.v1 v1.2.1 // indirect
gopkg.in/inf.v0 v0.9.1 // indirect
gopkg.in/yaml.v2 v2.4.0 // indirect
@@ -133,8 +131,8 @@ require (
k8s.io/kube-openapi v0.0.0-20240430033511-f0e62f92d13f // indirect
k8s.io/utils v0.0.0-20240711033017-18e509b52bc8 // indirect
sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd // indirect
- sigs.k8s.io/kustomize/api v0.16.0 // indirect
- sigs.k8s.io/kustomize/kyaml v0.16.0 // indirect
+ sigs.k8s.io/kustomize/api v0.17.2 // indirect
+ sigs.k8s.io/kustomize/kyaml v0.17.1 // indirect
sigs.k8s.io/structured-merge-diff/v4 v4.4.1 // indirect
sigs.k8s.io/yaml v1.4.0 // indirect
)
diff --git a/go.sum b/go.sum
index 04a26d653..240b71f1f 100644
--- a/go.sum
+++ b/go.sum
@@ -32,8 +32,6 @@ github.com/eapache/queue v1.1.0 h1:YOEu7KNc61ntiQlcEeUIoDTJ2o8mQznoNvUhiigpIqc=
github.com/eapache/queue v1.1.0/go.mod h1:6eCeP0CKFpHLu8blIFXhExK/dRa7WDZfr6jVFPTqq+I=
github.com/emicklei/go-restful/v3 v3.12.0 h1:y2DdzBAURM29NFF94q6RaY4vjIH1rtwDapwQtU84iWk=
github.com/emicklei/go-restful/v3 v3.12.0/go.mod h1:6n3XBCmQQb25CM2LCACGz8ukIrRry+4bhvbpWn3mrbc=
-github.com/evanphx/json-patch v5.9.0+incompatible h1:fBXyNpNMuTTDdquAq/uisOr2lShz4oaXpDTX2bLe7ls=
-github.com/evanphx/json-patch v5.9.0+incompatible/go.mod h1:50XU6AFN0ol/bzJsmQLiYLvXMP4fmwYFNcr97nuDLSk=
github.com/evanphx/json-patch/v5 v5.9.0 h1:kcBlZQbplgElYIlo/n1hJbls2z/1awpXxpRi0/FOJfg=
github.com/evanphx/json-patch/v5 v5.9.0/go.mod h1:VNkHZ/282BpEyt/tObQO8s5CMPmYYq14uClGH4abBuQ=
github.com/fsnotify/fsnotify v1.4.7/go.mod h1:jwhsz4b93w/PPRr/qN1Yymfu8t87LnFCMoQvtojpjFo=
@@ -319,8 +317,6 @@ gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c h1:Hei/4ADfdWqJk1ZMxUNpqntN
gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c/go.mod h1:JHkPIbrfpd72SG/EVd6muEfDQjcINNoR0C8j2r3qZ4Q=
gopkg.in/evanphx/json-patch.v4 v4.12.0 h1:n6jtcsulIzXPJaxegRbvFNNrZDjbij7ny3gmSPG+6V4=
gopkg.in/evanphx/json-patch.v4 v4.12.0/go.mod h1:p8EYWUEYMpynmqDbY58zCKCFZw8pRWMG4EsWvDvM72M=
-gopkg.in/evanphx/json-patch.v5 v5.9.0 h1:hx1VU2SGj4F8r9b8GUwJLdc8DNO8sy79ZGui0G05GLo=
-gopkg.in/evanphx/json-patch.v5 v5.9.0/go.mod h1:/kvTRh1TVm5wuM6OkHxqXtE/1nUZZpihg29RtuIyfvk=
gopkg.in/fsnotify.v1 v1.4.7/go.mod h1:Tz8NjZHkW78fSQdbUxIjBTcgA1z1m8ZHf0WmKUhAMys=
gopkg.in/go-playground/assert.v1 v1.2.1 h1:xoYuJVE7KT85PYWrN730RguIQO0ePzVRfFMXadIrXTM=
gopkg.in/go-playground/assert.v1 v1.2.1/go.mod h1:9RXL0bg/zibRAgZUYszZSwO/z8Y/a8bDuhia5mkpMnE=
@@ -349,8 +345,8 @@ k8s.io/apimachinery v0.31.1 h1:mhcUBbj7KUjaVhyXILglcVjuS4nYXiwC+KKFBgIVy7U=
k8s.io/apimachinery v0.31.1/go.mod h1:rsPdaZJfTfLsNJSQzNHQvYoTmxhoOEofxtOsF3rtsMo=
k8s.io/apiserver v0.31.1 h1:Sars5ejQDCRBY5f7R3QFHdqN3s61nhkpaX8/k1iEw1c=
k8s.io/apiserver v0.31.1/go.mod h1:lzDhpeToamVZJmmFlaLwdYZwd7zB+WYRYIboqA1kGxM=
-k8s.io/cli-runtime v0.30.0 h1:0vn6/XhOvn1RJ2KJOC6IRR2CGqrpT6QQF4+8pYpWQ48=
-k8s.io/cli-runtime v0.30.0/go.mod h1:vATpDMATVTMA79sZ0YUCzlMelf6rUjoBzlp+RnoM+cg=
+k8s.io/cli-runtime v0.31.1 h1:/ZmKhmZ6hNqDM+yf9s3Y4KEYakNXUn5sod2LWGGwCuk=
+k8s.io/cli-runtime v0.31.1/go.mod h1:pKv1cDIaq7ehWGuXQ+A//1OIF+7DI+xudXtExMCbe9U=
k8s.io/client-go v0.31.1 h1:f0ugtWSbWpxHR7sjVpQwuvw9a3ZKLXX0u0itkFXufb0=
k8s.io/client-go v0.31.1/go.mod h1:sKI8871MJN2OyeqRlmA4W4KM9KBdBUpDLu/43eGemCg=
k8s.io/code-generator v0.31.1 h1:GvkRZEP2g2UnB2QKT2Dgc/kYxIkDxCHENv2Q1itioVs=
@@ -371,10 +367,10 @@ sigs.k8s.io/controller-runtime v0.19.0 h1:nWVM7aq+Il2ABxwiCizrVDSlmDcshi9llbaFbC
sigs.k8s.io/controller-runtime v0.19.0/go.mod h1:iRmWllt8IlaLjvTTDLhRBXIEtkCK6hwVBJJsYS9Ajf4=
sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd h1:EDPBXCAspyGV4jQlpZSudPeMmr1bNJefnuqLsRAsHZo=
sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd/go.mod h1:B8JuhiUyNFVKdsE8h686QcCxMaH6HrOAZj4vswFpcB0=
-sigs.k8s.io/kustomize/api v0.16.0 h1:/zAR4FOQDCkgSDmVzV2uiFbuy9bhu3jEzthrHCuvm1g=
-sigs.k8s.io/kustomize/api v0.16.0/go.mod h1:MnFZ7IP2YqVyVwMWoRxPtgl/5hpA+eCCrQR/866cm5c=
-sigs.k8s.io/kustomize/kyaml v0.16.0 h1:6J33uKSoATlKZH16unr2XOhDI+otoe2sR3M8PDzW3K0=
-sigs.k8s.io/kustomize/kyaml v0.16.0/go.mod h1:xOK/7i+vmE14N2FdFyugIshB8eF6ALpy7jI87Q2nRh4=
+sigs.k8s.io/kustomize/api v0.17.2 h1:E7/Fjk7V5fboiuijoZHgs4aHuexi5Y2loXlVOAVAG5g=
+sigs.k8s.io/kustomize/api v0.17.2/go.mod h1:UWTz9Ct+MvoeQsHcJ5e+vziRRkwimm3HytpZgIYqye0=
+sigs.k8s.io/kustomize/kyaml v0.17.1 h1:TnxYQxFXzbmNG6gOINgGWQt09GghzgTP6mIurOgrLCQ=
+sigs.k8s.io/kustomize/kyaml v0.17.1/go.mod h1:9V0mCjIEYjlXuCdYsSXvyoy2BTsLESH7TlGV81S282U=
sigs.k8s.io/mdtoc v1.1.0 h1:q3YtqYzmC2e0hgLXRIOm7/QLuPux1CX3ZHCwlbABxZo=
sigs.k8s.io/mdtoc v1.1.0/go.mod h1:QZLVEdHH2iNIR4uHAZyvFRtjloHgVItk8lo/mzCtq3w=
sigs.k8s.io/structured-merge-diff/v4 v4.4.1 h1:150L+0vs/8DA78h1u02ooW1/fFq/Lwr+sGiqlzvrtq4=
From ec5d1f7954c5d4eafa99941e2fbc7fbc5e081ab9 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Tue, 1 Oct 2024 22:35:49 +0100
Subject: [PATCH 265/283] Bump google.golang.org/grpc from 1.67.0 to 1.67.1 in
the go group across 1 directory (#12059)
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 2 +-
go.sum | 4 ++--
2 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/go.mod b/go.mod
index ec9533437..42e7b9f13 100644
--- a/go.mod
+++ b/go.mod
@@ -27,7 +27,7 @@ require (
github.com/zakjan/cert-chain-resolver v0.0.0-20221221105603-fcedb00c5b30
golang.org/x/crypto v0.27.0
golang.org/x/exp v0.0.0-20240719175910-8a7402abbf56
- google.golang.org/grpc v1.67.0
+ google.golang.org/grpc v1.67.1
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab
gopkg.in/go-playground/pool.v3 v3.1.1
gopkg.in/mcuadros/go-syslog.v2 v2.3.0
diff --git a/go.sum b/go.sum
index 240b71f1f..4d67e590d 100644
--- a/go.sum
+++ b/go.sum
@@ -299,8 +299,8 @@ gomodules.xyz/jsonpatch/v2 v2.4.0 h1:Ci3iUJyx9UeRx7CeFN8ARgGbkESwJK+KB9lLcWxY/Zw
gomodules.xyz/jsonpatch/v2 v2.4.0/go.mod h1:AH3dM2RI6uoBZxn3LVrfvJ3E0/9dG4cSrbuBJT4moAY=
google.golang.org/genproto/googleapis/rpc v0.0.0-20240814211410-ddb44dafa142 h1:e7S5W7MGGLaSu8j3YjdezkZ+m1/Nm0uRVRMEMGk26Xs=
google.golang.org/genproto/googleapis/rpc v0.0.0-20240814211410-ddb44dafa142/go.mod h1:UqMtugtsSgubUsoxbuAoiCXvqvErP7Gf0so0mK9tHxU=
-google.golang.org/grpc v1.67.0 h1:IdH9y6PF5MPSdAntIcpjQ+tXO41pcQsfZV2RxtQgVcw=
-google.golang.org/grpc v1.67.0/go.mod h1:1gLDyUQU7CTLJI90u3nXZ9ekeghjeM7pTDZlqFNg2AA=
+google.golang.org/grpc v1.67.1 h1:zWnc1Vrcno+lHZCOofnIMvycFcc0QRGIzm9dhnDX68E=
+google.golang.org/grpc v1.67.1/go.mod h1:1gLDyUQU7CTLJI90u3nXZ9ekeghjeM7pTDZlqFNg2AA=
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab h1:tg8hvIl5RmFBuXlcJMuL0h4Psh1gx5Q5xEMwzBZIzWA=
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab/go.mod h1:liVNnGuZDITxuksuZ+BBvdy7FcJfeNk+efF9qgqNUmc=
google.golang.org/protobuf v0.0.0-20200109180630-ec00e32a8dfd/go.mod h1:DFci5gLYBciE7Vtevhsrf46CRTquxDuWsQurQQe4oz8=
From 867207255eaa60b619c4507190e00ddc3f42358f Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Tue, 1 Oct 2024 22:37:48 +0100
Subject: [PATCH 266/283] Bump github.com/prometheus/common from 0.59.1 to
0.60.0 (#12060)
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 6 +++---
go.sum | 12 ++++++------
2 files changed, 9 insertions(+), 9 deletions(-)
diff --git a/go.mod b/go.mod
index 42e7b9f13..cc62bc738 100644
--- a/go.mod
+++ b/go.mod
@@ -19,7 +19,7 @@ require (
github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2
github.com/prometheus/client_golang v1.20.4
github.com/prometheus/client_model v0.6.1
- github.com/prometheus/common v0.59.1
+ github.com/prometheus/common v0.60.0
github.com/spf13/cobra v1.8.1
github.com/spf13/pflag v1.0.5
github.com/stretchr/testify v1.9.0
@@ -113,8 +113,8 @@ require (
go.starlark.net v0.0.0-20240123142251-f86470692795 // indirect
go.uber.org/zap v1.27.0 // indirect
golang.org/x/mod v0.20.0 // indirect
- golang.org/x/net v0.28.0 // indirect
- golang.org/x/oauth2 v0.22.0 // indirect
+ golang.org/x/net v0.29.0 // indirect
+ golang.org/x/oauth2 v0.23.0 // indirect
golang.org/x/sync v0.8.0 // indirect
golang.org/x/sys v0.25.0 // indirect
golang.org/x/term v0.24.0 // indirect
diff --git a/go.sum b/go.sum
index 4d67e590d..a8475a7ed 100644
--- a/go.sum
+++ b/go.sum
@@ -184,8 +184,8 @@ github.com/prometheus/client_golang v1.20.4 h1:Tgh3Yr67PaOv/uTqloMsCEdeuFTatm5zI
github.com/prometheus/client_golang v1.20.4/go.mod h1:PIEt8X02hGcP8JWbeHyeZ53Y/jReSnHgO035n//V5WE=
github.com/prometheus/client_model v0.6.1 h1:ZKSh/rekM+n3CeS952MLRAdFwIKqeY8b62p8ais2e9E=
github.com/prometheus/client_model v0.6.1/go.mod h1:OrxVMOVHjw3lKMa8+x6HeMGkHMQyHDk9E3jmP2AmGiY=
-github.com/prometheus/common v0.59.1 h1:LXb1quJHWm1P6wq/U824uxYi4Sg0oGvNeUm1z5dJoX0=
-github.com/prometheus/common v0.59.1/go.mod h1:GpWM7dewqmVYcd7SmRaiWVe9SSqjf0UrwnYnpEZNuT0=
+github.com/prometheus/common v0.60.0 h1:+V9PAREWNvJMAuJ1x1BaWl9dewMW4YrHZQbx0sJNllA=
+github.com/prometheus/common v0.60.0/go.mod h1:h0LYf1R1deLSKtD4Vdg8gy4RuOvENW2J/h19V5NADQw=
github.com/prometheus/procfs v0.15.1 h1:YagwOFzUgYfKKHX6Dr+sHT7km/hxC76UB0learggepc=
github.com/prometheus/procfs v0.15.1/go.mod h1:fB45yRUv8NstnjriLhBQLuOUt+WW4BsoGhij/e3PBqk=
github.com/rogpeppe/go-internal v1.12.0 h1:exVL4IDcn6na9z1rAb56Vxr+CgyK3nn3O+epU5NdKM8=
@@ -250,10 +250,10 @@ golang.org/x/net v0.0.0-20190620200207-3b0461eec859/go.mod h1:z5CRVTTTmAJ677TzLL
golang.org/x/net v0.0.0-20200226121028-0de0cce0169b/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
golang.org/x/net v0.0.0-20200520004742-59133d7f0dd7/go.mod h1:qpuaurCH72eLCgpAm/N6yyVIVM9cpaDIP3A8BGJEC5A=
golang.org/x/net v0.0.0-20201021035429-f5854403a974/go.mod h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU=
-golang.org/x/net v0.28.0 h1:a9JDOJc5GMUJ0+UDqmLT86WiEy7iWyIhz8gz8E4e5hE=
-golang.org/x/net v0.28.0/go.mod h1:yqtgsTWOOnlGLG9GFRrK3++bGOUEkNBoHZc8MEDWPNg=
-golang.org/x/oauth2 v0.22.0 h1:BzDx2FehcG7jJwgWLELCdmLuxk2i+x9UDpSiss2u0ZA=
-golang.org/x/oauth2 v0.22.0/go.mod h1:XYTD2NtWslqkgxebSiOHnXEap4TF09sJSc7H1sXbhtI=
+golang.org/x/net v0.29.0 h1:5ORfpBpCs4HzDYoodCDBbwHzdR5UrLBZ3sOnUJmFoHo=
+golang.org/x/net v0.29.0/go.mod h1:gLkgy8jTGERgjzMic6DS9+SP0ajcu6Xu3Orq/SpETg0=
+golang.org/x/oauth2 v0.23.0 h1:PbgcYx2W7i4LvjJWEbf0ngHV6qJYr86PkAV3bXdLEbs=
+golang.org/x/oauth2 v0.23.0/go.mod h1:XYTD2NtWslqkgxebSiOHnXEap4TF09sJSc7H1sXbhtI=
golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sync v0.0.0-20190911185100-cd5d95a43a6e/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
From ecb38de6db20fb9ca431692c20c63270fff02992 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Tue, 1 Oct 2024 23:27:49 +0100
Subject: [PATCH 267/283] Bump sigs.k8s.io/mdtoc from 1.1.0 to 1.4.0 (#12062)
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 6 ++++--
go.sum | 15 ++++++++-------
2 files changed, 12 insertions(+), 9 deletions(-)
diff --git a/go.mod b/go.mod
index cc62bc738..a76b9f570 100644
--- a/go.mod
+++ b/go.mod
@@ -42,14 +42,16 @@ require (
k8s.io/klog/v2 v2.130.1
pault.ag/go/sniff v0.0.0-20200207005214-cf7e4d167732
sigs.k8s.io/controller-runtime v0.19.0
- sigs.k8s.io/mdtoc v1.1.0
+ sigs.k8s.io/mdtoc v1.4.0
)
require (
+ github.com/common-nighthawk/go-figure v0.0.0-20210622060536-734e95fb86be // indirect
github.com/fxamacker/cbor/v2 v2.7.0 // indirect
github.com/klauspost/compress v1.17.9 // indirect
github.com/x448/float16 v0.8.4 // indirect
gopkg.in/evanphx/json-patch.v4 v4.12.0 // indirect
+ sigs.k8s.io/release-utils v0.8.3 // indirect
)
require (
@@ -76,7 +78,7 @@ require (
github.com/gogo/protobuf v1.3.2 // indirect
github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da // indirect
github.com/golang/protobuf v1.5.4 // indirect
- github.com/gomarkdown/markdown v0.0.0-20231222211730-1d6d20845b47 // indirect
+ github.com/gomarkdown/markdown v0.0.0-20240328165702-4d01890c35c0 // indirect
github.com/google/btree v1.1.2 // indirect
github.com/google/gnostic-models v0.6.8 // indirect
github.com/google/go-cmp v0.6.0 // indirect
diff --git a/go.sum b/go.sum
index a8475a7ed..3390e4c13 100644
--- a/go.sum
+++ b/go.sum
@@ -4,7 +4,6 @@ github.com/Anddd7/pb v0.0.0-20240425032658-369b0f6a404c h1:uhBf0CHXi7nCFZXxHV7l1
github.com/Anddd7/pb v0.0.0-20240425032658-369b0f6a404c/go.mod h1:vYWKbnXd2KAZHUECLPzSE0Er3FgiEmOdPtxwSIRihck=
github.com/Azure/go-ansiterm v0.0.0-20230124172434-306776ec8161 h1:L/gRVlceqvL25UVaW/CKtUDjefjrs0SPonmDGUVOYP0=
github.com/Azure/go-ansiterm v0.0.0-20230124172434-306776ec8161/go.mod h1:xomTg63KZ2rFqZQzSB4Vz2SUXa1BpHTVz9L5PTmPC4E=
-github.com/BurntSushi/toml v0.3.1/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU=
github.com/BurntSushi/toml v1.3.2 h1:o7IhLm0Msx3BaB+n3Ag7L8EVlByGnpq14C4YWiu/gL8=
github.com/BurntSushi/toml v1.3.2/go.mod h1:CxXYINrC8qIiEnFrOxCa7Jy5BFHlXnUU2pbicEuybxQ=
github.com/armon/go-proxyproto v0.1.0 h1:TWWcSsjco7o2itn6r25/5AqKBiWmsiuzsUDLT/MTl7k=
@@ -15,6 +14,8 @@ github.com/blang/semver/v4 v4.0.0 h1:1PFHFE6yCCTv8C1TeyNNarDzntLi7wMI5i/pzqYIsAM
github.com/blang/semver/v4 v4.0.0/go.mod h1:IbckMUScFkM3pff0VJDNKRiT6TG/YpiHIM2yvyW5YoQ=
github.com/cespare/xxhash/v2 v2.3.0 h1:UL815xU9SqsFlibzuggzjXhog7bL6oX9BbNZnL2UFvs=
github.com/cespare/xxhash/v2 v2.3.0/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs=
+github.com/common-nighthawk/go-figure v0.0.0-20210622060536-734e95fb86be h1:J5BL2kskAlV9ckgEsNQXscjIaLiOYiZ75d4e94E6dcQ=
+github.com/common-nighthawk/go-figure v0.0.0-20210622060536-734e95fb86be/go.mod h1:mk5IQ+Y0ZeO87b858TlA645sVcEcbiX6YqP98kt+7+w=
github.com/coreos/go-systemd/v22 v22.5.0 h1:RrqgGjYQKalulkV8NGVIfkXQf6YYmOyiJKk8iXXhfZs=
github.com/coreos/go-systemd/v22 v22.5.0/go.mod h1:Y58oyj3AT4RCenI/lSvhwexgC+NSVTIJ3seZv2GcEnc=
github.com/cpuguy83/go-md2man/v2 v2.0.4/go.mod h1:tgQtvFlXSQOSOSIRvRPT7W67SCa46tRHOmNcaadrF8o=
@@ -74,9 +75,8 @@ github.com/golang/protobuf v1.4.0/go.mod h1:jodUvKwWbYaEsadDk5Fwe5c77LiNKVO9IDvq
github.com/golang/protobuf v1.4.2/go.mod h1:oDoupMAO8OvCJWAcko0GGGIgR6R6ocIYbsSw735rRwI=
github.com/golang/protobuf v1.5.4 h1:i7eJL8qZTpSEXOPTxNKhASYpMn+8e5Q6AdndVa1dWek=
github.com/golang/protobuf v1.5.4/go.mod h1:lnTiLA8Wa4RWRcIUkrtSVa5nRhsEGBg48fD6rSs7xps=
-github.com/gomarkdown/markdown v0.0.0-20210514010506-3b9f47219fe7/go.mod h1:aii0r/K0ZnHv7G0KF7xy1v0A7s2Ljrb5byB7MO5p6TU=
-github.com/gomarkdown/markdown v0.0.0-20231222211730-1d6d20845b47 h1:k4Tw0nt6lwro3Uin8eqoET7MDA4JnT8YgbCjc/g5E3k=
-github.com/gomarkdown/markdown v0.0.0-20231222211730-1d6d20845b47/go.mod h1:JDGcbDT52eL4fju3sZ4TeHGsQwhG9nbDV21aMyhwPoA=
+github.com/gomarkdown/markdown v0.0.0-20240328165702-4d01890c35c0 h1:4gjrh/PN2MuWCCElk8/I4OCKRKWCCo2zEct3VKCbibU=
+github.com/gomarkdown/markdown v0.0.0-20240328165702-4d01890c35c0/go.mod h1:JDGcbDT52eL4fju3sZ4TeHGsQwhG9nbDV21aMyhwPoA=
github.com/google/btree v1.1.2 h1:xf4v41cLI2Z6FxbKm+8Bu+m8ifhj15JuZ9sa0jZCMUU=
github.com/google/btree v1.1.2/go.mod h1:qOPhT0dTNdNzV6Z/lhRX0YXUafgPLFUh+gZMl761Gm4=
github.com/google/gnostic-models v0.6.8 h1:yo/ABAfM5IMRsS1VnXjTBvUb61tFIHozhlYvRgGre9I=
@@ -232,7 +232,6 @@ go.uber.org/multierr v1.11.0 h1:blXXJkSxSSfBVBlC76pxqeO+LN3aDfLQo+309xJstO0=
go.uber.org/multierr v1.11.0/go.mod h1:20+QtiLqy0Nd6FdQB9TLXag12DsQkrbs3htMFfDN80Y=
go.uber.org/zap v1.27.0 h1:aJMhYGrd5QSmlpLMr2MftRKl7t8J8PTZPA732ud/XR8=
go.uber.org/zap v1.27.0/go.mod h1:GB2qFLM7cTU87MWRP2mPIjqfIDnGu+VIO4V/SdhGo2E=
-golang.org/dl v0.0.0-20190829154251-82a15e2f2ead/go.mod h1:IUMfjQLJQd4UTqG1Z90tenwKoCX93Gn3MAQJMOSBsDQ=
golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
@@ -371,8 +370,10 @@ sigs.k8s.io/kustomize/api v0.17.2 h1:E7/Fjk7V5fboiuijoZHgs4aHuexi5Y2loXlVOAVAG5g
sigs.k8s.io/kustomize/api v0.17.2/go.mod h1:UWTz9Ct+MvoeQsHcJ5e+vziRRkwimm3HytpZgIYqye0=
sigs.k8s.io/kustomize/kyaml v0.17.1 h1:TnxYQxFXzbmNG6gOINgGWQt09GghzgTP6mIurOgrLCQ=
sigs.k8s.io/kustomize/kyaml v0.17.1/go.mod h1:9V0mCjIEYjlXuCdYsSXvyoy2BTsLESH7TlGV81S282U=
-sigs.k8s.io/mdtoc v1.1.0 h1:q3YtqYzmC2e0hgLXRIOm7/QLuPux1CX3ZHCwlbABxZo=
-sigs.k8s.io/mdtoc v1.1.0/go.mod h1:QZLVEdHH2iNIR4uHAZyvFRtjloHgVItk8lo/mzCtq3w=
+sigs.k8s.io/mdtoc v1.4.0 h1:2pDEwJSjoVrGr5BPkG+LoLkYLKvgtGYurrBY8ul3SxQ=
+sigs.k8s.io/mdtoc v1.4.0/go.mod h1:KVnRRtK1rX9aQ95qF0rt3x2ytTxf3r7W7N41H+0KF0k=
+sigs.k8s.io/release-utils v0.8.3 h1:KtOtA4qDmzJyeQ2zkDsFVI25+NViwms/o5eL2NftFdA=
+sigs.k8s.io/release-utils v0.8.3/go.mod h1:fp82Fma06OXBhEJ+GUJKqvcplDBomruK1R/1fWJnsrQ=
sigs.k8s.io/structured-merge-diff/v4 v4.4.1 h1:150L+0vs/8DA78h1u02ooW1/fFq/Lwr+sGiqlzvrtq4=
sigs.k8s.io/structured-merge-diff/v4 v4.4.1/go.mod h1:N8hJocpFajUSSeSJ9bOZ77VzejKZaXsTtZo4/u7Io08=
sigs.k8s.io/yaml v1.4.0 h1:Mk1wCc2gy/F0THH0TAp1QYyJNzRm2KCLy3o5ASXVI5E=
From bf287e4331f7de96d06ab9c4a740d873b493b029 Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Fri, 4 Oct 2024 13:41:52 +0200
Subject: [PATCH 268/283] Go: Bump to v1.22.8. (#12069)
---
GOLANG_VERSION | 2 +-
go.mod | 2 +-
go.work | 2 +-
images/custom-error-pages/rootfs/go.mod | 2 +-
images/ext-auth-example-authsvc/rootfs/go.mod | 2 +-
images/kube-webhook-certgen/rootfs/go.mod | 2 +-
magefiles/go.mod | 2 +-
7 files changed, 7 insertions(+), 7 deletions(-)
diff --git a/GOLANG_VERSION b/GOLANG_VERSION
index 87b26e8b1..229a27c6f 100644
--- a/GOLANG_VERSION
+++ b/GOLANG_VERSION
@@ -1 +1 @@
-1.22.7
+1.22.8
diff --git a/go.mod b/go.mod
index a76b9f570..74fe03207 100644
--- a/go.mod
+++ b/go.mod
@@ -1,6 +1,6 @@
module k8s.io/ingress-nginx
-go 1.22.7
+go 1.22.8
require (
dario.cat/mergo v1.0.1
diff --git a/go.work b/go.work
index f0095c758..b98909b34 100644
--- a/go.work
+++ b/go.work
@@ -1,4 +1,4 @@
-go 1.22.7
+go 1.22.8
use (
.
diff --git a/images/custom-error-pages/rootfs/go.mod b/images/custom-error-pages/rootfs/go.mod
index bd24d4e1c..4cee1baf5 100644
--- a/images/custom-error-pages/rootfs/go.mod
+++ b/images/custom-error-pages/rootfs/go.mod
@@ -1,6 +1,6 @@
module k8s.io/ingress-nginx/custom-error-pages
-go 1.22.7
+go 1.22.8
require github.com/prometheus/client_golang v1.20.4
diff --git a/images/ext-auth-example-authsvc/rootfs/go.mod b/images/ext-auth-example-authsvc/rootfs/go.mod
index 908da4b2e..7e488b484 100644
--- a/images/ext-auth-example-authsvc/rootfs/go.mod
+++ b/images/ext-auth-example-authsvc/rootfs/go.mod
@@ -1,6 +1,6 @@
module example.com/authsvc
-go 1.22.7
+go 1.22.8
require k8s.io/apimachinery v0.31.1
diff --git a/images/kube-webhook-certgen/rootfs/go.mod b/images/kube-webhook-certgen/rootfs/go.mod
index c9f1c827c..5caee19a2 100644
--- a/images/kube-webhook-certgen/rootfs/go.mod
+++ b/images/kube-webhook-certgen/rootfs/go.mod
@@ -1,6 +1,6 @@
module github.com/jet/kube-webhook-certgen
-go 1.22.7
+go 1.22.8
require (
github.com/onrik/logrus v0.11.0
diff --git a/magefiles/go.mod b/magefiles/go.mod
index 913522823..8c58b526c 100644
--- a/magefiles/go.mod
+++ b/magefiles/go.mod
@@ -1,6 +1,6 @@
module k8s.io/ingress-nginx/magefiles
-go 1.22.7
+go 1.22.8
require (
github.com/blang/semver/v4 v4.0.0
From f034444c6c74f977577196c5d77a692317d08f5e Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Fri, 4 Oct 2024 13:42:12 +0200
Subject: [PATCH 269/283] Bump the actions group with 3 updates (#12092)
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
.github/workflows/ci.yaml | 2 +-
.github/workflows/golangci-lint.yml | 2 +-
.github/workflows/images.yaml | 2 +-
.github/workflows/scorecards.yml | 2 +-
.github/workflows/vulnerability-scans.yaml | 2 +-
5 files changed, 5 insertions(+), 5 deletions(-)
diff --git a/.github/workflows/ci.yaml b/.github/workflows/ci.yaml
index 526acfb2f..648cbd194 100644
--- a/.github/workflows/ci.yaml
+++ b/.github/workflows/ci.yaml
@@ -163,7 +163,7 @@ jobs:
- name: Set up Docker Buildx
id: buildx
- uses: docker/setup-buildx-action@988b5a0280414f521da01fcc63a27aeeb4b104db # v3.6.1
+ uses: docker/setup-buildx-action@c47758b77c9736f4b2ef4073d4d51994fabfe349 # v3.7.1
with:
version: latest
diff --git a/.github/workflows/golangci-lint.yml b/.github/workflows/golangci-lint.yml
index 93db7fbb7..4ef7e9085 100644
--- a/.github/workflows/golangci-lint.yml
+++ b/.github/workflows/golangci-lint.yml
@@ -28,6 +28,6 @@ jobs:
check-latest: true
- name: golangci-lint
- uses: golangci/golangci-lint-action@aaa42aa0628b4ae2578232a66b541047968fac86 # v6.1.0
+ uses: golangci/golangci-lint-action@971e284b6050e8a5849b72094c50ab08da042db8 # v6.1.1
with:
version: v1.56
diff --git a/.github/workflows/images.yaml b/.github/workflows/images.yaml
index 85ad0aa88..77358e8b3 100644
--- a/.github/workflows/images.yaml
+++ b/.github/workflows/images.yaml
@@ -177,7 +177,7 @@ jobs:
uses: docker/setup-qemu-action@49b3bc8e6bdd4a60e6116a5414239cba5943d3cf # v3.2.0
- name: Set up Docker Buildx
id: buildx
- uses: docker/setup-buildx-action@988b5a0280414f521da01fcc63a27aeeb4b104db # v3.6.1
+ uses: docker/setup-buildx-action@c47758b77c9736f4b2ef4073d4d51994fabfe349 # v3.7.1
with:
version: latest
platforms: ${{ env.PLATFORMS }}
diff --git a/.github/workflows/scorecards.yml b/.github/workflows/scorecards.yml
index 4038f1158..9eaf091ee 100644
--- a/.github/workflows/scorecards.yml
+++ b/.github/workflows/scorecards.yml
@@ -59,6 +59,6 @@ jobs:
# Upload the results to GitHub's code scanning dashboard.
- name: "Upload to code-scanning"
- uses: github/codeql-action/upload-sarif@e2b3eafc8d227b0241d48be5f425d47c2d750a13 # v3.26.10
+ uses: github/codeql-action/upload-sarif@6db8d6351fd0be61f9ed8ebd12ccd35dcec51fea # v3.26.11
with:
sarif_file: results.sarif
diff --git a/.github/workflows/vulnerability-scans.yaml b/.github/workflows/vulnerability-scans.yaml
index adf8a593f..0cd02552d 100644
--- a/.github/workflows/vulnerability-scans.yaml
+++ b/.github/workflows/vulnerability-scans.yaml
@@ -75,7 +75,7 @@ jobs:
# This step checks out a copy of your repository.
- name: Upload SARIF file
- uses: github/codeql-action/upload-sarif@e2b3eafc8d227b0241d48be5f425d47c2d750a13 # v3.26.10
+ uses: github/codeql-action/upload-sarif@6db8d6351fd0be61f9ed8ebd12ccd35dcec51fea # v3.26.11
with:
token: ${{ github.token }}
# Path to SARIF file relative to the root of the repository
From 114421f94c8f92d84bc2aeca62e163b7feec3cb5 Mon Sep 17 00:00:00 2001
From: James Strong
Date: Fri, 4 Oct 2024 07:48:58 -0400
Subject: [PATCH 270/283] Docs: Add a multi-tenant warning. (#12091)
---
README.md | 2 ++
docs/deploy/hardening-guide.md | 2 ++
docs/faq.md | 10 ++++++++++
3 files changed, 14 insertions(+)
diff --git a/README.md b/README.md
index b1cd22aa1..2ffacd861 100644
--- a/README.md
+++ b/README.md
@@ -17,6 +17,8 @@ balancer.
See the [Getting Started](https://kubernetes.github.io/ingress-nginx/deploy/) document.
+Do not use in multi-tenant Kubernetes production installations. This project assumes that users that can create Ingress objects are administrators of the cluster. See the [FAQ](https://kubernetes.github.io/ingress-nginx/faq/#faq) for more.
+
## Troubleshooting
If you encounter issues, review the [troubleshooting docs](docs/troubleshooting.md),
diff --git a/docs/deploy/hardening-guide.md b/docs/deploy/hardening-guide.md
index cfbdb1466..2726b1a07 100644
--- a/docs/deploy/hardening-guide.md
+++ b/docs/deploy/hardening-guide.md
@@ -1,6 +1,8 @@
# Hardening Guide
+Do not use in multi-tenant Kubernetes production installations. This project assumes that users that can create Ingress objects are administrators of the cluster.
+
## Overview
There are several ways to do hardening and securing of nginx. In this documentation two guides are used, the guides are
overlapping in some points:
diff --git a/docs/faq.md b/docs/faq.md
index 020474d5c..97d3325ca 100644
--- a/docs/faq.md
+++ b/docs/faq.md
@@ -1,6 +1,16 @@
# FAQ
+## Multi-tenant Kubernetes
+
+Do not use in multi-tenant Kubernetes production installations. This project assumes that users that can create Ingress objects are administrators of the cluster.
+
+For example, the Ingress NGINX control plane has global and per Ingress configuration options that make it insecure, if enabled, in a multi-tenant environment.
+
+For example, enabling snippets, a global configuration, allows any Ingress object to run arbitrary Lua code that could affect the security of all Ingress objects that a controller is running.
+
+We changed the default to allow snippets to `false` in https://github.com/kubernetes/ingress-nginx/pull/10393.
+
## Multiple controller in one cluster
Question - How can I easily install multiple instances of the ingress-nginx controller in the same cluster?
From 114a6abbf5e70d1e14dfec2e8340d80e18ef79c7 Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Fri, 4 Oct 2024 13:56:17 +0200
Subject: [PATCH 271/283] Images: Trigger `test-runner` build. (#12100)
---
images/test-runner/TAG | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/images/test-runner/TAG b/images/test-runner/TAG
index 0ec25f750..795460fce 100644
--- a/images/test-runner/TAG
+++ b/images/test-runner/TAG
@@ -1 +1 @@
-v1.0.0
+v1.1.0
From 23c2552113935efff0b9c9484ca554b72959459e Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Fri, 4 Oct 2024 19:45:28 +0200
Subject: [PATCH 272/283] Tests: Bump `e2e-test-runner` to v20241004-114a6abb.
(#12103)
---
build/run-in-docker.sh | 2 +-
test/e2e-image/Makefile | 2 +-
test/e2e/run-chart-test.sh | 2 +-
3 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/build/run-in-docker.sh b/build/run-in-docker.sh
index 915c29d7a..095e09b91 100755
--- a/build/run-in-docker.sh
+++ b/build/run-in-docker.sh
@@ -44,7 +44,7 @@ function cleanup {
}
trap cleanup EXIT
-E2E_IMAGE=${E2E_IMAGE:-registry.k8s.io/ingress-nginx/e2e-test-runner:v20240829-2c421762@sha256:5b7809bfe9cbd9cd6bcb8033ca27576ca704f05ce729fe4dcb574810f7a25785}
+E2E_IMAGE=${E2E_IMAGE:-registry.k8s.io/ingress-nginx/e2e-test-runner:v20241004-114a6abb@sha256:1389ec0589abbf5c431c9290c4c307437c8396995c63dda5eac26abd70963dc8}
if [[ "$RUNTIME" == podman ]]; then
# Podman does not support both tag and digest
diff --git a/test/e2e-image/Makefile b/test/e2e-image/Makefile
index 8e3040177..e3b0d609f 100644
--- a/test/e2e-image/Makefile
+++ b/test/e2e-image/Makefile
@@ -1,6 +1,6 @@
DIR:=$(shell dirname $(realpath $(firstword $(MAKEFILE_LIST))))
-E2E_BASE_IMAGE ?= "registry.k8s.io/ingress-nginx/e2e-test-runner:v20240829-2c421762@sha256:5b7809bfe9cbd9cd6bcb8033ca27576ca704f05ce729fe4dcb574810f7a25785"
+E2E_BASE_IMAGE ?= "registry.k8s.io/ingress-nginx/e2e-test-runner:v20241004-114a6abb@sha256:1389ec0589abbf5c431c9290c4c307437c8396995c63dda5eac26abd70963dc8"
image:
echo "..entered Makefile in /test/e2e-image"
diff --git a/test/e2e/run-chart-test.sh b/test/e2e/run-chart-test.sh
index b6748f129..587dbe98b 100755
--- a/test/e2e/run-chart-test.sh
+++ b/test/e2e/run-chart-test.sh
@@ -114,5 +114,5 @@ docker run \
--workdir /workdir \
--entrypoint ct \
--rm \
- registry.k8s.io/ingress-nginx/e2e-test-runner:v20240829-2c421762@sha256:5b7809bfe9cbd9cd6bcb8033ca27576ca704f05ce729fe4dcb574810f7a25785 \
+ registry.k8s.io/ingress-nginx/e2e-test-runner:v20241004-114a6abb@sha256:1389ec0589abbf5c431c9290c4c307437c8396995c63dda5eac26abd70963dc8 \
install --charts charts/ingress-nginx
From 73622882070fb459f7bf0b63186416be46852043 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Sat, 5 Oct 2024 07:36:03 +0100
Subject: [PATCH 273/283] Bump golang.org/x/crypto from 0.27.0 to 0.28.0
(#12107)
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
go.mod | 8 ++++----
go.sum | 16 ++++++++--------
2 files changed, 12 insertions(+), 12 deletions(-)
diff --git a/go.mod b/go.mod
index 74fe03207..3f0637f03 100644
--- a/go.mod
+++ b/go.mod
@@ -25,7 +25,7 @@ require (
github.com/stretchr/testify v1.9.0
github.com/yudai/gojsondiff v1.0.0
github.com/zakjan/cert-chain-resolver v0.0.0-20221221105603-fcedb00c5b30
- golang.org/x/crypto v0.27.0
+ golang.org/x/crypto v0.28.0
golang.org/x/exp v0.0.0-20240719175910-8a7402abbf56
google.golang.org/grpc v1.67.1
google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab
@@ -118,9 +118,9 @@ require (
golang.org/x/net v0.29.0 // indirect
golang.org/x/oauth2 v0.23.0 // indirect
golang.org/x/sync v0.8.0 // indirect
- golang.org/x/sys v0.25.0 // indirect
- golang.org/x/term v0.24.0 // indirect
- golang.org/x/text v0.18.0 // indirect
+ golang.org/x/sys v0.26.0 // indirect
+ golang.org/x/term v0.25.0 // indirect
+ golang.org/x/text v0.19.0 // indirect
golang.org/x/time v0.5.0 // indirect
golang.org/x/tools v0.24.0 // indirect
google.golang.org/genproto/googleapis/rpc v0.0.0-20240814211410-ddb44dafa142 // indirect
diff --git a/go.sum b/go.sum
index 3390e4c13..470599f77 100644
--- a/go.sum
+++ b/go.sum
@@ -235,8 +235,8 @@ go.uber.org/zap v1.27.0/go.mod h1:GB2qFLM7cTU87MWRP2mPIjqfIDnGu+VIO4V/SdhGo2E=
golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
-golang.org/x/crypto v0.27.0 h1:GXm2NjJrPaiv/h1tb2UH8QfgC/hOf/+z0p6PT8o1w7A=
-golang.org/x/crypto v0.27.0/go.mod h1:1Xngt8kV6Dvbssa53Ziq6Eqn0HqbZi5Z6R0ZpwQzt70=
+golang.org/x/crypto v0.28.0 h1:GBDwsMXVQi34v5CCYUm2jkJvu4cbtru2U4TN2PSyQnw=
+golang.org/x/crypto v0.28.0/go.mod h1:rmgy+3RHxRZMyY0jjAJShp2zgEdOqj2AO7U0pYmeQ7U=
golang.org/x/exp v0.0.0-20240719175910-8a7402abbf56 h1:2dVuKD2vS7b0QIHQbpyTISPd0LeHDbnYEryqj5Q1ug8=
golang.org/x/exp v0.0.0-20240719175910-8a7402abbf56/go.mod h1:M4RDyNAINzryxdtnbRXRL/OHtkFuWGRjvuhBJpk2IlY=
golang.org/x/mod v0.2.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
@@ -273,14 +273,14 @@ golang.org/x/sys v0.0.0-20220520151302-bc2c85ada10a/go.mod h1:oPkhp1MJrh7nUepCBc
golang.org/x/sys v0.0.0-20220715151400-c0bba94af5f8/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.0.0-20220811171246-fbc7d0a398ab/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.25.0 h1:r+8e+loiHxRqhXVl6ML1nO3l1+oFoWbnlu2Ehimmi34=
-golang.org/x/sys v0.25.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
-golang.org/x/term v0.24.0 h1:Mh5cbb+Zk2hqqXNO7S1iTjEphVL+jb8ZWaqh/g+JWkM=
-golang.org/x/term v0.24.0/go.mod h1:lOBK/LVxemqiMij05LGJ0tzNr8xlmwBRJ81PX6wVLH8=
+golang.org/x/sys v0.26.0 h1:KHjCJyddX0LoSTb3J+vWpupP9p0oznkqVk/IfjymZbo=
+golang.org/x/sys v0.26.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
+golang.org/x/term v0.25.0 h1:WtHI/ltw4NvSUig5KARz9h521QvRC8RmF/cuYqifU24=
+golang.org/x/term v0.25.0/go.mod h1:RPyXicDX+6vLxogjjRxjgD2TKtmAO6NZBsBRfrOLu7M=
golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
golang.org/x/text v0.3.3/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
-golang.org/x/text v0.18.0 h1:XvMDiNzPAl0jr17s6W9lcaIhGUfUORdGCNsuLmPG224=
-golang.org/x/text v0.18.0/go.mod h1:BuEKDfySbSR4drPmRPG/7iBdf8hvFMuRexcpahXilzY=
+golang.org/x/text v0.19.0 h1:kTxAhCbGbxhK0IwgSKiMO5awPoDQ0RpfiVYBfK860YM=
+golang.org/x/text v0.19.0/go.mod h1:BuEKDfySbSR4drPmRPG/7iBdf8hvFMuRexcpahXilzY=
golang.org/x/time v0.5.0 h1:o7cqy6amK/52YcAKIPlM3a+Fpj35zvRj2TP+e1xFSfk=
golang.org/x/time v0.5.0/go.mod h1:3BpzKBy/shNhVucY/MWOyx10tF3SFh9QdLuxbVysPQM=
golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
From 90259d65c5b8cba0ef2d14b6a1df07f2b5463a8e Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Sat, 5 Oct 2024 23:26:54 +0200
Subject: [PATCH 274/283] Images: Trigger other builds. (#12110)
---
cloudbuild.yaml | 1 -
images/cfssl/TAG | 2 +-
images/custom-error-pages/TAG | 2 +-
images/custom-error-pages/cloudbuild.yaml | 1 -
images/fastcgi-helloserver/TAG | 2 +-
images/fastcgi-helloserver/cloudbuild.yaml | 1 -
images/httpbun/TAG | 2 +-
images/httpbun/cloudbuild.yaml | 1 -
images/kube-webhook-certgen/TAG | 2 +-
images/kube-webhook-certgen/cloudbuild.yaml | 1 -
images/test-runner/cloudbuild.yaml | 1 -
11 files changed, 5 insertions(+), 11 deletions(-)
diff --git a/cloudbuild.yaml b/cloudbuild.yaml
index 494838720..96e8990eb 100644
--- a/cloudbuild.yaml
+++ b/cloudbuild.yaml
@@ -12,4 +12,3 @@ steps:
args:
- -c
- gcloud auth configure-docker && make release
-timeout: 1800s
diff --git a/images/cfssl/TAG b/images/cfssl/TAG
index 0ec25f750..b18d46540 100644
--- a/images/cfssl/TAG
+++ b/images/cfssl/TAG
@@ -1 +1 @@
-v1.0.0
+v1.0.1
diff --git a/images/custom-error-pages/TAG b/images/custom-error-pages/TAG
index b18d46540..570c79651 100644
--- a/images/custom-error-pages/TAG
+++ b/images/custom-error-pages/TAG
@@ -1 +1 @@
-v1.0.1
+v1.0.2
diff --git a/images/custom-error-pages/cloudbuild.yaml b/images/custom-error-pages/cloudbuild.yaml
index 772a7697f..a8bd4c815 100644
--- a/images/custom-error-pages/cloudbuild.yaml
+++ b/images/custom-error-pages/cloudbuild.yaml
@@ -9,4 +9,3 @@ steps:
args:
- -c
- gcloud auth configure-docker && cd images && make NAME=custom-error-pages push
-timeout: 3600s
diff --git a/images/fastcgi-helloserver/TAG b/images/fastcgi-helloserver/TAG
index b18d46540..570c79651 100644
--- a/images/fastcgi-helloserver/TAG
+++ b/images/fastcgi-helloserver/TAG
@@ -1 +1 @@
-v1.0.1
+v1.0.2
diff --git a/images/fastcgi-helloserver/cloudbuild.yaml b/images/fastcgi-helloserver/cloudbuild.yaml
index 5fb3e3318..cfa07b4d7 100644
--- a/images/fastcgi-helloserver/cloudbuild.yaml
+++ b/images/fastcgi-helloserver/cloudbuild.yaml
@@ -9,4 +9,3 @@ steps:
args:
- -c
- gcloud auth configure-docker && cd images && make NAME=fastcgi-helloserver push
-timeout: 3600s
diff --git a/images/httpbun/TAG b/images/httpbun/TAG
index b18d46540..570c79651 100644
--- a/images/httpbun/TAG
+++ b/images/httpbun/TAG
@@ -1 +1 @@
-v1.0.1
+v1.0.2
diff --git a/images/httpbun/cloudbuild.yaml b/images/httpbun/cloudbuild.yaml
index 3d2662531..7a3f6c8d0 100644
--- a/images/httpbun/cloudbuild.yaml
+++ b/images/httpbun/cloudbuild.yaml
@@ -9,4 +9,3 @@ steps:
args:
- -c
- gcloud auth configure-docker && cd images && make NAME=httpbun push
-timeout: 3600s
diff --git a/images/kube-webhook-certgen/TAG b/images/kube-webhook-certgen/TAG
index 92f76b423..61919cdd8 100644
--- a/images/kube-webhook-certgen/TAG
+++ b/images/kube-webhook-certgen/TAG
@@ -1 +1 @@
-v1.4.3
+v1.4.4
diff --git a/images/kube-webhook-certgen/cloudbuild.yaml b/images/kube-webhook-certgen/cloudbuild.yaml
index 8bf139423..e9a5dd5cc 100644
--- a/images/kube-webhook-certgen/cloudbuild.yaml
+++ b/images/kube-webhook-certgen/cloudbuild.yaml
@@ -9,4 +9,3 @@ steps:
args:
- -c
- gcloud auth configure-docker && cd images && make NAME=kube-webhook-certgen push
-timeout: 1800s
diff --git a/images/test-runner/cloudbuild.yaml b/images/test-runner/cloudbuild.yaml
index 6efe5eeaf..878821289 100644
--- a/images/test-runner/cloudbuild.yaml
+++ b/images/test-runner/cloudbuild.yaml
@@ -9,4 +9,3 @@ steps:
args:
- -c
- gcloud auth configure-docker && cd images/test-runner && make push
-timeout: 1800s
From f17201cc9619de78d5a289292bf039dcb8e18fc4 Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Sun, 6 Oct 2024 00:41:58 +0200
Subject: [PATCH 275/283] Cloud Build: Bump `gcb-docker-gcloud` to
v20240718-5ef92b5c36. (#12113)
---
cloudbuild.yaml | 2 +-
images/cfssl/cloudbuild.yaml | 2 +-
images/custom-error-pages/cloudbuild.yaml | 2 +-
images/e2e-test-echo/cloudbuild.yaml | 2 +-
images/fastcgi-helloserver/cloudbuild.yaml | 2 +-
images/httpbun/cloudbuild.yaml | 2 +-
images/kube-webhook-certgen/cloudbuild.yaml | 2 +-
images/nginx/cloudbuild.yaml | 2 +-
images/test-runner/cloudbuild.yaml | 2 +-
9 files changed, 9 insertions(+), 9 deletions(-)
diff --git a/cloudbuild.yaml b/cloudbuild.yaml
index 96e8990eb..0948b1f05 100644
--- a/cloudbuild.yaml
+++ b/cloudbuild.yaml
@@ -2,7 +2,7 @@ options:
# Ignore Prow provided substitutions.
substitution_option: ALLOW_LOOSE
steps:
- - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
+ - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240718-5ef92b5c36
env:
- REGISTRY=gcr.io/k8s-staging-ingress-nginx
- REPO_INFO=https://github.com/kubernetes/ingress-nginx
diff --git a/images/cfssl/cloudbuild.yaml b/images/cfssl/cloudbuild.yaml
index 6b5b0fc1b..a17f86196 100644
--- a/images/cfssl/cloudbuild.yaml
+++ b/images/cfssl/cloudbuild.yaml
@@ -2,7 +2,7 @@ options:
# Ignore Prow provided substitutions.
substitution_option: ALLOW_LOOSE
steps:
- - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
+ - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240718-5ef92b5c36
env:
- REGISTRY=gcr.io/k8s-staging-ingress-nginx
entrypoint: bash
diff --git a/images/custom-error-pages/cloudbuild.yaml b/images/custom-error-pages/cloudbuild.yaml
index a8bd4c815..99a8d78b6 100644
--- a/images/custom-error-pages/cloudbuild.yaml
+++ b/images/custom-error-pages/cloudbuild.yaml
@@ -2,7 +2,7 @@ options:
# Ignore Prow provided substitutions.
substitution_option: ALLOW_LOOSE
steps:
- - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
+ - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240718-5ef92b5c36
env:
- REGISTRY=gcr.io/k8s-staging-ingress-nginx
entrypoint: bash
diff --git a/images/e2e-test-echo/cloudbuild.yaml b/images/e2e-test-echo/cloudbuild.yaml
index dc6e1dcf0..1d525e413 100644
--- a/images/e2e-test-echo/cloudbuild.yaml
+++ b/images/e2e-test-echo/cloudbuild.yaml
@@ -2,7 +2,7 @@ options:
# Ignore Prow provided substitutions.
substitution_option: ALLOW_LOOSE
steps:
- - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
+ - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240718-5ef92b5c36
env:
- REGISTRY=gcr.io/k8s-staging-ingress-nginx
entrypoint: bash
diff --git a/images/fastcgi-helloserver/cloudbuild.yaml b/images/fastcgi-helloserver/cloudbuild.yaml
index cfa07b4d7..7eb047612 100644
--- a/images/fastcgi-helloserver/cloudbuild.yaml
+++ b/images/fastcgi-helloserver/cloudbuild.yaml
@@ -2,7 +2,7 @@ options:
# Ignore Prow provided substitutions.
substitution_option: ALLOW_LOOSE
steps:
- - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
+ - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240718-5ef92b5c36
env:
- REGISTRY=gcr.io/k8s-staging-ingress-nginx
entrypoint: bash
diff --git a/images/httpbun/cloudbuild.yaml b/images/httpbun/cloudbuild.yaml
index 7a3f6c8d0..4df9d090c 100644
--- a/images/httpbun/cloudbuild.yaml
+++ b/images/httpbun/cloudbuild.yaml
@@ -2,7 +2,7 @@ options:
# Ignore Prow provided substitutions.
substitution_option: ALLOW_LOOSE
steps:
- - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
+ - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240718-5ef92b5c36
env:
- REGISTRY=gcr.io/k8s-staging-ingress-nginx
entrypoint: bash
diff --git a/images/kube-webhook-certgen/cloudbuild.yaml b/images/kube-webhook-certgen/cloudbuild.yaml
index e9a5dd5cc..74f4a04a1 100644
--- a/images/kube-webhook-certgen/cloudbuild.yaml
+++ b/images/kube-webhook-certgen/cloudbuild.yaml
@@ -2,7 +2,7 @@ options:
# Ignore Prow provided substitutions.
substitution_option: ALLOW_LOOSE
steps:
- - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
+ - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240718-5ef92b5c36
env:
- REGISTRY=gcr.io/k8s-staging-ingress-nginx
entrypoint: bash
diff --git a/images/nginx/cloudbuild.yaml b/images/nginx/cloudbuild.yaml
index a5ec1abd8..c53259ad1 100644
--- a/images/nginx/cloudbuild.yaml
+++ b/images/nginx/cloudbuild.yaml
@@ -4,7 +4,7 @@ options:
# Ignore Prow provided substitutions.
substitution_option: ALLOW_LOOSE
steps:
- - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
+ - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240718-5ef92b5c36
env:
- REGISTRY=gcr.io/k8s-staging-ingress-nginx
entrypoint: bash
diff --git a/images/test-runner/cloudbuild.yaml b/images/test-runner/cloudbuild.yaml
index 878821289..b9df15a5e 100644
--- a/images/test-runner/cloudbuild.yaml
+++ b/images/test-runner/cloudbuild.yaml
@@ -2,7 +2,7 @@ options:
# Ignore Prow provided substitutions.
substitution_option: ALLOW_LOOSE
steps:
- - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9
+ - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240718-5ef92b5c36
env:
- REGISTRY=gcr.io/k8s-staging-ingress-nginx
entrypoint: bash
From d0827a6c909b3e920739932a7777225a42aefa4a Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Sun, 6 Oct 2024 02:12:04 +0200
Subject: [PATCH 276/283] Tests & Docs: Bump images. (#12118)
---
.../custom-errors/custom-default-backend.helm.values.yaml | 2 +-
.../customization/custom-errors/custom-default-backend.yaml | 2 +-
test/e2e/HTTPBUN_IMAGE | 2 +-
test/e2e/framework/fastcgi_helloserver.go | 2 +-
test/e2e/settings/ocsp/ocsp.go | 2 +-
5 files changed, 5 insertions(+), 5 deletions(-)
diff --git a/docs/examples/customization/custom-errors/custom-default-backend.helm.values.yaml b/docs/examples/customization/custom-errors/custom-default-backend.helm.values.yaml
index e6c3e2169..fb07ac9fe 100644
--- a/docs/examples/customization/custom-errors/custom-default-backend.helm.values.yaml
+++ b/docs/examples/customization/custom-errors/custom-default-backend.helm.values.yaml
@@ -6,7 +6,7 @@ defaultBackend:
image:
registry: registry.k8s.io
image: ingress-nginx/custom-error-pages
- tag: v1.0.1@sha256:d8ab7de384cf41bdaa696354e19f1d0efbb0c9ac69f8682ffc0cc008a252eb76
+ tag: v1.0.2@sha256:b2259cf6bfda813548a64bded551b1854cb600c4f095738b49b4c5cdf8ab9d21
extraVolumes:
- name: custom-error-pages
configMap:
diff --git a/docs/examples/customization/custom-errors/custom-default-backend.yaml b/docs/examples/customization/custom-errors/custom-default-backend.yaml
index a47805ad7..805cf90ab 100644
--- a/docs/examples/customization/custom-errors/custom-default-backend.yaml
+++ b/docs/examples/customization/custom-errors/custom-default-backend.yaml
@@ -36,7 +36,7 @@ spec:
spec:
containers:
- name: nginx-error-server
- image: registry.k8s.io/ingress-nginx/custom-error-pages:v1.0.1@sha256:d8ab7de384cf41bdaa696354e19f1d0efbb0c9ac69f8682ffc0cc008a252eb76
+ image: registry.k8s.io/ingress-nginx/custom-error-pages:v1.0.2@sha256:b2259cf6bfda813548a64bded551b1854cb600c4f095738b49b4c5cdf8ab9d21
ports:
- containerPort: 8080
# Setting the environment variable DEBUG we can see the headers sent
diff --git a/test/e2e/HTTPBUN_IMAGE b/test/e2e/HTTPBUN_IMAGE
index 7deb1e1cb..7ea3fdc70 100644
--- a/test/e2e/HTTPBUN_IMAGE
+++ b/test/e2e/HTTPBUN_IMAGE
@@ -1 +1 @@
-registry.k8s.io/ingress-nginx/httpbun:v1.0.1@sha256:264371edd5b19ddc2da9333bb4d87c0ce3c0cf37c73c4adeb8bc641b872bc9da
+registry.k8s.io/ingress-nginx/httpbun:v1.0.2@sha256:d4079f3027dba27e2a1d7fcfb3144d6dd9e15307fb7fa80ca649232d08e90d16
diff --git a/test/e2e/framework/fastcgi_helloserver.go b/test/e2e/framework/fastcgi_helloserver.go
index 60482c067..804bb7898 100644
--- a/test/e2e/framework/fastcgi_helloserver.go
+++ b/test/e2e/framework/fastcgi_helloserver.go
@@ -59,7 +59,7 @@ func (f *Framework) NewNewFastCGIHelloServerDeploymentWithReplicas(replicas int3
Containers: []corev1.Container{
{
Name: "fastcgi-helloserver",
- Image: "registry.k8s.io/ingress-nginx/fastcgi-helloserver:v1.0.1@sha256:bfcce5866d106450f41af15af868886c953c3661373f34aa6d99bcc6f44c6ba6",
+ Image: "registry.k8s.io/ingress-nginx/fastcgi-helloserver:v1.0.2@sha256:dc400fc69d7e0b27dcfe86be29946e19c2a853391305e2790f387267c2e6473e",
Env: []corev1.EnvVar{},
Ports: []corev1.ContainerPort{
{
diff --git a/test/e2e/settings/ocsp/ocsp.go b/test/e2e/settings/ocsp/ocsp.go
index 5dcaccc2f..a53b90b80 100644
--- a/test/e2e/settings/ocsp/ocsp.go
+++ b/test/e2e/settings/ocsp/ocsp.go
@@ -297,7 +297,7 @@ func ocspserveDeployment(namespace string) (*appsv1.Deployment, *corev1.Service)
Containers: []corev1.Container{
{
Name: name,
- Image: "registry.k8s.io/ingress-nginx/cfssl:v1.0.0@sha256:fffd36e2f1c8fd485ec6fd24c6d55f0817b54352274293d2a247b8a0d924c5b0",
+ Image: "registry.k8s.io/ingress-nginx/cfssl:v1.0.1@sha256:12425bab3f5e41ed20b850fd1e3737a48474f9ad48363efb116243a853db754a",
Command: []string{
"/bin/bash",
"-c",
From 657393e7b3b94e41f1b66081d9a5323e7eb097dc Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Sun, 6 Oct 2024 09:50:03 +0200
Subject: [PATCH 277/283] Chart: Bump Kube Webhook CertGen. (#12119)
---
charts/ingress-nginx/README.md | 4 ++--
charts/ingress-nginx/values.yaml | 4 ++--
2 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/charts/ingress-nginx/README.md b/charts/ingress-nginx/README.md
index 4a0f50484..5475aaa79 100644
--- a/charts/ingress-nginx/README.md
+++ b/charts/ingress-nginx/README.md
@@ -252,10 +252,10 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
| controller.admissionWebhooks.namespaceSelector | object | `{}` | |
| controller.admissionWebhooks.objectSelector | object | `{}` | |
| controller.admissionWebhooks.patch.enabled | bool | `true` | |
-| controller.admissionWebhooks.patch.image.digest | string | `"sha256:a320a50cc91bd15fd2d6fa6de58bd98c1bd64b9a6f926ce23a600d87043455a3"` | |
+| controller.admissionWebhooks.patch.image.digest | string | `"sha256:a9f03b34a3cbfbb26d103a14046ab2c5130a80c3d69d526ff8063d2b37b9fd3f"` | |
| controller.admissionWebhooks.patch.image.image | string | `"ingress-nginx/kube-webhook-certgen"` | |
| controller.admissionWebhooks.patch.image.pullPolicy | string | `"IfNotPresent"` | |
-| controller.admissionWebhooks.patch.image.tag | string | `"v1.4.3"` | |
+| controller.admissionWebhooks.patch.image.tag | string | `"v1.4.4"` | |
| controller.admissionWebhooks.patch.labels | object | `{}` | Labels to be added to patch job resources |
| controller.admissionWebhooks.patch.networkPolicy.enabled | bool | `false` | Enable 'networkPolicy' or not |
| controller.admissionWebhooks.patch.nodeSelector."kubernetes.io/os" | string | `"linux"` | |
diff --git a/charts/ingress-nginx/values.yaml b/charts/ingress-nginx/values.yaml
index 136fae4b2..2c76c8e85 100644
--- a/charts/ingress-nginx/values.yaml
+++ b/charts/ingress-nginx/values.yaml
@@ -795,8 +795,8 @@ controller:
## for backwards compatibility consider setting the full image url via the repository value below
## use *either* current default registry/image or repository format or installing chart by providing the values.yaml will fail
## repository:
- tag: v1.4.3
- digest: sha256:a320a50cc91bd15fd2d6fa6de58bd98c1bd64b9a6f926ce23a600d87043455a3
+ tag: v1.4.4
+ digest: sha256:a9f03b34a3cbfbb26d103a14046ab2c5130a80c3d69d526ff8063d2b37b9fd3f
pullPolicy: IfNotPresent
# -- Provide a priority class name to the webhook patching job
##
From deb01b9f2c5812c6477f9750610ee60660388758 Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Sun, 6 Oct 2024 16:51:06 +0200
Subject: [PATCH 278/283] Images: Build `s390x` controller. (#12125)
---
Makefile | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/Makefile b/Makefile
index 1c35c12b2..033577e14 100644
--- a/Makefile
+++ b/Makefile
@@ -240,8 +240,8 @@ ensure-buildx:
show-version:
echo -n $(TAG)
-PLATFORMS ?= amd64 arm arm64
-BUILDX_PLATFORMS ?= linux/amd64,linux/arm,linux/arm64
+PLATFORMS ?= amd64 arm arm64 s390x
+BUILDX_PLATFORMS ?= linux/amd64,linux/arm,linux/arm64,linux/s390x
.PHONY: release # Build a multi-arch docker image
release: ensure-buildx clean
From fdfc97a7fb090afa3715811169bde75fa662a9e8 Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Mon, 7 Oct 2024 14:30:21 +0200
Subject: [PATCH 279/283] Images: Drop `s390x`. (#12131)
---
.github/workflows/images.yaml | 2 +-
Makefile | 4 ++--
hack/init-buildx.sh | 5 ++---
images/Makefile | 2 +-
images/nginx/Makefile | 2 +-
5 files changed, 7 insertions(+), 8 deletions(-)
diff --git a/.github/workflows/images.yaml b/.github/workflows/images.yaml
index 77358e8b3..7804158ba 100644
--- a/.github/workflows/images.yaml
+++ b/.github/workflows/images.yaml
@@ -169,7 +169,7 @@ jobs:
if: |
(github.event_name == 'push' && github.ref == 'refs/heads/main' && needs.changes.outputs.nginx == 'true')
env:
- PLATFORMS: linux/amd64,linux/arm,linux/arm64,linux/s390x
+ PLATFORMS: linux/amd64,linux/arm,linux/arm64
steps:
- name: Checkout
uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
diff --git a/Makefile b/Makefile
index 033577e14..1c35c12b2 100644
--- a/Makefile
+++ b/Makefile
@@ -240,8 +240,8 @@ ensure-buildx:
show-version:
echo -n $(TAG)
-PLATFORMS ?= amd64 arm arm64 s390x
-BUILDX_PLATFORMS ?= linux/amd64,linux/arm,linux/arm64,linux/s390x
+PLATFORMS ?= amd64 arm arm64
+BUILDX_PLATFORMS ?= linux/amd64,linux/arm,linux/arm64
.PHONY: release # Build a multi-arch docker image
release: ensure-buildx clean
diff --git a/hack/init-buildx.sh b/hack/init-buildx.sh
index 1a47bf145..bac68e1ae 100755
--- a/hack/init-buildx.sh
+++ b/hack/init-buildx.sh
@@ -42,12 +42,11 @@ fi
# We can skip setup if the current builder already has multi-arch
# AND if it isn't the docker driver, which doesn't work
current_builder="$(docker buildx inspect)"
-# linux/amd64, linux/arm64, linux/riscv64, linux/ppc64le, linux/s390x, linux/386, linux/arm/v7, linux/arm/v6
+# linux/amd64, linux/arm, linux/arm64
if ! grep -q "^Driver: docker$" <<<"${current_builder}" && \
grep -q "linux/amd64" <<<"${current_builder}" && \
grep -q "linux/arm" <<<"${current_builder}" && \
- grep -q "linux/arm64" <<<"${current_builder}" && \
- grep -q "linux/s390x" <<<"${current_builder}"; then
+ grep -q "linux/arm64" <<<"${current_builder}"; then
exit 0
fi
diff --git a/images/Makefile b/images/Makefile
index 990d77231..31560168d 100644
--- a/images/Makefile
+++ b/images/Makefile
@@ -41,7 +41,7 @@ EXTRAARGS ?= $(shell cat $(NAME)/EXTRAARGS)
export DOCKER_CLI_EXPERIMENTAL=enabled
# build with buildx
-PLATFORMS?=linux/amd64,linux/arm,linux/arm64,linux/s390x
+PLATFORMS?=linux/amd64,linux/arm,linux/arm64
OUTPUT=
PROGRESS=plain
diff --git a/images/nginx/Makefile b/images/nginx/Makefile
index 103ba217f..3ed502759 100644
--- a/images/nginx/Makefile
+++ b/images/nginx/Makefile
@@ -32,7 +32,7 @@ IMAGE = $(REGISTRY)/nginx
export DOCKER_CLI_EXPERIMENTAL=enabled
# build with buildx
-PLATFORMS?=linux/amd64,linux/arm,linux/arm64,linux/s390x
+PLATFORMS?=linux/amd64,linux/arm,linux/arm64
OUTPUT=
PROGRESS=plain
build: ensure-buildx
From 293b4fef24d67d6539134c15d21d5c8221b118fc Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Mon, 7 Oct 2024 14:46:22 +0200
Subject: [PATCH 280/283] Images: Trigger `e2e-test-echo` build. (#12132)
---
images/e2e-test-echo/TAG | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/images/e2e-test-echo/TAG b/images/e2e-test-echo/TAG
index 0ec25f750..b18d46540 100644
--- a/images/e2e-test-echo/TAG
+++ b/images/e2e-test-echo/TAG
@@ -1 +1 @@
-v1.0.0
+v1.0.1
From c9aa724f6d9158b5e07c3ffdbe9f67fcd7f35b90 Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Mon, 7 Oct 2024 21:26:18 +0200
Subject: [PATCH 281/283] Tests & Docs: Bump `e2e-test-echo` to v1.0.1.
(#12143)
---
docs/examples/canary/README.md | 4 ++--
.../customization/external-auth-headers/echo-service.yaml | 2 +-
test/e2e/framework/deployment.go | 2 +-
3 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/docs/examples/canary/README.md b/docs/examples/canary/README.md
index 4124faf6f..865325b73 100644
--- a/docs/examples/canary/README.md
+++ b/docs/examples/canary/README.md
@@ -31,7 +31,7 @@ spec:
spec:
containers:
- name: production
- image: registry.k8s.io/ingress-nginx/e2e-test-echo@sha256:6fc5aa2994c86575975bb20a5203651207029a0d28e3f491d8a127d08baadab4
+ image: registry.k8s.io/ingress-nginx/e2e-test-echo:v1.0.1@sha256:1cec65aa768720290d05d65ab1c297ca46b39930e56bc9488259f9114fcd30e2
ports:
- containerPort: 80
env:
@@ -97,7 +97,7 @@ spec:
spec:
containers:
- name: canary
- image: registry.k8s.io/ingress-nginx/e2e-test-echo@sha256:6fc5aa2994c86575975bb20a5203651207029a0d28e3f491d8a127d08baadab4
+ image: registry.k8s.io/ingress-nginx/e2e-test-echo:v1.0.1@sha256:1cec65aa768720290d05d65ab1c297ca46b39930e56bc9488259f9114fcd30e2
ports:
- containerPort: 80
env:
diff --git a/docs/examples/customization/external-auth-headers/echo-service.yaml b/docs/examples/customization/external-auth-headers/echo-service.yaml
index fc4461cd8..9f597a7f5 100644
--- a/docs/examples/customization/external-auth-headers/echo-service.yaml
+++ b/docs/examples/customization/external-auth-headers/echo-service.yaml
@@ -18,7 +18,7 @@ spec:
terminationGracePeriodSeconds: 60
containers:
- name: echo-service
- image: registry.k8s.io/ingress-nginx/e2e-test-echo:v20230527@sha256:6fc5aa2994c86575975bb20a5203651207029a0d28e3f491d8a127d08baadab4
+ image: registry.k8s.io/ingress-nginx/e2e-test-echo:v1.0.1@sha256:1cec65aa768720290d05d65ab1c297ca46b39930e56bc9488259f9114fcd30e2
ports:
- containerPort: 8080
resources:
diff --git a/test/e2e/framework/deployment.go b/test/e2e/framework/deployment.go
index 9eaf42565..d6e59f18a 100644
--- a/test/e2e/framework/deployment.go
+++ b/test/e2e/framework/deployment.go
@@ -47,7 +47,7 @@ const NIPService = "external-nip"
var HTTPBunImage = os.Getenv("HTTPBUN_IMAGE")
// EchoImage is the default image to be used by the echo service
-const EchoImage = "registry.k8s.io/ingress-nginx/e2e-test-echo@sha256:4938d1d91a2b7d19454460a8c1b010b89f6ff92d2987fd889ac3e8fc3b70d91a" //#nosec G101
+const EchoImage = "registry.k8s.io/ingress-nginx/e2e-test-echo:v1.0.1@sha256:1cec65aa768720290d05d65ab1c297ca46b39930e56bc9488259f9114fcd30e2" //#nosec G101
// TODO: change all Deployment functions to use these options
// in order to reduce complexity and have a unified API across the
From 75c77e5dc3cdbf93725cd586afe7288b2b52eefd Mon Sep 17 00:00:00 2001
From: Marco Ebert
Date: Mon, 7 Oct 2024 21:34:22 +0200
Subject: [PATCH 282/283] Metrics: Disable by default. (#12095)
---
charts/ingress-nginx/templates/_params.tpl | 2 +-
.../tests/controller-daemonset_test.yaml | 22 +++++++++----------
.../tests/controller-deployment_test.yaml | 20 ++++++++---------
docs/user-guide/cli-arguments.md | 2 +-
pkg/flags/flags.go | 2 +-
5 files changed, 24 insertions(+), 24 deletions(-)
diff --git a/charts/ingress-nginx/templates/_params.tpl b/charts/ingress-nginx/templates/_params.tpl
index 763e55570..0051dc9c0 100644
--- a/charts/ingress-nginx/templates/_params.tpl
+++ b/charts/ingress-nginx/templates/_params.tpl
@@ -54,7 +54,7 @@
{{- if .Values.controller.watchIngressWithoutClass }}
- --watch-ingress-without-class=true
{{- end }}
-{{- if not .Values.controller.metrics.enabled }}
+{{- if .Values.controller.metrics.enabled }}
- --enable-metrics={{ .Values.controller.metrics.enabled }}
{{- end }}
{{- if .Values.controller.enableTopologyAwareRouting }}
diff --git a/charts/ingress-nginx/tests/controller-daemonset_test.yaml b/charts/ingress-nginx/tests/controller-daemonset_test.yaml
index c28c6ee0d..d2d77befb 100644
--- a/charts/ingress-nginx/tests/controller-daemonset_test.yaml
+++ b/charts/ingress-nginx/tests/controller-daemonset_test.yaml
@@ -15,23 +15,23 @@ tests:
path: metadata.name
value: RELEASE-NAME-ingress-nginx-controller
- - it: should create a DaemonSet with argument `--enable-metrics=false` if `controller.metrics.enabled` is false
- set:
- controller.kind: DaemonSet
- controller.metrics.enabled: false
- asserts:
- - contains:
- path: spec.template.spec.containers[0].args
- content: --enable-metrics=false
-
- - it: should create a DaemonSet without argument `--enable-metrics=false` if `controller.metrics.enabled` is true
+ - it: should create a DaemonSet with argument `--enable-metrics=true` if `controller.metrics.enabled` is true
set:
controller.kind: DaemonSet
controller.metrics.enabled: true
+ asserts:
+ - contains:
+ path: spec.template.spec.containers[0].args
+ content: --enable-metrics=true
+
+ - it: should create a DaemonSet without argument `--enable-metrics=true` if `controller.metrics.enabled` is false
+ set:
+ controller.kind: DaemonSet
+ controller.metrics.enabled: false
asserts:
- notContains:
path: spec.template.spec.containers[0].args
- content: --enable-metrics=false
+ content: --enable-metrics=true
- it: should create a DaemonSet with argument `--controller-class=k8s.io/ingress-nginx-internal` if `controller.ingressClassResource.controllerValue` is "k8s.io/ingress-nginx-internal"
set:
diff --git a/charts/ingress-nginx/tests/controller-deployment_test.yaml b/charts/ingress-nginx/tests/controller-deployment_test.yaml
index 2c57636fb..1cc9c9325 100644
--- a/charts/ingress-nginx/tests/controller-deployment_test.yaml
+++ b/charts/ingress-nginx/tests/controller-deployment_test.yaml
@@ -43,21 +43,21 @@ tests:
- exists:
path: spec.replicas
- - it: should create a Deployment with argument `--enable-metrics=false` if `controller.metrics.enabled` is false
- set:
- controller.metrics.enabled: false
- asserts:
- - contains:
- path: spec.template.spec.containers[0].args
- content: --enable-metrics=false
-
- - it: should create a Deployment without argument `--enable-metrics=false` if `controller.metrics.enabled` is true
+ - it: should create a Deployment with argument `--enable-metrics=true` if `controller.metrics.enabled` is true
set:
controller.metrics.enabled: true
+ asserts:
+ - contains:
+ path: spec.template.spec.containers[0].args
+ content: --enable-metrics=true
+
+ - it: should create a Deployment without argument `--enable-metrics=true` if `controller.metrics.enabled` is false
+ set:
+ controller.metrics.enabled: false
asserts:
- notContains:
path: spec.template.spec.containers[0].args
- content: --enable-metrics=false
+ content: --enable-metrics=true
- it: should create a Deployment with argument `--controller-class=k8s.io/ingress-nginx-internal` if `controller.ingressClassResource.controllerValue` is "k8s.io/ingress-nginx-internal"
set:
diff --git a/docs/user-guide/cli-arguments.md b/docs/user-guide/cli-arguments.md
index 1beb821c7..a33e75159 100644
--- a/docs/user-guide/cli-arguments.md
+++ b/docs/user-guide/cli-arguments.md
@@ -24,7 +24,7 @@ They are set in the container spec of the `ingress-nginx-controller` Deployment
| `--dynamic-configuration-retries` | Number of times to retry failed dynamic configuration before failing to sync an ingress. (default 15) |
| `--election-id` | Election id to use for Ingress status updates. (default "ingress-controller-leader") |
| `--election-ttl` | Duration a leader election is valid before it's getting re-elected, e.g. `15s`, `10m` or `1h`. (Default: 30s) |
-| `--enable-metrics` | Enables the collection of NGINX metrics. (default true) |
+| `--enable-metrics` | Enables the collection of NGINX metrics. (Default: false) |
| `--enable-ssl-chain-completion` | Autocomplete SSL certificate chains with missing intermediate CA certificates. Certificates uploaded to Kubernetes must have the "Authority Information Access" X.509 v3 extension for this to succeed. (default false)|
| `--enable-ssl-passthrough` | Enable SSL Passthrough. (default false) |
| `--disable-leader-election` | Disable Leader Election on Nginx Controller. (default false) |
diff --git a/pkg/flags/flags.go b/pkg/flags/flags.go
index a64a37193..ce24160fd 100644
--- a/pkg/flags/flags.go
+++ b/pkg/flags/flags.go
@@ -174,7 +174,7 @@ extension for this to succeed.`)
`Customized address (or addresses, separated by comma) to set as the load-balancer status of Ingress objects this controller satisfies.
Requires the update-status parameter.`)
- enableMetrics = flags.Bool("enable-metrics", true,
+ enableMetrics = flags.Bool("enable-metrics", false,
`Enables the collection of NGINX metrics.`)
metricsPerHost = flags.Bool("metrics-per-host", true,
`Export metrics per-host.`)
From 05eda3db8b23497d1da74013d3180780d50b0767 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 7 Oct 2024 21:00:22 +0100
Subject: [PATCH 283/283] Bump the actions group with 3 updates (#12144)
Signed-off-by: dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
---
.github/workflows/chart.yaml | 2 +-
.github/workflows/ci.yaml | 16 ++++++++--------
.github/workflows/depreview.yaml | 2 +-
.github/workflows/docs.yaml | 4 ++--
.github/workflows/golangci-lint.yml | 2 +-
.github/workflows/images.yaml | 6 +++---
.github/workflows/perftest.yaml | 2 +-
.github/workflows/plugin.yaml | 2 +-
.github/workflows/scorecards.yml | 6 +++---
.github/workflows/vulnerability-scans.yaml | 6 +++---
.github/workflows/zz-tmpl-images.yaml | 6 +++---
.github/workflows/zz-tmpl-k8s-e2e.yaml | 4 ++--
12 files changed, 29 insertions(+), 29 deletions(-)
diff --git a/.github/workflows/chart.yaml b/.github/workflows/chart.yaml
index a546801a0..63fc18b0c 100644
--- a/.github/workflows/chart.yaml
+++ b/.github/workflows/chart.yaml
@@ -45,7 +45,7 @@ jobs:
git config --global user.email "${GITHUB_ACTOR}@users.noreply.github.com"
- name: Checkout code
- uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
+ uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4.2.1
with:
fetch-depth: 0
diff --git a/.github/workflows/ci.yaml b/.github/workflows/ci.yaml
index 648cbd194..bb6247e81 100644
--- a/.github/workflows/ci.yaml
+++ b/.github/workflows/ci.yaml
@@ -47,7 +47,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
+ uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4.2.1
- uses: dorny/paths-filter@de90cc6fb38fc0963ad72b210f1f284cd68cea36 # v3.0.2
id: filter
@@ -81,7 +81,7 @@ jobs:
(needs.changes.outputs.lua == 'true') || ${{ github.event.workflow_dispatch.run_e2e == 'true' }}
steps:
- name: Checkout
- uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
+ uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4.2.1
- name: Lint Lua
uses: lunarmodules/luacheck@v1
@@ -95,7 +95,7 @@ jobs:
(needs.changes.outputs.go == 'true') || ${{ github.event.workflow_dispatch.run_e2e == 'true' }}
steps:
- name: Checkout
- uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
+ uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4.2.1
- name: Get go version
run: echo "GOLANG_VERSION=$(cat GOLANG_VERSION)" >> $GITHUB_ENV
@@ -119,7 +119,7 @@ jobs:
(needs.changes.outputs.go == 'true') || (needs.changes.outputs.docs == 'true') || ${{ github.event.workflow_dispatch.run_e2e == 'true' }}
steps:
- name: Checkout
- uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
+ uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4.2.1
- name: Get go version
run: echo "GOLANG_VERSION=$(cat GOLANG_VERSION)" >> $GITHUB_ENV
- name: Set up Go
@@ -144,7 +144,7 @@ jobs:
PLATFORMS: linux/amd64
steps:
- name: Checkout
- uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
+ uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4.2.1
- name: Get go version
id: golangversion
@@ -202,7 +202,7 @@ jobs:
| gzip > docker.tar.gz
- name: cache
- uses: actions/upload-artifact@50769540e7f4bd5e21e526ee35c689e35e0d6874 # v4.4.0
+ uses: actions/upload-artifact@604373da6381bf24206979c74d06a550515601b9 # v4.4.1
with:
name: docker.tar.gz
path: docker.tar.gz
@@ -241,7 +241,7 @@ jobs:
run: helm plugin install https://github.com/helm-unittest/helm-unittest
- name: Checkout code
- uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
+ uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4.2.1
with:
fetch-depth: 0
@@ -274,7 +274,7 @@ jobs:
steps:
- name: Checkout code
- uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
+ uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4.2.1
- name: Download cache
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
diff --git a/.github/workflows/depreview.yaml b/.github/workflows/depreview.yaml
index 857411f79..32b98c2b2 100644
--- a/.github/workflows/depreview.yaml
+++ b/.github/workflows/depreview.yaml
@@ -9,6 +9,6 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: 'Checkout Repository'
- uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
+ uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4.2.1
- name: 'Dependency Review'
uses: actions/dependency-review-action@5a2ce3f5b92ee19cbb1541a4984c76d921601d7c # v4.3.4
diff --git a/.github/workflows/docs.yaml b/.github/workflows/docs.yaml
index 479c139aa..0d0b20a5a 100644
--- a/.github/workflows/docs.yaml
+++ b/.github/workflows/docs.yaml
@@ -23,7 +23,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
+ uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4.2.1
- uses: dorny/paths-filter@de90cc6fb38fc0963ad72b210f1f284cd68cea36 # v3.0.2
id: filter
@@ -47,7 +47,7 @@ jobs:
steps:
- name: Checkout master
- uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
+ uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4.2.1
- name: Deploy
uses: ./.github/actions/mkdocs
diff --git a/.github/workflows/golangci-lint.yml b/.github/workflows/golangci-lint.yml
index 4ef7e9085..c71f090af 100644
--- a/.github/workflows/golangci-lint.yml
+++ b/.github/workflows/golangci-lint.yml
@@ -15,7 +15,7 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Checkout
- uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
+ uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4.2.1
- name: Get go version
run: echo "GOLANG_VERSION=$(cat GOLANG_VERSION)" >> $GITHUB_ENV
diff --git a/.github/workflows/images.yaml b/.github/workflows/images.yaml
index 7804158ba..e070741bb 100644
--- a/.github/workflows/images.yaml
+++ b/.github/workflows/images.yaml
@@ -39,7 +39,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
+ uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4.2.1
- uses: dorny/paths-filter@de90cc6fb38fc0963ad72b210f1f284cd68cea36 # v3.0.2
id: filter
with:
@@ -138,7 +138,7 @@ jobs:
k8s: [v1.28.13, v1.29.8, v1.30.4, v1.31.0]
steps:
- name: Checkout
- uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
+ uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4.2.1
- name: Get go version
run: echo "GOLANG_VERSION=$(cat GOLANG_VERSION)" >> $GITHUB_ENV
@@ -172,7 +172,7 @@ jobs:
PLATFORMS: linux/amd64,linux/arm,linux/arm64
steps:
- name: Checkout
- uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
+ uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4.2.1
- name: Set up QEMU
uses: docker/setup-qemu-action@49b3bc8e6bdd4a60e6116a5414239cba5943d3cf # v3.2.0
- name: Set up Docker Buildx
diff --git a/.github/workflows/perftest.yaml b/.github/workflows/perftest.yaml
index eb086538e..044c3a260 100644
--- a/.github/workflows/perftest.yaml
+++ b/.github/workflows/perftest.yaml
@@ -19,7 +19,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
+ uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4.2.1
- name: Install K6
run: |
diff --git a/.github/workflows/plugin.yaml b/.github/workflows/plugin.yaml
index 0ae13a2df..627a0a0b9 100644
--- a/.github/workflows/plugin.yaml
+++ b/.github/workflows/plugin.yaml
@@ -12,7 +12,7 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Checkout
- uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
+ uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4.2.1
with:
fetch-depth: 0
diff --git a/.github/workflows/scorecards.yml b/.github/workflows/scorecards.yml
index 9eaf091ee..f927443df 100644
--- a/.github/workflows/scorecards.yml
+++ b/.github/workflows/scorecards.yml
@@ -27,7 +27,7 @@ jobs:
steps:
- name: "Checkout code"
- uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
+ uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4.2.1
with:
persist-credentials: false
@@ -51,7 +51,7 @@ jobs:
# Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF
# format to the repository Actions tab.
- name: "Upload artifact"
- uses: actions/upload-artifact@50769540e7f4bd5e21e526ee35c689e35e0d6874 # v4.4.0
+ uses: actions/upload-artifact@604373da6381bf24206979c74d06a550515601b9 # v4.4.1
with:
name: SARIF file
path: results.sarif
@@ -59,6 +59,6 @@ jobs:
# Upload the results to GitHub's code scanning dashboard.
- name: "Upload to code-scanning"
- uses: github/codeql-action/upload-sarif@6db8d6351fd0be61f9ed8ebd12ccd35dcec51fea # v3.26.11
+ uses: github/codeql-action/upload-sarif@c36620d31ac7c881962c3d9dd939c40ec9434f2b # v3.26.12
with:
sarif_file: results.sarif
diff --git a/.github/workflows/vulnerability-scans.yaml b/.github/workflows/vulnerability-scans.yaml
index 0cd02552d..1532ad2de 100644
--- a/.github/workflows/vulnerability-scans.yaml
+++ b/.github/workflows/vulnerability-scans.yaml
@@ -22,7 +22,7 @@ jobs:
versions: ${{ steps.version.outputs.TAGS }}
steps:
- name: Checkout code
- uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
+ uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4.2.1
with:
fetch-depth: 0
@@ -52,7 +52,7 @@ jobs:
versions: ${{ fromJSON(needs.version.outputs.versions) }}
steps:
- name: Checkout code
- uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
+ uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4.2.1
- shell: bash
id: test
@@ -75,7 +75,7 @@ jobs:
# This step checks out a copy of your repository.
- name: Upload SARIF file
- uses: github/codeql-action/upload-sarif@6db8d6351fd0be61f9ed8ebd12ccd35dcec51fea # v3.26.11
+ uses: github/codeql-action/upload-sarif@c36620d31ac7c881962c3d9dd939c40ec9434f2b # v3.26.12
with:
token: ${{ github.token }}
# Path to SARIF file relative to the root of the repository
diff --git a/.github/workflows/zz-tmpl-images.yaml b/.github/workflows/zz-tmpl-images.yaml
index 2efc039d6..efadb8f89 100644
--- a/.github/workflows/zz-tmpl-images.yaml
+++ b/.github/workflows/zz-tmpl-images.yaml
@@ -31,7 +31,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
+ uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4.2.1
- uses: dorny/paths-filter@de90cc6fb38fc0963ad72b210f1f284cd68cea36 # v3.0.2
id: filter
with:
@@ -48,7 +48,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
+ uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4.2.1
- name: Build
run: |
@@ -67,7 +67,7 @@ jobs:
PLATFORMS: ${{ inputs.platforms-publish }}
steps:
- name: Checkout
- uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
+ uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4.2.1
- name: Login to GitHub Container Registry
uses: docker/login-action@9780b0c442fbb1117ed29e0efdff1e18412f7567 # v3.3.0
diff --git a/.github/workflows/zz-tmpl-k8s-e2e.yaml b/.github/workflows/zz-tmpl-k8s-e2e.yaml
index f1b6bb242..42b750838 100644
--- a/.github/workflows/zz-tmpl-k8s-e2e.yaml
+++ b/.github/workflows/zz-tmpl-k8s-e2e.yaml
@@ -20,7 +20,7 @@ jobs:
steps:
- name: Checkout
- uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
+ uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4.2.1
- name: cache
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
@@ -49,7 +49,7 @@ jobs:
make kind-e2e-test
- name: Upload e2e junit-reports ${{ inputs.variation }}
- uses: actions/upload-artifact@50769540e7f4bd5e21e526ee35c689e35e0d6874 # v4.4.0
+ uses: actions/upload-artifact@604373da6381bf24206979c74d06a550515601b9 # v4.4.1
if: success() || failure()
with:
name: e2e-test-reports-${{ inputs.k8s-version }}${{ inputs.variation }}